• 제목/요약/키워드: Enhanced System Security

검색결과 248건 처리시간 0.024초

공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델 (Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models)

  • 김남정;공문수;이강수
    • 한국융합학회논문지
    • /
    • 제8권6호
    • /
    • pp.17-27
    • /
    • 2017
  • 최근 사이버공격이 활성화됨에 따라 이러한 많은 공격사례들이 다양한 매체를 통해 접해지고 있다. 사이버공격에 대한 보안공학이나 역공학에 대한 연구는 활발하지만, 이들을 통합하고 비용효과적인 공격공학을 통해 공격시스템을 연계하여 적용시킨 연구는 부족하다. 본 논문에서는, 보안강화형 정보시스템을 보안공학적으로 개발하고, 역공학을 통해 취약점을 식별한다. 이 취약점을 이용하여 공격공학을 통해 공격시스템을 구축하거나 리모델링하는 생명주기모델을 비교 분석하여 각 시스템의 구조 및 행동을 명세화하고, 더욱 실효성 있는 모델링을 제안한다. 또한, 기존의 모델 도구를 확장하여 공격방법 및 시나리오를 기능적, 정적, 동적과 같은 모델의 관점에서 명세하는 도형적 공격명세모델을 제시한다.

Enhanced Role-Based Access Control Administration Tool

  • Yenmunkong, Burin;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1360-1364
    • /
    • 2004
  • This paper propose an extended model for role-permission assignment based on locations called "Enhanced Role-Based Access Control (ERBAC03)". The proposed model is built upon the well-known RBAC model. Assigning permissions to role is considered too complex activity to accomplish directly. Instead we advocate breaking down this process into a number of steps. The concept of jobs and tasks is specifically introduced to facilitate role-permission assignment into a series of smaller steps. This model is suitable for any large organization that has many branches. Each branch consists of many users who work in difference roles. An administration tool has been developed to assist administrators with the administration of separation of duty requirements. It demonstrates how the specification of static requirements can be done based on "conflicting entities" paradigm. Static separation of duty requirements must be enforced in the administration environment. Finally, we illustrate how the ERBAC03 prototype is used to administer the separation of duty requirements.

  • PDF

Near-field Noise-emission Modeling for Monitoring Multimedia Operations in Mobile Devices

  • Song, Eakhwan;Choi, Jieun;Lee, Young-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제5권6호
    • /
    • pp.440-444
    • /
    • 2016
  • In this paper, an equivalent circuit model for near-field noise emission is proposed to implement a multimedia operation-monitoring system for mobile devices. The proposed model includes a magnetic field probe that captures noise emissions from multimedia components, and a transfer function for near-field noise coupling from a transmission line source to a magnetic field probe. The proposed model was empirically verified with transfer function measurements of near-field noise emissions from 10 kHz to 500 MHz. With the proposed model, a magnetic field probe was optimally designed for noise measurement on a camera module and an audio codec in a mobile device. It was demonstrated that the probe successfully captured the near-field noise emissions, depending on the operating conditions of the multimedia components, with enhanced sensitivity from a conventional reference probe.

GSM, EDGE, GPRS 시스템의 새로운 표준 암호 알고리즘 분석

  • 홍도원;류희수
    • 정보보호학회지
    • /
    • 제12권5호
    • /
    • pp.70-75
    • /
    • 2002
  • GSM(Global System for Mobile Communications)은 현재 가장 광범위하게 사용되고 있는 디지털 이동 통신의 표준이다. 또한 GSM 표준에서 데이터 전송의 최종 evolution 버전인 EDGE(Enhanced Data for GSM Evolution)와 GSM Phase2+ 개발의 일부분인 GSM 망에서 packet switching을 구현하는 기술인 GPRS(General Packet Radio Service)가 현재 유럽의 정보통신 표준화 기구인 ETSI(European Telecommunications Standards Institute)에 의해 표준화가 진행 중에 있다. GSM 시스템은 사용자 데이터의 기밀성을 보장하기 위한 암호화 알고리즘 A5를 사용하고 있지만 그 취약성이 계속 보고되고 있다. $^{[10,11]}$ 따라서 GSM의 강화된 암호화 알고리즘과 EDGE와 GPRS에서 사용자 데이터를 보호하기 위한 새로운 암호화 알고리즘의 개발이 요구되어왔다. 최근 ETSI의 SAGE(Security Algorithms Group of Experts)는 이러한 목적을 달성할 수 있는 새로운 표준 암호화 알고리즘 A5/3과 GEA3을 개발하였다. $^{[3,4,5,6]}$본 고에서는 GSM, EDGE, GPRS에서의 새로운 표준 암호화 알고리즘 A5/3과 GEA3을 분석하여 정리하고자 한다.

