• Title/Summary/Keyword: DB Vulnerability

Search Result 25, Processing Time 0.036 seconds

The design of Agents for update automatically vulnerability rule DB in Network based Intrusion Detection Systems (네트워크 기반 침입탐지 시스템의 취약성 규칙 DB를 자동적으로 갱신하는 에이전트 설계)

  • Yang, Eun-Mok;Lee, Sang-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.327-330
    • /
    • 2002
  • 네트워크와 컴퓨터시스템의 보안을 강화하기 위해서는 보안상의 취약성이 발견되는 대로 파악하고 점검해 주어야 한다. 그러나 대부분의 네트워크기반 침입탐지 시스템은 취약성을 파악하기 위해서는 국내외 관련 사이트들을 수동적인 방법으로 검색하기 때문에, 취약성 규칙을 갱신하는 것은 매우 어렵다. 본 논문에서는 에이전트가 스스로 관련 사이트에서 취약성 정보를 검색하여 새로운 취약성 정보를 추출한 후, Snort의 최적 규칙 형태로 변환하고 취약성 규칙을 갱신해주게 된다. 본 에이전트에 의해 갱신된 취약성 규칙 DB는 많은 규칙이 추가될지라도 침입을 탐지하는 속도가 떨어지지 않고, 확장성 및 이식성이 용이하다는 특징을 가진다.

  • PDF

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Design of RFID Mutual Authentication Protocol for Mobile RFID (모바일 RFID를 위한 보안 RFID 상호인증 프로토콜 설계)

  • Lee, Seung-Min;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.183-190
    • /
    • 2010
  • Recently, there is still vulnerability of attack, such as location tracking attack, replay attack, spoofing attack etc for all that is much research for Mobile RFID authentication. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Sanitization of Open-Source Based Deduplicated Filesystem (오픈 소스 중복 제거 파일시스템에서의 완전 삭제)

  • Cho, Hyeonwoong;Kim, SeulGi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1141-1149
    • /
    • 2016
  • Deduplicated filesystem can reduce usage of storage. However, it be able to recover deleted block. We studied sanitization of deduplicated filesystem, LessFS which is based on FUSE(Filesystem in USErspace). First, we show a vulnerability recover deleted data in the deduplicated filesystem. We implement sanitization of deduplicated filesystem considering the part of fingerprint DB with data blocks. It takes 60~70 times compared to without sanitization. Which means access time to fingerprint DB and overhead derived from increase of number of chunk have a critical impact on sanitization time. But in case of more than 65,536 Byte of chunksize, it is faster than normal filesystem without deduplication.

The suggestion of new big data platform for the strengthening of privacy and enabled of big data (개인정보 보안강화 및 빅데이터 활성화를 위한 새로운 빅데이터 플랫폼 제시)

  • Song, Min-Gu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.155-164
    • /
    • 2016
  • In this paper, we investigate and analyze big data platform published at home and abroad. The results had a problem with personal information security on each platform. In particular, there was a vulnerability in the encryption of personal information stored in big data representative of HBase NoSQL DB that is commonly used for big data platform. However, data encryption and decryption cause the system load. In this paper, we propose a method of encryption with HBase, encryption and decryption systems, and methods for applying the personal information management system (PMIS) for each step of the way and big data platform to reduce the load on the network to communicate. And we propose a new big data platform that reflects this. Therefore, the proposed Big Data platform will greatly contribute to the activation of Big Data used to obtain personal information security and system performance efficiency.

Policies for Improving Thermal Environment Using Vulnerability Assessment - A Case Study of Daegu, Korea - (열취약성 평가를 통한 열환경 개선 정책 제시 - 대구광역시를 사례로 -)

  • KIM, Kwon;EUM, Jeong-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.2
    • /
    • pp.1-23
    • /
    • 2018
  • This study aims to propose a way for evaluating thermal environment vulnerability associated with policy to improve thermal environment. For this purpose, a variety of indices concerning thermal vulnerability assessment and adaptation policies for climate change applied to 17 Korean cities were reviewed and examined. Finally, 15 indices associated with policies for improving thermal environment were selected. The selected indices for thermal vulnerability assessment were applied to Daegu Metropolitan City of South Korea as a case study. As results, 15 vulnerability maps based on the standardized indices were established, and a comprehensive map with four grades of thermal vulnerability were established for Daegu Metropolitan City. As results, the area with the highest rated area in the first-grade(most vulnerable to heat) was Dong-gu, followed by Dalseo-gu and Buk-gu, and the highest area ratio of the first-grade regions was Ansim-1-dong in Dong-gu. Based on the standardized indices, the causes of the thermal environment vulnerability of Ansim-1-dong were accounted for the number of basic livelihood security recipients, the number of cardiovascular disease deaths, heat index, and Earth's surface temperature. To improve the thermal environment vulnerability of Ansim-1-dong, active policy implementation is required in expansion and maintenance of heat wave shelters, establishment of database for the population with diseases susceptible to high temperature environments, expansion of shade areas and so on. This study shows the applicability of the vulnerability assessment method linked with the policies and is expected to contribute to the strategic and effective establishment of thermal environment policies in urban master district plans.

