• Title/Summary/Keyword: Cyber Architecture

Search Result 159, Processing Time 0.024 seconds

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

Traffic Analysis Architecture for Secure Industrial Control System (안전한 제어시스템 환경을 위한 트래픽 분석망 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1223-1234
    • /
    • 2016
  • The Industrial control system is adopted by various industry field and national infrastructure, therefore if it received cyber attack, the serious security problems can be occured in the public sector. For this reason, security requirements of the industrial control system have been proposed, in accordance with the security guidelines of the electronic control system, and it is operated by separate from the external and the internal network. Nevertheless, cyber attack by malware (such as Stuxnet) targeting to control system have been occurred continuously, and also the real-time detection of untrusted traffic is very difficult because there are some difficulty of keeping up with quickly evolving the advent of new-variant malicious codes. In this paper, we propose the traffic analysis architecture for providing secure industrial control system based on the analyzed the security threats, the security requirements, and our proposed architecture.

A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System (제로 트러스트 아키텍처 적용 방안에 대한 연구: 재택근무 시스템 구성을 중심으로)

  • Jaewoo Do;Keumseok Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1001-1020
    • /
    • 2023
  • As massive increase in remote work since COVID-19, the boundaries between the inside and outside of corporate networks have become blurred. As a result, traditional perimeter security has stagnated business productivity and made it difficult to manage risks such as information leakage. The zero trust architecture model has emerged, but it is difficult to apply to IT environments composed of various companies. Therefore, using the remote work system configuration as an example, we presented a configuration and methodology that can apply zero trust models even in various network environments such as on-premise, cloud, and network separation. Through this, we aim to contribute to the creation of a safe and convenient cyber environment by providing guidance to companies that want to apply zero trust architecture, an intelligent system that actively responds to cyber threats.

A Study on the concept of 'Trans Architecture' in Marcos Novak (마르코스 노박(Marcos Novak)의 트렌스 건축(Trans Architecture) 개념에 관한 연구)

  • Lee Kyu-Hong;Kim Kai-Chun
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.4 s.57
    • /
    • pp.46-54
    • /
    • 2006
  • The present study examined Marcos Novak, a digital architect who has researched digital architecture and produced related works since the early 1990s. Starting from digital ideas originating from science and mathematics, he pursued 'trans architecture' based on the concept of 'architecture beyond the boundary of architecture' and 'architecture as invisible foundation.' His concept of 'trans architecture' is considered an important viewpoint in expressing the architecture of a diversified and hybridized age like today. The objective of this study was to understand the concepts of Allobio and Eversion, which are important digital terms forming the background of Novak's trans architecture, and to analyze architecture philosophy and architecture design concepts observed in his works through Novak's digital terminology centering on the concept of trans architecture pursued by him. Through this, we purposed to analyze the concept of architectural space, methods of form creation and the characteristics of trans architecture space, which were unique to Novak, the leader of digital architecture, and ultimately to provide basic materials on Novak. Novak's trans architecture represents digital architecture in the contemporary diversified and hybridized age, and his works involve various different digital elements and ideas, scientific paradigms, mathematic algorithms, 4 dimensional geometry, etc. In this sense, he is regarded as a prominent leading advocate of digital architecture.

Model-based Autonomic Computing Framework for Cyber-Physical Systems (CPS를 위한 모델 기반 자율 컴퓨팅 프레임워크)

  • Kang, Sungjoo;Chun, Ingeol;Park, Jeongmin;Kim, Wontae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.267-275
    • /
    • 2012
  • In this paper, we present the model-based autonomic computing framework for a cyber-physical system which provides a self-management and a self-adaptation characteristics. A development process using this framework consists of two phases: a design phase in which a developer models faults, normal status constrains, and goals of the CPS, and an operational phase in which an autonomic computing engine operates monitor-analysis-plan-execute(MAPE) cycle for managed resources of the CPS. We design a hierachical architecture for autonomic computing engines and adopt the Model Reference Adaptive Control(MRAC) as a basic feedback loop model to separate goals and resource management. According to the GroundVehicle example, we demonstrate the effectiveness of the framework.

