• Title/Summary/Keyword: 차단시스템

Search Result 1,393, Processing Time 0.024 seconds

A Study on ESM(Enterprise Security Management) System Standard (통합 보안 관리 시스템 표준화에 대한 연구)

  • 소우영
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.109-121
    • /
    • 2002
  • As the development of information technology and thus the growth of security incidents, there has been increasing demand on developing a system for centralized security management, also known as Enterprise Security Management(ESM), uniting functions of various security systems such as firewall, intrusion detection system, virtual private network and so on. Unfortunately, however, developers have been suffering with a lack of related standard. Although ISTF recently announced firewall system and intrusion detection system log format, it still needs for truly efficient ESM further development of the related standard including event and control messaging. This paper analyses ISTF standard and further suggests an additional event and control messaging standard for firewall and intrusion detection systems. It is expected that this effort would be helpful for the development of ESM and further related standard.

  • PDF

Pipelined Wake-Up Scheme to Reduce Power-Line Noise of MTCMOS Megablock Shutdown for Low-Power VLSI Systems (저전력 VLSI 시스템에서 MTCMOS 블록 전원 차단 시의 전원신 잡음을 줄인 파이프라인 전원 복귀 기법)

  • 이성주;연규성;전치훈;장용주;조지연;위재경
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.10
    • /
    • pp.77-83
    • /
    • 2004
  • In low-power VLSI systems, it is effective to suppress leakage current by shutting down megablocks in idle states. Recently, multi-threshold voltage CMOS (MTCMOS) is widely accepted to shutdown power supply. However, it requires short wake-up time as operating frequency increases. This causes large current surge during wake-up process, and it often leads to system malfunction due to severe Power line noise. In this paper, a novel wake-up scheme is proposed to solve this problem. It exploits pipelined wake-up strategy in several stages that reduces maximum current on the power line and its corresponding power line noise. To evaluate its efficiency, the proposed scheme was applied to a multiplier block in the Compact Flash memory controller chip. Power line noise in shutdown and wake-up process was simulated and analyzed. From the simulation results, the proposed scheme was proven to greatly reduce the power line noise compared with conventional schemes.

A Hybrid Multiple Pattern Matching Scheme to Reduce Packet Inspection Time (패킷검사시간을 단축하기 위한 혼합형 다중패턴매칭 기법)

  • Lee, Jae-Kook;Kim, Hyong-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.27-37
    • /
    • 2011
  • The IDS/IPS(Intrusion Detection/Prevention System) has been widely deployed to protect the internal network against internet attacks. Reducing the packet inspection time is one of the most important challenges of improving the performance of the IDS/IPS. Since the IDS/IPS needs to match multiple patterns for the incoming traffic, we may have to apply the multiple pattern matching schemes, some of which use finite automata, while the others use the shift table. In this paper, we first show that the performance of those schemes would degrade with various kinds of pattern sets and payload, and then propose a hybrid multiple pattern matching scheme which combines those two schemes. The proposed scheme is organized to guarantee an appropriate level of performance in any cases. The experimental results using real traffic show that the time required to do multiple pattern matching could be reduced effectively.

Best-Fit 알고리즘을 응용한 비동기 IMT-2000 시스템의 자원관리 방안 연구

  • Han, Jeong-Hui
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.127-130
    • /
    • 2004
  • 이 논문에서는 비동기 IMT-2000 시스템에서 고속의 멀티미디어 서비스의 호 차단율을 낮추기 위한 자원할당 알고리즘을 개발한다. 이 논문에서 제시하는 알고리즘의 성능을 측정하기 위해 컴퓨터 시뮬레이션을 실시한 결과, 기존의 알고리즘 대비 고속 멀티미디어 서비스의 호 차단율을 40% 이상 개선하는 것으로 나타났다. 현재, 이 알고리즘은 LG 전자에서 개발한 상용 비동기 IMT-2000 시스템에 적용되어 운용되고 있다.

  • PDF

Technology of a Integrated Security System Using Secure Adaptor (보안 어댑터를 이용한 통합적 보안 기술)

  • 안은영;이종우
    • Proceedings of the KAIS Fall Conference
    • /
    • 2002.05a
    • /
    • pp.112-114
    • /
    • 2002
  • 보안 어댑터를 이용하여 하드웨어적으로 해킹 등 사용자가 의도하지 않은 방법으로 정보(자료)가 타인에게 유출되는 것을 방지하기 위한 보안 시스템에 관한 것이다. 보안 어댑터 KEYS/sup TM/ 는 컴퓨터 시스템과 키보드 사이에 설치하여 사용하는 것으로 키보드 입력 정보에 대한 해킹을 원천적으로 차단하기 위한 기술이다. 해커의 위험으로부터 정보를 보호하는 것 뿐만 아니라 내부자의 불법적 정보유출이나 사용자 실수에 의한 정보 손실을 차단하는 등, 자산적 가치를 지닌 정보를 보존하기 위해 다양한 기능을 제공하는 통합적 정보보호 시스템을 소개한다.

