• Title/Summary/Keyword: 컨테이너 보안

Search Result 109, Processing Time 0.031 seconds

A Design of Transaction Management for EJB Container (EJB 컨테이너를 위한 트랜잭션 관리의 설계)

  • Jang, Choul-Soo;Kim, Sung-Hoon;Roh, Myung-Chan;Seo, Beom-Su;Jung, Seung-Woog;Kim, Joong-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.361-364
    • /
    • 2002
  • EJB(Enterprise JavaBeans)는 서버 상의 Java 컴포넌트와 그 컴포넌트를 위한 동작 환경을 제공하는 전체 프레임웍(Framework)이다. EJB 에서 동작하는 컴포넌트를 엔터프라이즈 빈(Enterprise Bean)이라고 하고, 그 컴포넌트가 동작하기 위한 환경을 컨테이너(Container)라 한다 EJB 에서는 기존에 개발자가 직접 컴포넌트로 제공해 주어야 하는 트랜잭션, 영속성, 보안문제, 데이터베이스 연결 풀링, 쓰레딩 관리 같은 기능을 컨테이너에서 처리해 줌으로 일반 개발자는 복잡한 하부 로직에 신경쓰지 않으면서 더 쉽고 빠르게 동일한 기능을 구현할 수 있게 된다. 본 논문에서는 이러한 EJB 컨테이너를 설계함에 있어서 하나의 중요한 요소인 트랜잭션 관리에 관한 설계를 논한다.

  • PDF

Access Control using Secured Container-based Virtualization (보안 컨테이너 가상화 기반 접근 제어)

  • Jeong, Dong-hwa;Lee, Sunggyu;Shin, Youngsang;Park, Hyuncheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.330-334
    • /
    • 2017
  • Container-based virtualization reduces performance overhead compared with other virtualization technologies and guarantees an isolation of each virtual execution environment. So, it is being studied to block access to host resources or container resources for sandboxing in restricted system resource like embedded devices. However, because security threats which are caused by security vulnerabilities of the host OS or the security issues of the host environment exist, the needs of the technology to prevent an illegal accesses and unauthorized behaviors by malware has to be increased. In this paper, we define additional access permissions to access a virtual execution environment newly and control them in kernel space to protect attacks from illegal access and unauthorized behaviors by malware and suggest the Container Access Control to control them. Also, we suggest a way to block a loading of unauthenticated kernel driver to disable the Container Access Control running in host OS by malware. We implement and verify proposed technologies on Linux Kernel.

  • PDF

Security Treats about Union File System and Responce Methodology (유니온 파일시스템에 대한 보안 위협 및 대응 방법)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.445-446
    • /
    • 2021
  • Union file system is a technology that can be used as a single file system by integrating various files and directories. It has the advantage of maintaining the source file/directory used for integration, so it is used in many applications like container platform. When using the union file system, the user accesses the write-able layer, to which the security technology provided by the operating system can be applied. However, there is a disadvantage in that it is difficult to apply a separate security technology to the source file and directory used to create the union file system. In this study, we intend to propose an access control mechanism to deny security threats to source file/directory that may occur when using the union file system. In order to verify the effectiveness of the access control mechanism, it was confirmed that the access control mechanism proposed in this study can protect the source file/directory while maintaining the advantages of the union file system.

  • PDF

A Study on Security Threats and Countermeasures in Smart Farm Environments (스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구)

  • Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.

Enhancement technology for unwanted emission of logistics tracking device (물류트랙킹 장비의 전자파불요방사 개선 기술)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Jeon, Mi-Jin;Jo, Jae-Hui;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.898-899
    • /
    • 2013
  • In recent years, logistics tracking Device using to improve logistics efficiency are being extensively researched. The purpose of this paper is to Enhancement technology for unwanted emission of logistics tracking device usable cargo container security transport.

  • PDF

Distribute Parallel Crawler Design and Implementation (분산형 병렬 크롤러 설계 및 구현)

  • Jang, Hyun Ho;jeon, kyung-sik;Lee, HooKi
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.21-28
    • /
    • 2019
  • As the number of websites managed by organizations or organizations increases, so does the number of web application servers and containers. In checking the status of the web service of the web application server and the container, it is very difficult for the person to check the status of the web service after accessing the physical server at the remote site through the terminal or using other accessible software It. Previous research on crawler-related research is hard to find any reference to the processing of data from crawling. Data loss occurs when the crawler accesses the database and stores the data. In this paper, we propose a method to store the inspection data according to crawl - based web application server management without losing data.