A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C (원전 디지털 계측제어시스템 사이버보안 기술 체계 수립 방법 연구)

  • Chung, Manhyun;Ahn, Woo-Geun;Min, Byung-Gil;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.561-570
    • /
    • 2014
  • Nuclear Power Plant Instrumentation and Control System(NPP I&C) which is used to operate safely is changing from analog technology to digital technology. Ever since NPP Centrifuge of Iran Bushehr was shut down by Stuxnet attack in 2010, the possibility of cyber attacks against the NPP has been increasing. However, the domestic and international regulatory guidelines that was published to strengthen the cyber security of the NPP I&C describes security requirements and method s to establish policies and procedures. These guidelines are not appropriate for the development of real applicable cyber security technology. Therefore, specialized cyber security technologies for the NPP I&C need to be developed to enhance the security of nuclear power plants. This paper proposes a cyber security technology development system which is exclusively for the development of nuclear technology. Furthermore, this method has been applied to the ESF-CCS developed by The KINCS R&D project.

Developing Self-awareness Through Cyber Study and Cyber Reading Activities: A Case Study with the Electronic Library 'Booktoby' (사이버 학습을 활용한 학생의 자아정체성 확인에 관한 연구: 북토비 사례를 중심으로)

  • Kang, Hyon-Sook
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.485-494
    • /
    • 2014
  • This study has been conducted with $1^{st}$ grade elementary students where the purpose was to develop students' interest in themselves and to cultivate their self-awareness as the first step toward establishing a suitable course and career for their start-up features. Students have conducted the cyber study through "Incheon e-School" and cyber reading "Booktoby" and recorded three types of outcomes - affective self-awareness, social self-awareness and intelligence self-awareness - on each side of the Pyramid, thus constructing their own self-awareness pyramids of the system. According to the results, after such activities were undertaken during the $1^{st}$ semester, their opinion toward their self-control and study ability has improved as much as about 67% compared to that of the beginning of the last semester. Regarding the effects of cyber reading, their interest, spontaneity and understanding toward reading books have also improved as much as 54% and 50%, 33% respectively along with positive answers of as much as 75% with regard to self-awareness. When it comes to the results of the SCI-II test (used to evaluate self-awareness), the total average has improved by as much as 3 points and the three components of self-awareness - affective, social, and intelligence - have improved by as much as 4points, 1point, and 5points, respectively.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

A Study for Integrating ICS Security Logs with Centralized SIEM (Security Information and Event Management) using OPC Protocol (OPC 프로토콜을 활용한 제어시스템 보안로그 전송방법 고찰 및 통합 로그서버 구축방안)

  • Kim, Jaehong;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1205-1212
    • /
    • 2022
  • Cyber threat targeting ICS (Industrial Control System) has indicated drastic increases over the past decade and Cyber Incident in Critical Infrastructure such as Energy, Gas Terminal and Petrochemical industries can lead to disaster-level accidents including casualties and large-scale fires. In order to effectively respond to cyber attacks targeting ICS, a multi-layered defense-in-depth strategy considering Control System Architecture is necessary. In particular, the centralized security log system integrating OT (Operational Technology) and IT (Information Technology) plays an important role in the ICS incident response plan. The paper suggests the way of implementing centralized security log system that collects security events and logs using OPC Protocol from Level 0 to Level 5 based on IEC62443 Purdue Model to integrate ICS security logs with SIEM (Security Information Event Management) operated in IT environment.

A Fundamental Study on the Development of the Fusion Education Curriculum in the Field of Architecture and Urban: based on Practitioner-oriented Survey (건축·도시 분야 융복합 교육과정 개발을 위한 기초연구 -실무자 중심의 설문조사를 기반으로-)

  • Hong, So-Hee;Yoo, Seung-Kyu;Yuh, Ok-Kyung;Kim, Jae-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3491-3498
    • /
    • 2015
  • The purpose of this study is to identify demand of fusion education in the field of architecture and urban, according to architecture and urban market changing, product changing, increasing fusion education demand. We conducted online surveys targeting construction and non construction field practitioners so that we want to identify consumer's needs about fusion education in the field of architecture and urban. Research findings can be summarized in three parts. First, practitioners need to fuse business-related majors (Frequency changing ratio : financing(716.7%), management(633.3%), planning(454.5%) etc.) and traditional majors. Second, the survey results show that 79 percent of those questioned were in favor of switching the cyber and off-line operation methods for fusion education. They require the complementary education system between off-line and cyber education based on education accessability. Third, the survey results show that 70.9 percent of those questioned were in favor of limited freestyle(Freedom of choices without required subjects). The curriculum should be arranged according to the flow of construction business process including fusion subjects.