• Title/Summary/Keyword: 캠퍼스 네트워크

Search Result 82, Processing Time 0.023 seconds

A data security transmission system and method based on key exchange encryption protocol (키 교환 암호 프로토콜 기반 데이터 보안 전송 시스템 및 방법)

  • Jaekyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.423-424
    • /
    • 2024
  • 본 논문은 TCP/IP 네트워크 및 암호 프로토콜을 결합하여 CCTV 카메라 영상 데이터를 안전하게 전송하는 시스템에 관한 것이다. 특히, TCP Handshake에서 암호 키를 교환하고, 디바이스의 시그니처 정보를 활용하여 키를 생성하는 키 교환 암호 프로토콜을 도입한다. 이를 통해 CCTV 카메라의 영상 데이터를 암호화하여 전송하고, 수신 시 복호화하여 저장한다. 또한, 적어도 하나 이상의 CCTV 카메라에 대한 보안 인증과 네트워크 연결 상태를 제어하며, 중간자 공격을 방지하기 위한 안전한 키 교환을 수행한다. 이로써 안전성이 강화된 CCTV 카메라 시스템을 제공할 수 있다.

  • PDF

Enterprise Network Weather Map System using SNMP (SNMP를 이용한 엔터프라이즈 Network Weather Map 시스템)

  • Kim, Myung-Sup;Kim, Sung-Yun;Park, Jun-Sang;Choi, Kyung-Jun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.93-102
    • /
    • 2008
  • The network weather map and bandwidth time-series graph are popularly used to understand the current and past traffic condition of NSP, ISP, and enterprise networks. These systems collect traffic performance data from a SNMP agent running on the network devices such as routers and switches, store the gathered information into a DB, and display the network performance status in the form of a time-series graph or a network weather map using Web user interface. Most of current enterprise networks are constructed in the form of a hierarchical tree-like structure with multi-Gbps Ethernet links, which is quietly different from the national or world-wide backbone network structure. This paper focuses on the network weather map for current enterprise network. We start with the considering points in developing a network weather map system suitable for enterprise network. Based on these considerings, this paper proposes the best way of using SNMP in constructing a network weather map system. To prove our idea, we designed and developed a network weather map system for our campus network, which is also described in detail.

Developement Strategy for the National Research Network and Next Generation Network Security (국가연구망의 발전방향 및 차세대 국가연구망 보안)

  • Lee, Myoungsun;Cho, Buseung;Park, Hyoungwoo;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.3-11
    • /
    • 2016
  • With repid development of optical networking technology, Software-Defined Network (SDN) and Network Function Virtualization (NFV), high performance networking service, collaboration platform that enables collaborative research globally, drastically National Research Network (NRN) including Internet Service has changed. Therefore we compared and analyzed several world-class NRNs and took a view of future development strategy of the NRN. Also we suggest high speed security environment in super high bandwidth network with 40Gbps and 100Gbps optical transmission technology, network separation of NRN with Science DMZ to support high performance network transmission for science big data, building security environment for last-mile in campus network that supports programmability of IDS using BRO framework.

Indoor Network Map Matching by Hidden Markov Model (은닉 마르코프 모델을 이용한 실내 네트워크 맵 매칭)

  • Kim, Tae Hoon;Li, Ki-Joune
    • Spatial Information Research
    • /
    • v.23 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • Due to recent improvement of various sensor technologies, indoor positioning becomes available. However, Indoor positioning technologies by Wi-Fi radio map and acceleration sensor and digital campus still have a certain level of errors and a number of researches have been done to increase the positioning accuracy of the indoor positioning. If we could provide a room level accuracy, indoor location based services with current indoor positioning methods such as Wi-Fi radio map and acceleration sensors would be possible. In this paper, we propose an indoor map matching method to provide a room level accuracy based on hidden markov model.

A Study Education Model on the Software Defined Network Control System in the Transport Network (전송망의 소프트웨어 정의 네트워크 제어 시스템 교육 모델 연구)

  • Chang, Moon-soo;Kim, Yu-doo
    • Journal of Practical Engineering Education
    • /
    • v.10 no.2
    • /
    • pp.81-87
    • /
    • 2018
  • During the major sections of the network, Software-defined network control technology for the network area corresponding to the transmission network is becoming a change in network-controlled environments utilizing network operation and provisioning across the network industry. Currently development is underway along with the deployment of PTN equipment and configuration for provisioning is being phased out. It is actively introducing establishment of SDN-based control system while constructing provisioning of PTN equipment from actual commercial network. Therefore, in this thesis, we are going to look at the contents and trends of SDN systems in packet-based transmission networks based on PTN and use them in research on OpenDaylight, an open source for configuring SDN. It then Network Operator will study the software defined control techniques for operational education.

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

Analysis of Department of Home Economics Education Curriculum of College of Education through Keyword Network Analysis (키워드 네트워크 분석을 통한 사범대학 가정교육과 교육과정 분석)

  • Park, Jisoon;Ju, Sueun
    • Journal of Korean Home Economics Education Association
    • /
    • v.35 no.1
    • /
    • pp.105-124
    • /
    • 2023
  • The purpose of this study was to identify the characteristics of the contents included in the curriculum and 382 syllabi of the department of home economics education of College of Education in Korea and analyze the correlation by detailed area through the keyword network method. In order to analyze the home economics education curriculum and 382 syllabuses of a total of 11 universities, the frequency of keyword occurrence was analyzed using the KrKwic program, also the degree of connection between keywords and various centrality scales were calculated and visualized. The results of this study were as follows. First, as a result of analyzing the entire syllabi, keywords representing various fields such as family, secondary school, clothing, food, consumer, and design appeared evenly, and keywords related to teaching methods such as 'method', 'practice', 'change', and 'principle' were appeared. Those keywords showed high degree of connection and centrality. Second, in the detailed sectoral analysis, core keywords for each area appeared, and each subject were found to reflect the core keywords of the academic base. This study contributes to the conversion of curriculum of the department of home economics education to future-oriented and convergent curriculum.

A Study on Relay Server Topology inside NAT for Pure P2P (순수 P2P를 위한 NAT 내부의 Relay Server 토폴로지에 관한 연구)

  • Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.575-580
    • /
    • 2008
  • Lately, the use of the NAT has become unavoidable with the increase of P2P traffic along with the exhaustion of IPv4 IP address. Due to NAT properties, NAT's internal host can only be connected through a relay method using the outside server. Accordingly, there is a lot of resource exhaustion of the relay server on the NAT exterior and network traffic increases. This essay proposes a topology that can form sessions to the NAT interior from the NAT exterior and that will decrease network traffic by placing NAT exterior relay servers in the NAT interior.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Performance Improvement of a Real-time Traffic Identification System on a Multi-core CPU Environment (멀티 코어 환경에서 실시간 트래픽 분석 시스템 처리속도 향상)

  • Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.348-356
    • /
    • 2012
  • The application traffic analysis is getting more and more challenging due to the huge amount of traffic from high-speed network link and variety of applications running on wired and wireless Internet devices. Multi-level combination of various analysis methods is desired to achieve high completeness and accuracy of analysis results for a real-time analysis system, while requires much of processing burden on the contrary. This paper proposes a novel architecture for a real-time traffic analysis system which improves the processing performance on multi-core CPU environment. The main contribution of the proposed architecture is an efficient parallel processing mechanism with multiple threads of various analysis methods. The feasibility of the proposed architecture was proved by implementing and deploying it on our campus network.