• Title/Summary/Keyword: L2 보안

Search Result 61, Processing Time 0.03 seconds

Algebraic Attacks on Summation Generators (Summation Generator에 대한 대수적 공격)

  • Lee, Dong-Hoon;Kim, Jae-Heon;Han, Jae-Woo;Hong, Jin;Moon, Duk-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.71-77
    • /
    • 2004
  • It was proved that Hen is an algebraic ,elation of degree [n(l+1]/2] for an (n, 1)-combine. which consists of n LFSRs and l memory bits. For the summation generator with $2^k$ LFSRs which uses k memory bits, we show that there is a non-trivial relation of degree at most $2^k$ using k+1 consecutive outputs. In general, for the summation generator with n LFSRs, we can construct a non-trivial algebraic relation of degree at most 2$^{{2^{[${log}_2$}n]}}$ using [${log}_2$+1 consecutive outputs.

Enhanced Security Network Storage System based L4 (L4 기반 네트워크 스토리지 보안 강화방법)

  • Park, Woo-Ram;Na, Yun-Ju;Ryu, Jun-Kil;Park, Chan-Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.393-398
    • /
    • 2007
  • 데이터의 양이 급격히 커지면서, 그에 따라 요구되는 스토리지의 확장 비용 및 관리의 어려움을 해결하기 위하여 네트워크 스토리지에 대한 관심이 증대되고 있다. 네트워크 스토리지는 다수의 사용자가 접근하여 하기 때문에 보안에 대한 심각한 고려가 필요하다. 보안을 강화하기 위하여 페어 키를 이용한 인증 방식을 사용하고 있는데, 이러한 소프트웨어적인 보안 방식은 시스템 보안의 결함 혹은 취약성에 의하여 키의 외부 유출이 가능하다 [11]. 본 연구에서는 L4 마이크로커널[1]과 하드웨어적 보안 방식인 TPM (Trusted Platform Module)[2]을 사용하여 네트워크 스토리지 보안을 강화 시 방법을 제안하고자 한다. 본 연구를 이용할 경우 authenticated boot 기법[3]을 이용하여 네트워크 스토리지에서 동작할 이미지를 검증하고, 하드웨어적으로 암호화 키 값을 관리함으로써 데이터 패킷의 전송 과정에서 발생할 수 있는 소프트웨어적인 보안 방식의 취약점을 보완할 수 있다.

  • PDF

Proposal for Designing and Building a Special Purpose Web Server with Enhanced Security (보안이 강화된 특수목적용 웹서버 설계 및 구축 제안)

  • Hong, Seong-Rak;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.71-79
    • /
    • 2022
  • Currently, even if control and mock hacking are performed for the security of web servers, vulnerabilities continue to occur and be hacked. To solve this problem, we have developed a secure web server that can control all web communication using sockets between L4 and L5. And when giving HTTP responses, we proposed a method of combining files and headers in advance. As a result, both security and speed could be improved. Therefore, in this paper, we proposed the reason why vulnerabilities occur even if control and mock hacking occur, a solution to it, and a security web server development method that can maintain security up to DB.

A Study on the Design of the Security Gateway for Role-based Dynamic Security Rule-Set (역할 기반 변동 보안 룰셋 적용을 위한 네트워크 보안 게이트웨이 설계에 관한 연구)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.719-726
    • /
    • 2008
  • In this thesis investigate the security gateway that manage authorization for user access dynamically by recognizing automatically and comparison & distinction between database and User-information while a terminal unit(PC) trying to access to the network of subnet. Also, it present User-interfaced authorization allowance role model, so administrator can assign united access control between network level(L2) and application level(L7) in relation to system construction.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

Analysis of Secure Remote Access to Virtual Private Home Network with L2TP Tunneling methods (L2TP tunneling 방법을 기반으로 한 가설 사설망의 보안 원격 접속분석)

  • Basukala, Roja Kiran;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2188-2194
    • /
    • 2008
  • Home network is the connection and communication of several electronic and electrical devices at hone with the integration of several technologies like Ethernet, wireless, phone line and power-line at the residential gateway to the internet. This internet based home network can be accessed from any part of the world through any device by any poison via internet. Since home network is developed for comfortable and safe life of home users, the information flow to/from home network needs to be private. Hence the remote access of the home network must be secured. This paper analyses two secure tunneling methods, voluntary and compulsory for L2TP(Layer Two Tunneling Protocol) based VPN(Virtual Private Network) for secure remote access of the home network.