Analysis of Network Attack Pattern using Firewall Log (방화벽 로그를 이용한 네트워크 공격유형 분석)

  • Yoon, Sung-Jong;Kim, Jeung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.909-912
    • /
    • 2005
  • 다양한 정보보호체계가 운영되고 있지만, 방화벽과 침입탐지시스템이 가장 많이 운영되고 있는 실정에서, 본 논문에서는 방화벽 관리자의 차단로그 분석을 효율적으로 지원하면서, 방화벽에 의해 차단되어 침입탐지시스템이 탐지하지 못해 관리자가 지나칠 우려가 있는 공격행위를 방화벽을 통해 인지할 수 있는 방안을 구성했다. 이를 통해 관리자는 침입탐지시스템과 함께 네트워크를 통한 스캔 및 DOS 등의 공격을 방화벽을 통해 인지할 수 있어 안정적인 네트워크 운영이 가능하다.

  • PDF

Security Mechanism for Browsers against Spoofing and Phishing Attacks (스푸핑과 피싱 공격에 강한 브라우저의 보안 메카니즘)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.873-877
    • /
    • 2009
  • 본 논문에서는 상황기반 개인정보보호 통합 에이전트를 패키지 형태로 공공기관에 공급 공공기관 내부의 개인정보 관리 시스템에 적용되는 피싱 차단 시스템에 대해서 설계하였다. 이러한 시스템은 공공기관 내부 직원의 개인정보 관리 에이전트로 적용과 상황기반 개인정보보호 통합 에이전트로서 금융기관 등의 솔루션에 적용 가능하다. 주요 내용으로는 피싱 유형과 방법을 분석하고 피싱(Phishing) 웹사이트를 탐지, 차단하는 알고리즘을 원천적으로 개발하여 구현하였다.

  • PDF

Development of 460[V]/225[A]/50[kA] Contact System in Current Limiting MCCB using an estimation and analysis method for the interrupting capability (차단성능 평가해석기법을 적용한 강자계 구동방식의 460[V]/225[A]/50[kA]급 한류형 MCCB 소호부 개발)

  • 최영길;박찬교
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.1
    • /
    • pp.78-84
    • /
    • 2004
  • Low voltage circuit breakers which interrupt rapidly and raise the reliability of power supply are widely used in power distribution systems. In the paper, it has been investigated how much interrupting capability is improved by correcting the shape of the contact system in molded case circuit breaker(below MCCB), especially contacts and arc runner. Prior to the interrupting testing, it is necessary for the optimum design tc analyze electromagnetic forces on the contact system generated by current and flux density. This paper presents both our computational analysis and test results on contact system in MCCB

A Swearword Filter System for Online Game Chatting (온라인게임 채팅에서의 비속어 차단시스템)

  • Lee, Song-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1531-1536
    • /
    • 2011
  • We propose an automatic swearword filter system for online game chatting by using Support Vector Machines(SVM). We collected chatting sentences from online games and tagged them as normal sentences or swearword included sentences. We use n-gram syllables and lexical-part of speech (POS) tags of a word as features and select useful features by chi square statistics. Each selected feature is represented as binary weight and used in training SVM. SVM classifies each chatting sentence as swearword included one or not. In experiment, we acquired overall 90.4% of F1 accuracy.

A Design of Mandatory Access Control Mechanism for Firewall Systems (침입차단시스템을 위한 강제적 접근통제 기법 설계)

  • Kim, Jae-Sung;Hong, Ki-Yoong;Kim, Hak-Beom;Sim, Joo-Geol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.967-974
    • /
    • 1998
  • Access control scheme of the firewall systems protects the systems from threats by using the conventional discretionary access control mechanism. The discretionary access control mechanism is insufficient to control secure information flow on the multievel network. Thus, it is necessary to provide the mandatory access control mechanism to the firewall systems for the multilevel security environment. In this paper, we present a design scheme of the security mechanisms concerning the sensitivity label and the mandatory access control for securely processing the multilevel information.

  • PDF