Design and Implementation of Robot for Updating Automatically Vulnerability Database (취약성 DB 자동 갱신 로봇의 설계 및 구현)

  • 서혜성;최경희;박승규;정기현;이철원;이남훈;한광택
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.145-147
    • /
    • 2002
  • 컴퓨터 시스템이나 네트워크의 보안을 강화하는 방안으로 보안상 취약성이 발견되는 보안 취약성을 점검 하는 것이 옳다. 그러나 취약성을 파악하기 위하여 국내외 관련 사이트를 수동적 방법으로 검사하는 것은 대단히 어려운 일이다. 따라서 스스로 관련 사이트의 홈 페이지를 검색하고 취약성 정보를 추출한 후 새로운 취약성 관련 정보가 발견되는 대로 이를 취약성 데이터베이스에 기록하는 이른바 취약성 자동 갱신 시스템[1]은 취약성 탐지 시스템의 핵심 기능이다. 본 논문에서 구현한 취약성 자동 갱신 로봇은 웹 페이지 자동 검색프로그램인 스파이더를 활용하여 구현되었으며, ICAT등과 같은 취약점 정보 제공 사이트들로부터 홈페이지를 검색하고 이에 수록된 정보를 수집 및 분석한 후, 취약성 데이터베이스를 자동으로 갱신한다.

  • PDF

A Study on Implementation of Vulnerability Assessment Tool on the Web (웹 환경을 이용한 보안 취약점 점검 도구 개발에 관한 연구)

  • Jang, Seung-Ju;Choi, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.82-85
    • /
    • 2007
  • 본 논문은 웹을 이용한 보안 취약점 점검 도구를 개발한다. 본 논문은 보안 취약점 점검 도구들을 이용하여 웹 상에서 사용자의 컴퓨터 시스템에 대한 점검을 통해서 결과를 보여주는 환경을 개발한다. 개발된 웹 보안 취약점 점검 도구는 쉽게 자신의 서버 컴퓨터의 취약점을 점검할 수 있다. 본 논문에서 구현된 보안 취약점 점검 도구의 기능은 포트 스캔, SQL injection 취약점 점검 기능으로 구성되어 있다. 포트 스캔 취약점 점검 도구의 기능은 열려져 있는 컴퓨터 시스템의 포트 점검을 통하여 불필요하게 열려져 있는 포트를 점검한다. 이런 점검을 통해서 보안 취약점을 사전에 차단한다. SQL injection 기능은 DB에서 SQL 구문의 취약점을 점검한다. 본 논문에서 제안하는 보안 취약점 점검 기능에 대해서 실험을 수행하였다.

  • PDF

Producing Firefighting Vulnerability Maps Using GIS - A Case Study of Dalseo-gu, Daegu - (GIS를 이용한 화재진압 취약성 지도 제작 - 대구광역시 달서구를 사례로 -)

  • KIM, Sung-Jae;CHOI, Gap-Yong;CHANG, Eun-Mi;SONG, Wan-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Fire incidents, which occur every year, cause huge damage to properties and humans. Significant time and costs have been invested in minimizing and responding to such accidents. With the recent advances in the development of spatial information, in the firefighting field, studies have been conducted to effectively bring fires under control using GIS(Geographic Information System). Most of such studies, however, focused on individual analyses of firefighting-related factors, but comprehensive research on the vulnerability factors in fire control activities, a major part of firefighting activity, has yet to be done. This study sought to pinpoint and analyze the factors that obstruct fire controlling, and to gather relevant data and create GIS-based databases. Based on such database, GIS-based overlay analysis was conducted to produce a fire control vulnerability map. The findings of this study will enable a quantitative analysis of firefighting obstruction factors to assist the personnel engaging in firefighting in rational decision-making, such as in formulating a firefighting operation plan for securing golden time.

An Empirical Study on Security Management Model for Small IT Service Business (소규모 IT 서비스 기업 비즈니스 특성을 고려한 보안 관리모델 실증연구)

  • Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.131-141
    • /
    • 2012
  • Depending on the sophistication of IT, it is increasing more and more information leaks and breaches. Accordingly the majority of companies have expand investment protection for the information. However, companies still have been exposed the vulnerability of information leakage. Especially, small IT service businesses than large corporations relatively have some limitations in the points of resources and manpower business activities. For studies on information security for small IT service companies so far, however, there have been insufficient studies considering small business scales and business characteristics of IT services. In this study, we made to design an information security management model for establishing security measures of small IT service companies which are classified SI/SM, DB, IR and IP industry that depending on how the value creation of the business. In detail, we performed an empirical analysis for small IT service business to consider business characteristics and we proposed security implementation strategies based on the analysis results.

  • PDF