• Title/Summary/Keyword: Information and Communications security

Search Result 1,069, Processing Time 0.028 seconds

A Reflectornet Based on Software Defined Network (소프트웨어 정의 네트워크 기반 리플렉터넷)

  • Park, Taejune;Lee, Seungsoo;Shin, Seoungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.397-405
    • /
    • 2014
  • Software-Defined Networking (SDN), which separates the control plane from the data plane and manages data planes in a centralized way, is now considered as a future networking technology, and many researchers and practitioners have dived into this area to devise new network applications, such new routing methods. Likewise, network security applications could be redesigned with SDN, and some pioneers have proposed several interesting network security applications with SDN. However, most approaches have just reimplemented some well-known network security applications, although SDN provides many interesting features, They didn't effectively use them. To investigate if we can use SDN in realizing sophisticated network security applications, we have designed and implemented an advanced network security application, Reflectornet, which redirects malicious or suspicious network trials to other security monitoring points (e.g., honeypot). In addition, we have tested its performance and practicability in diverse angles. Our findings and some insights will encourage other researchers to design better or intelligent network security applications with SDN.

Security vulnerabilities and their Countermeasures of the Operating Systems for Smart Phones (스마트폰 운영체제의 보안 취약성과 대책)

  • Shin, M.H.;Kwon, H.Y.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1249-1251
    • /
    • 2010
  • 최근 애플의 아이폰과 안드로이드폰이 국내에 출시됨에 따라 스마트폰에 관심이 크게 증가하고 있다. 이에 따라오는 인터넷 서비스등도 같이 크게 활성화되고 있다. 본 논문에서는 스마트폰의 보안위협에 대해서 각각의 운영체제에 따른 보안 기술을 파악하고, 서로의 보안 취약성을 비교 분석함에 따라 향후 보안 강화를 위한 방안 연구 방향을 제시하였다.

Security Analysis based on Differential Entropy m 3D Model Hashing (3D 모델 해싱의 미분 엔트로피 기반 보안성 분석)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12C
    • /
    • pp.995-1003
    • /
    • 2010
  • The content-based hashing for authentication and copy protection of image, video and 3D model has to satisfy the robustness and the security. For the security analysis of the hash value, the modelling method based on differential entropy had been presented. But this modelling can be only applied to the image hashing. This paper presents the modelling for the security analysis of the hash feature value in 3D model hashing based on differential entropy. The proposed security analysis modeling design the feature extracting methods of two types and then analyze the security of two feature values by using differential entropy modelling. In our experiment, we evaluated the security of feature extracting methods of two types and discussed about the trade-off relation of the security and the robustness of hash value.

An Efficient Anonymous Authentication and Vehicle Tracing Protocol for Secure Vehicular Communications

  • Park, Young-Shin;Jung, Chae-Duk;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.6
    • /
    • pp.865-874
    • /
    • 2010
  • Recently, Hao et al. proposed a privacy preservation protocol based on group signature scheme for secure vehicular communications to overcome a well-recognized problems of secure VANETs based on PKI. However, although efficient group signature schemes have been proposed in cryptographic literatures, group signature itself is still a rather much time consuming operation. In this paper, we propose a more efficient privacy preservation protocol than that of Hao et al. In order to design a more efficient anonymous authentication protocol, we consider a key-insulated signature scheme as our cryptographic building block. We demonstrate experimental results to confirm that the proposed protocol is more efficient than the previous scheme.

A Survey on the Security Feacures of GSM System (GSM시스템의 Security 특성에 관한 고찰)

  • 오현서;이홍섭;이대기
    • Review of KIISC
    • /
    • v.3 no.4
    • /
    • pp.57-62
    • /
    • 1993
  • GSM (Global System for Mobile Communications)은 범유럽적으로 추진되고 있는 디지탈 이동통신시스템으로서 ETSI(European Telecommunication Standards Institute)에 의해 표준화가 추진되고 있다. GSM 시스템 규격에서는 도청 또는 불법 사용에 대비하여 암호기술을 이용한 가입자 I.D 인증 및 보호, 그리고 무선구간에서의 정보 보호를 위해 암호화 기능을 갖도록 권고하고 있다. 본고에서는 GSM 이동통신망에서의Security에 관련된 기능들과 암호 알고리즘 특성에 관하여 고찰하였다.

  • PDF

Security Problems for Ubiquitous Computing Frameworks (편재 컴퓨팅 기반에서의 보안 문제)

  • Kim, Hyung-Chan;Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.895-898
    • /
    • 2002
  • 현재 활발하게 진행되고 있는 편재 컴퓨팅을 위한 기반에 대한 연구들은, 문맥-인식(Context-Aware) 어플리케이션 및 이를 지원하는 서비스 컴포넌트들을 기반으로 하는 능동 공간(Active Spaces, Smart Spaces)[1][2]을 규모 있게 구현할 수 있도록 해준다. 이러한 기반들의 근간에는 편재 컴퓨팅 디바이스들간의 통신을 위한 분산 서비스가 자리잡게 되며, 환경 내에 있는 주체들과 객체들간의 상호 작용이 이러한 분산 서비스를 통하여 이루어진다. 본 논문에서는 능동 공간을 위한 기반에 대한 설명과 이와 관련한 연구들을 소개하고 공간 내에 있는 주체와 객체들 사이에서 일어날 수 있는 보안 문제에 대한 고려사항을 살펴본다. 또한 편재 컴퓨팅 환경 기반의 보안 서비스를 위한 인증 및 접근 통제 컴포넌트를 제안한다.

  • PDF

Impacts of Success Factors of Information System on Trust of Security of Casino Information System and Job Satisfaction (정보시스템 성공요인이 카지노정보시스템의 보안신뢰와 직무만족에 미치는 영향)

  • Lee, Dae-Kun;Kim, Yong-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.81-98
    • /
    • 2015
  • This study explores performance factors of a casino information system for foreigners, empirically examines the causal relation between these factors and business performances through organizational trust and job satisfaction and suggests a plan to develop such a information system. We found that information quality positively impacted on perception of information security, but negatively on job satisfaction; system quality positively did on security reliability, but negatively on job satisfaction; service quality positively did on trust in information security and job satisfaction; lastly security reliability positively did on job satisfaction. We found that information quality, system quality and service quality would affect perceived information security and job satisfaction.

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.