Interface of EDI System and VPN with IPSec and L2TP for Speed efficiency and Security Level (전송효율과 보안수준을 고려한 EDI 시스템과 VPN의 IPSec와 L2TP의 연동)

  • Choi Byung-Hun;Lee Gun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.1-10
    • /
    • 2005
  • Electronic Data Interchange(EDI) between a number of companies goes on increasing on the internet. Although a conventional EDI system reduces business process efforts, time, resources, etc., important information is easily and frequently exposed by well trained hackers and crackers, which inflict a severe loss on the company and even put the company under a crisis. This study integrates the conventional EDI system and Virtual Private Tet(VPN) to maximize an overall efficiency of speed and security in data transferring by the level of importance. The EDI system interfaced to IPSec and L2TP of VPN allows us to select two modes : the one focuses on a high speed with a low or a medium level security or the other does on a high level security with a low or a medium level speed. Both the company and the end users get a lot of tangible and intangible advantages by integrating the EDI system and VPN.

A Study on Effects of the Artificial Structures by the Blast Pressure Simulation (폭풍압 시뮬레이션에 의한 지형지물의 영향에 관한 연구)

  • Kang, Dae-Woo;Lee, Sin;Jung, Byung-Ho;Sim, Dong-Soo
    • Explosives and Blasting
    • /
    • v.28 no.2
    • /
    • pp.17-27
    • /
    • 2010
  • With the development of modern society, there have been great technical advances, and the meaning, shape, and type of preservation objects have also become diverse. However, the legislation of executives established in 1961 has nt yet been revised realistically. Thatses administrative problems related to the usge and storage of explosives. In this study, the cases of civilian's question and thought that had been submitted to the government agency were surveyed. In order to analyze the effects of preservation object, ENPro3.1, which is a simulation program to analyze the sound pressure, was used to estimate the blast pressure when a magazine containing preservation objects exploded. With the damage due to the blast pressure, the problem with the safe distance depending on the preservation object levels was investigated. From the investigation, the blast pressures in the two cases with the artificial structures at the real distance 309 m and without the artificial structures at the legitimate standard space distance 440 m, were found to be 123 dB(L) and 138 dB(L), respectively. That means the influence of blast pressure in shorter distance with artificial structures is 15 dB(L) lower than longer distance without them. Therefore, it is recommended to apply the preservation distance based on the engineering analysis with a consideration of surrounding environment.

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

The Effect of Airport Security Screeners' New Technology Acceptance to the Innovation and Job Satisfaction of Airport Security (공항보안검색요원의 신기술 수용성이 공항보안업무의 직무만족도와 업무혁신성에 미치는 영향)

  • Jeon, Jong-Duk;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.394-403
    • /
    • 2019
  • This research focuses on the perception of security screeners using a full body scanner at airport which had been newly introduced to terminal 2 of Incheon Int'l airport. To accomplish the purpose of research, this paper used UTAUT (Unified Theory of Acceptance and Use of Technology) model. Through an empirical analysis, it was proven the factors consisting of technological acceptance and how those factors affect both organizational innovation at airport and job satisfaction of security screeners. According to an empirical analysis, it was found out all the factors of technological acceptance have a significant effect on both organizational innovation and job satisfaction. However, only the effort expectation was shown to have a significant negative effect on the two dependant variables contrary to the other variables (performance expectation, behavioral intention and self efficacy. It was also proven organizational innovation had a moderating effect between technological acceptance and job satisfaction. Such results suggested organizational innovation at airport security division is necessary to enhance job satisfaction using a newly introduced full body scanner.