A Regional Certificate Revocation List Distribution Method based on the Local Vehicle Location Registration for Vehicular Communications

  • Hong, Hwi-Seung;Kim, Hyun-Gon
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.91-99
    • /
    • 2016
  • A certificate revocation list(CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipments as well as to increase the overall security and safety of vehicular networks. However, a major challenge is how to distribute CRLs efficiently. In this paper, we propose a novel Regional CRL distribution method based on the vehicle location registration locally to manage vehicle mobility. The method makes Regional CRLs based on the vehicles' location and distributes them, which can reduce CRL size and distribution time efficiently. According to the simulation results, the proposed method's signaling performance of vehicle's registration is enhanced from 22% to 37% compared to the existing Regional CRL distribution method. It's CRL distribution time is also decreased from 37% to 67% compared to the existing Full CRL distribution method.

컨테이너 화물 안전수송을 위한 관제 및 운용기술 개발에 관한 사용자 만족도 (Investigation of Users' Satisfaction of Control & Operation Technology Development for Secure Container Transportation)

  • 하창승;황석준;손보라
    • 수산해양교육연구
    • /
    • 제24권4호
    • /
    • pp.482-493
    • /
    • 2012
  • Logistics security has been enhanced to control cargo containers effectively and safely in global logistics. In response to the change, This study describes the system now being developed that tracks container position, watches cargo security status and gets informations of surrounding until the cargos arrived at its destination. We examine completion and satisfaction of the product for prospective users. For this, considering earlier studies about customer trust, satisfaction, service quality and purchase decision, we analyse an effect among the variables empirically. As a result, when the program is released, we examine customers' satisfaction and purchase decision for the informations to be offered from the program.

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

Enhanced Security Framework for E-Health Systems using Blockchain

  • Kubendiran, Mohan;Singh, Satyapal;Sangaiah, Arun Kumar
    • Journal of Information Processing Systems
    • /
    • 제15권2호
    • /
    • pp.239-250
    • /
    • 2019
  • An individual's health data is very sensitive and private. Such data are usually stored on a private or community owned cloud, where access is not restricted to the owners of that cloud. Anyone within the cloud can access this data. This data may not be read only and multiple parties can make to it. Thus, any unauthorized modification of health-related data will lead to incorrect diagnosis and mistreatment. However, we cannot restrict semipublic access to this data. Existing security mechanisms in e-health systems are competent in dealing with the issues associated with these systems but only up to a certain extent. The indigenous technologies need to be complemented with current and future technologies. We have put forward a method to complement such technologies by incorporating the concept of blockchain to ensure the integrity of data as well as its provenance.

네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법 (A DATA SYSTEM AND ENCRYPTION METHOD BASED ON KEY EXCHANGE CRYPTOGRAPHIC PROTOCOL USING ENHANCED SECURITY FUNCTION IN NETWORK LAYER)

  • 박재경
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2024년도 제69차 동계학술대회논문집 32권1호
    • /
    • pp.425-426
    • /
    • 2024
  • 본 논문은 표준 TCP/IP 네트워크의 특징 및 암호 프로토콜의 특징을 결합하여 TCP Handshake 단계에서 암호 키 교환을 수행하고, 디바이스의 고유한 시그니처 정보를 사용하여, 암호 키 생성 데이터로 사용하여, 보안성을 강화하는 것을 특징 으로 하는 네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법에 관한 것으로 개발된 프로토콜을 키 교환 프로토콜로 대체할 경우보다 안전한 보안 프로토콜을 제공할 수 있다.

  • PDF

RFID 시스템의 개선된 인증 프로토콜 (Enhanced Authentication Protocol of RFID System)

  • 이상렬
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권6호
    • /
    • pp.193-200
    • /
    • 2007
  • 기존의 바코드(Bar code) 시스템에 비하여 RFID(Radio Frequency Identification) 시스템은 저장능력이 뛰어나고 사물에 비접촉성을 갖는 장점이 있다. 그러나 RF(Radio Frequency) 신호를 이용하여 통신을 하기 때문에 전송되는 정보를 누구나 손쉽게 수신할 수 있어 시스템 보안과 개인의 프라이버시를 침해하는 문제점을 갖고 있다. 본 논문에서는 도청, 재전송, 스푸핑(Spoofing) 그리고 위치추적과 같은 공격에 안전하며 리더(Reader)와 태그(Tag) 간에 상호 인증을 효율적으로 할 수 있는 RFID 시스템을 제안한다. 제안한 시스템은 앞으로 유비쿼터스(Ubiquitous) 환경에서 다양한 분야에 활용될 수 있을 것이다.

  • PDF