• Title/Summary/Keyword: Access Security System

Search Result 1,039, Processing Time 0.023 seconds

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.

What Quality Factors Affect to the e-Learning Performance (e-러닝 성과에 영향을 미치는 품질요인에 관한 연구)

  • Kim, Sung-Gyun;Sung, Hang-Nam;Jeong, Dae-Yul
    • The Journal of Information Systems
    • /
    • v.16 no.1
    • /
    • pp.201-230
    • /
    • 2007
  • Recently, the growth of e-Learning systems and its related information technology has presented a unique challenge for both schools and industry. It would make an extremely phenomenal paradigm shift in the educational method and practice. Methods of assessing the quality of e-teaming services and contents are critical issue in both practice and research. Moreover, many researchers are interested in what qualify factors more affect to the Performance of e-Learning service. Nevertheless, service quality is a construct that is difficult to define and measure. e-Learning services are composed of many factors, and they are more complicated than the traditional education services because they we performed on the distance basis and the many platforms of IT infrastructure. The purposes of our research are to classify the e-Learning service dimension and identify their factors, to develop the measurement of the factors, and finally to test empirically their relationship between the service factors and e-Learning service performance. For the development of the service factors we considered SERVQUAL model and SERVPERF model which were developed in the service marketing area. The SERVQUAL model was more fitted to the e-Learning services than the latter. From that we derived several factors that fit to our research domain, ie, tangibles, access, reliability, credibility, security, responsiveness, assurance, empathy. We combined three factors of them(reliability, credibility, security) into a factor, system stability for the semantic simplicity, and divided responsiveness factor into system operator responsiveness and teacher responsiveness as the entity based dimension classification. In the e-Learning services research, Most researcher are mentioned the quality factors of contents, so we added to two contents quality factors, ie, contents production method and richness of contents itself. We examined the relationship between the service quality factors and e-Learning performance(student satisfaction and service reuse intention). As result three quality factors(contents production method, teacher responsiveness, empathy) significantly affected student satisfaction. To the other performance variable, ie, service reuse intention, the teacher related quality factors(such as teacher responsiveness, assurance, empathy) affected only. In conclusion, even in the on-line distance teaming, the teacher's role md earnestness is as important as ever.

  • PDF

Development of Fitness Avatar Model for Increasing Physical Activity in Individual with Spinal Cord Injury (척수장애인 신체활동 증가를 위한 피트니스 아바타 모형 개발)

  • Kang, Sunyoung
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.65-70
    • /
    • 2014
  • The aim of this study is to suggest the fitness Avatar model for increasing physical activities in individuals with SCI(spinal cord injury). With the increasing of the disable, the ratio of individuals with SCI is also increasing. Avatar is a movable image that represents a person in a virtual reality environment or in cyberspace. With the expansion of new technology, such as video games and virtual reality, there has been an increase in the interest of using virtual reality in therapy. It is not easy for individuals with SCI to access tho sports facilities due to paraplegia. The increasing physical activities based on virtual reality will be the most innovative and future-oriented approach. First, building a system and establishing a comprehensive support system is essential to activate and spread variety of physical activities for individuals with SCI. Second, providing a appropriate feedback and identifying the effect of intervention will be considered.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

The Transmit Method for Fingerprint sensing using Differential Pulse in Mutual Capacitance Touch Screen Panel for improving security of computer information (컴퓨터의 보안향상을 위한 상호정전용량 터치스크린패널의 차동펄스를 이용한 지문인식을 위한 송신법)

  • Kim, Seong Mun;Choi, Eun Ho;Ko, Nak Young;Bien, Franklin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.55-60
    • /
    • 2017
  • This paper is proposed on the transmit Method Finger-Printer Scanning of Mutual Capacitance Touch Screen Panel Using Differential Pulse for improving the security of computer information. This system is composed of differential pulse generator and Ring-Counter, also Supply voltage is 5V. this system generates the Pulse wave which is composed of In-Phase and Out of Phase at 1MHz while period of 2m/s. it is designed and be able to operate four channels. overall power consumption is approximately 78.08nW. This prototype is implemented in 0.25um CMOS Process and Chip area is $870um{\times}880um$.

A Study on the Variable Password Generation Method in Internet Authentication System (변동형 비밀번호 생성방법 및 이를 이용한 인터넷 인증 시스템에 관한 연구)

  • Kang, Jung-Ha;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1409-1415
    • /
    • 2013
  • With the development of Internet communication and the use of a variety of online services has been greatly expanded. Therefore, the importance of authentication techniques for users of online services has increased. The most commonly used methods for user authentication is a technique that utilizes a prearranged password. However, the existing password scheme for authentication must use the same password every time. Therefore, the password being leaked by attackers, it can be used maliciously. In this paper, we proposed the Variable Password Generation Method in Internet Authentication System that generates a new password using information such as the access date, time, and IP address when user logs in. The method proposed in this paper prevents disclosure of personal information due to password exposure and improves the reliability and competitiveness in the field of security systems.

A Layered Protection System for a Cloud Storage of Defense M&S Resources (국방 재사용 자원의 클라우드 저장소를 위한 계층형 보호 시스템)

  • Park, Chanjong;Han, Seungchul;Lee, Kangsun
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.77-87
    • /
    • 2015
  • Defense M&S (Modeling & Simulation) is utilized as a realistic method to analyze MOE (Measure of Effectiveness) of weapon systems by modeling weapons and their operational environment on the computer, and simulating them under various war scenarios. As weapon systems become complex in their structure and dynamics, model engineering are experiencing difficulties to construct simulation models on a computer. A model repository helps model developers to save model development time and cost by systematically storing predefined and already validated models. However, most repositories for Defense M&Shave not been successful partly due to limited accessability, vulnerability to security threats, and low level of dependability. In this paper, we propose W-Cloud (Weapon Cloud), a cloud model repository for reusing predefined weapon models. Clients can access W-Cloud on any platforms and various devices, yet security and confidentiality concerns are guaranteed by employing multi-tier information protection mechanism.