Design and Implementation of Low Power Container Security Device based on IEEE 802.15.4 (IEEE 802.15.4 기반 저전력 컨테이너 보안장치의 설계 및 구현)

  • Park, Se-Young;Kim, Taek-Hyun;Choi, Hoon;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.215-224
    • /
    • 2010
  • A container security device (CSD) monitors intrusions through the cargo door; it is a reduced function device that uses IEEE 802.15.4 with a beacon mode. However, in the beacon mode, the CSD consumes too much battery power in periodical idle listening and sensing trials. Moreover, the CSD cannot send the message to the CSD reader actively, and it makes big latency problem. Therefore, we propose a low-power CSD to reduce the unnecessary power consumption. The proposed CSD follows the requirements of the U.S. Department of Homeland Security, and reduces battery consumption through a power-efficient hardware design, a night-watch mechanism for low-power operation and low-power sensing to reduce unnecessary monitoring. And the CSD sends alert message to the CSD reader. Simulation results show that our CSD reduces battery consumption by over 70% through the night-watch mechanism and by approximately 80% through the low-power sensing. And the CSD can send the alert message to the remote CSD reader by over 94%.

Implementing Secure Container Transportation Systems Based on ISO 18185 Specification (ISO 18185 기반의 컨테이너 안전수송 시스템 구현)

  • Choo, Young-Yeol;Choi, Su-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1032-1040
    • /
    • 2010
  • This paper describes implementation of electonic seal (E-Seal) of a container based on ISO 18185 standard and development of monitoring systems checking E-Seal device and cargo states in the container for secure transportation from departure to destination. For lack of definition on confidentiality support in ISO 18185-4 standard, it is vulnerable to security attack such as sniffing. To cope with this, we developed encryption/decryption functions implementing RC5 and AES-128 standards and compared their performance. Experimental results showed that RC5 outperformed AES-128 in terms of time delay. In addition, RC5 had an advantage under the condition of large sized messages as well as CPUs with low performance. However, the portion of encryption/decryption processing time was less than 1 percent of response time including communication delay between E-Seal tags and readers. Hence, the performance difference between RC5 and AES-128 standards was trivial, which revealed that both specifications were allowable in developed systems.

Security Container CRYPTEX Model for Copyright Management of Software Source Code (소프트웨어 소스코드의 저작권 관리를 위한 보안 컨테이너 크립텍스 모델)

  • Cha, Byung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.451-463
    • /
    • 2008
  • There are management and security of software source code equivalent to 10 assembly lines of important infrastructure in the early stage of information society directly. A support technology and framework to protect software source code are so poor state In this paper, the proposed model that is support protection and access control between software source code as object and subject that is not authenticated safely was named CRYPTEX model. And we propose active business model to provide delegate, mobile, and security/access control function for passive software source code in document state using CRYPTEX.

  • PDF

A Study on Activation Characteristics Generated by 9 MeV Electron Linear Accelerator for Container Security Inspection (컨테이너 보안 검색용 9 MeV 전자 선형가속기에서 발생한 방사화 특성평가에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-Hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.5
    • /
    • pp.563-575
    • /
    • 2020
  • The purpose of this study is to evaluate the activation characteristics that occur in a linear accelerator for container security inspection. In the computer simulation design, first, the targets consisted of a tungsten (Z=74) single material target and a tungsten (Z=74) and copper (Z=29) composite target. Second, the fan beam collimator was composed of a single material of lead (Z=82) and a composite material of tungsten (Z-74) and lead (Z=82) depending on the material. Final, the concrete in the room where the linear accelerator was located contained magnetite type and impurities. In the research method, first, the optical neutron flux was calculated using the MCNP6 code as a F4 Tally for the linear accelerator and structure. Second, the photoneutron flux calculated from the MCNP6 code was applied to FISPACT-II to evaluate the activation product. Final, the decommissioning evaluation was conducted through the specific activity of the activation product. As a result, first, it was the most common in photoneutron targets, followed by a collimator and a concrete 10 cm deep. Second, activation products were produced as by-products of W-181 in tungsten targets and collimator, and Co-60, Ni-63, Cs-134, Eu-152, Eu-154 nuclides in impurity-containing concrete. Final, it was found that the tungsten target satisfies the permissible concentration for self-disposal after 90 days upon decommissioning. These results could be confirmed that the photoneutron yield and degree of activation at 9 MeV energy were insignificant. However, it is thought that W-181 generated from the tungsten target and collimator of the linear accelerator may affect the exposure when disassembled for repair. Therefore, this study presents basic data on the management of activated parts of a linear accelerator for container security inspection. In addition, When decommissioning the linear accelerator for container security inspection, it is expected that it can be used to prove the standard that permissible concentration of self-disposal.