• Title/Summary/Keyword: Data base security

Search Result 198, Processing Time 0.024 seconds

The Method of Analyzing Firewall Log Data using MapReduce based on NoSQL (NoSQL기반의 MapReduce를 이용한 방화벽 로그 분석 기법)

  • Choi, Bomin;Kong, Jong-Hwan;Hong, Sung-Sam;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.667-677
    • /
    • 2013
  • As the firewall is a typical network security equipment, it is usually installed at most of internal/external networks and makes many packet data in/out. So analyzing the its logs stored in it can provide important and fundamental data on the network security research. However, along with development of communications technology, the speed of internet network is improved and then the amount of log data is becoming 'Massive Data' or 'BigData'. In this trend, there are limits to analyze log data using the traditional database model RDBMS. In this paper, through our Method of Analyzing Firewall log data using MapReduce based on NoSQL, we have discovered that the introducing NoSQL data base model can more effectively analyze the massive log data than the traditional one. We have demonstrated execellent performance of the NoSQL by comparing the performance of data processing with existing RDBMS. Also the proposed method is evaluated by experiments that detect the three attack patterns and shown that it is highly effective.

Software Security Supplementation Guide Line Based on ISO 27001 for the SP Certified Organization (SP 인증 조직의 소프트웨어 보안 향상을 위한 ISO 27001 적용방안 연구)

  • Yoon, Eun-Ji;Park, Young B.
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.11
    • /
    • pp.465-470
    • /
    • 2014
  • The SP quality assessments from national IT industry promotion agency of Korea(NIPA) assesses ability of software development process. And the SP quality assessments is getting popular over the nation. But, in the SP quality assessments, there is no concern about security attribute. In this paper new secure process base on ISO 27001 is proposed for the organization that is already passed SP quality assessments. This process can detect security threatening factors and gives chance to protect those factors. Furthermore, since detected security weaknesses can be used as a measurement, the system can be managed in aspect to security attribute.

Bit-Level Systolic Array for Modular Multiplication (모듈러 곱셈연산을 위한 비트레벨 시스토릭 어레이)

  • 최성욱
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.163-172
    • /
    • 1995
  • In this paper, the bit-level 1-dimensionl systolic array for modular multiplication are designed. First of all, the parallel algorithms and data dependence graphs from Walter's Iwamura's methods based on Montgomery Algorithm for modular multiplication are derived and compared. Since Walter's method has the smaller computational index points in data dependence graph than Iwamura's, it is selected as the base algorithm. By the systematic procedure for systolic array design, four 1-dimensional systolic arrays ale obtained and then are evaluated by various criteria. Modifying the array derived from 〔0,1〕 projection direction by adding a control logic and serializing the communication paths of data A, optimal 1-dimensional systolic array is designed. It has constant I/O channels for modular expandable and is good for fault tolerance due to unidirectional paths. And so, it is suitable for RSA Cryptosystem which deals with the large size and many consecutive message blocks.

  • PDF

Secure Fingerprint Identification System based on Optical Encryption (광 암호화를 이용한 안전한 지문 인식 시스템)

  • 한종욱;김춘수;박광호;김은수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF

Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours (비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구)

  • 유은진;전문석
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

Web Based Tele-Medicine System including Security Scheme (웹기반 원격진료시스템에서 암호화인증방식이 적용된 회원관리기법)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.19-27
    • /
    • 2005
  • This paper presents the content regarding electronic medical examination chart and data processing for efficient medical examination and fast treatment by realizing remote medical examination system of mutual conversation type among 3 parties(patient, doctor, pharmacist) on internet base, and establishment of database enabled system integration for efficient data processing in both on-line and off-line mode by interconnecting ASP and SQL on IIS 4.0 web server, consultation between patient and doctor, medical examination on off-line mode, transmission of prescription sheet to the pharmacist designated by patient, preparation of medicine, semieternal storage of medical examination data owing to storage and check of medical examination data, more accurate medical examination and prescription using this medical examination data by patient and doctor, and so on. And, data processing between doctor and pharmacist is differently performed based on class such as general member and charge member, and service access right pursuant to this is endowed, so that certification of each member must follow by all means.

  • PDF

제 3 자 사용자 정책을 적용한 ACL 설계

  • Lee, Kyeong-Hyo;Oh, Byeong-Kyun;Lee, Sang-Gug
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.23-26
    • /
    • 2008
  • 본 논문은 Web 환경에서의 사용자의 권한을 검증하고 권한에 대한 이중적인 접근제어 서비스를 제공하는 역할기반의 WAC 시스템의 블럭 설계서를 제안한다. WAC 시스템은 User Interface Block, Access Control Block, Cipher module Block, DataBase로 구성 되며, WAC 시스템의 기능분류모델을 이용한 Block의 세부사항과 WAC 시스템 기본 Bock(Access Control Bock)의 기본 기능 설계 및 사용자 접근제어 기능 설계, DES 기반의 암호 Bock 기능 설계, 인터페이스 설계 대한 WAC 시스템의 전체적인 Block 설계 에 대하여 기술한다.

  • PDF

Modeling and Simulation of Security System on Policy-based Framework (정책 기반의 프레임워크에서의 보안 시스템 모델링 및 시뮬레이션)

  • 이원영;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.127-132
    • /
    • 2003
  • 현재의 네트워크는 다양한 서버, 라우터, 스위치 등 여러 장치들로 구성된 복잡한 구조를 가지고 있다. 정책 기반의 프레임워크는 복잡한 네트워크를 단순화하고 자동화하여 관리할 수 있는 도구를 제공한다. 본 논문에서는 여러 보안 시스템 모델들이 사용할 수 있는 취약성 정보들을 집약시킴으로써 보안 시스템간의 정보 공유를 쉽게 할 수 있는 SVDB (Simulation based Vulnerability Data Base)를 구축하였다. 또한 SVDB를 활용하여 보안 규칙을 유도하고 유도된 보안 규칙을 정책 기반 프레임워크에 적용할 수 있는 환경을 구성하였다. 정책 기반의 프레임워크에서 취약점 데이터베이스를 이용한 정책 유도와 적용을 검증하기 위해 서비스 거부 공격 (Denial of Service)과 Probing 공격을 사용하여 시뮬레이션을 수행하였다. 정책 기반의 프레임워크에서 보안 시뮬레이션을 수행함으로써 적용될 보안 정책이 기대되는 대로 동작하는지 검증할 수 있는 환경을 제공할 수 있을 것이다.

  • PDF

Development of Decision System for Determining Priorities of Re-construction Reservoirs (농업용저수지 재개발을 위한 우선순위 선정시스템 개발)

  • Lee, Gwang-Ya;Kim, Hae-Do;Jeong, Gwang-Geun
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2005.10a
    • /
    • pp.26-31
    • /
    • 2005
  • In national prospective, the needs to develop water resources has been increased due to water shortage from diverse use of water resources in agricultural areas. Existing agricultural water demand, which has mainly been limited to the use of farming, are now expanding to diverse water uses such as supporting daily lives, diluting environmental pollution as well as industrial use for agricultural complex currently under construction in agricultural region. In this situation, for the sake of effective procurement of water resources and supply method, it is definitely required to enhance the effectiveness of budget investment and project proceedings through integrated re-development which links projects to strengthen existing dams, reservoirs and hydraulic facilities. The major scopes of this research includes developing different types of system such as selecting potential sites to re-construct reservoirs including generating base maps and thematic maps, data collection regarding water demands and reservoir status; analyzing reservoir data; estimating developable capacity and index calculation; and forecasting inundated areas. In addition, this study provides other products such as developing output generation system which can support wide use of data built and analyzed; database generation for better data management; data analysis including selection, extraction, indexation, and calculation of base items through standardization; data security system prohibiting exterior proliferation and malicious manufacturing of data.

  • PDF