• Title/Summary/Keyword: Multi-level security

Search Result 218, Processing Time 0.021 seconds

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

Rank-level Fusion Method That Improves Recognition Rate by Using Correlation Coefficient (상관계수를 이용하여 인식률을 향상시킨 rank-level fusion 방법)

  • Ahn, Jung-ho;Jeong, Jae Yeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1007-1017
    • /
    • 2019
  • Currently, most biometrics system authenticates users by using single biometric information. This method has many problems such as noise problem, sensitivity to data, spoofing, a limitation of recognition rate. One method to solve this problems is to use multi biometric information. The multi biometric authentication system performs information fusion for each biometric information to generate new information, and then uses the new information to authenticate the user. Among information fusion methods, a score-level fusion method is widely used. However, there is a problem that a normalization operation is required, and even if data is same, the recognition rate varies depending on the normalization method. A rank-level fusion method that does not require normalization is proposed. However, a existing rank-level fusion methods have lower recognition rate than score-level fusion methods. To solve this problem, we propose a rank-level fusion method with higher recognition rate than a score-level fusion method using correlation coefficient. The experiment compares recognition rate of a existing rank-level fusion methods with the recognition rate of proposed method using iris information(CASIA V3) and face information(FERET V1). We also compare with score-level fusion methods. As a result, the recognition rate improve from about 0.3% to 3.3%.

A Polyinstantiation Method for Spatial Objects with Several Aspatial Information and Different Security Levels (비공간 정보와 보안 등급을 갖는 공간 객체를 위한 다중인스턴스 기법)

  • 오영환;전영섭;조숙경;배해영
    • Journal of KIISE:Databases
    • /
    • v.30 no.6
    • /
    • pp.585-592
    • /
    • 2003
  • In the spatial database systems, it is necessary to manage spatial objects that have two or more aspatial information with different security levels on the same layer. If we adapt the polyinstantiation concept of relational database system for these spatial objects, it is difficult to process the representation problem of spatial objects and to solve the security problem that is service denial and information flow by access of subject that has a different security level. To address these problems, we propose a polyinstantiation method for security management of spatial objects in this paper. The proposed method manages secure spatial database system efficiently by creating spatial objects according to user's security level through security-level-conversion-step and polyinstantiation-generation-step with multi-level security policy. Also, in case of user who has a different security level requires secure operations, we create polyinstance for spatial object to solve problems of service denial and information flow.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

A Study on the Multi-Level Security for Scalable Multicasting (확장 멀티캐스트에서 다중레벨 보안에 관한 연구)

  • 박상철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2000
  • 멀티캐스트 응용들이 많아지면서 보안 멀티캐스트 통신은 점차로 중요하게 되었다 그러나 멀티캐스트는 대부분의 네트워크 보안 프로토콜들의 점대점 유니캐스트의 개념과는 많이 다르다. 기본적으로 안전한 멀티캐스트 통신은 안전한 유니캐스트 통신과 다르다. 멀티레벨 구조의 강제적 접근 제어는 주체에 대해 의미를 부여하여 접근을 통제하는 방식인 보안 레벨에 기초한 접근 제어 보안을 제안할 것이다 본 논문에서 유니캐스트와 멀티캐스트 보안의 차이점을 조사하고 멀티캐스트 상에서 멀티레벨 보안을 제안할 것이다 본문에서 제안하는 구조에 기반하는 프로토콜은 보안 멀티캐스트 통신이나 그룹 키 관리 서비스를 제공 등 다양한 보안 목적들을 위해 쓰일 수 있고 멀티레벨 보안을 통한 접근제어로 등급화 된 보안 서비스를 제공할 수 있다.

A Multiclass Classification of the Security Severity Level of Multi-Source Event Log Based on Natural Language Processing (자연어 처리 기반 멀티 소스 이벤트 로그의 보안 심각도 다중 클래스 분류)

  • Seo, Yangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1009-1017
    • /
    • 2022
  • Log data has been used as a basis in understanding and deciding the main functions and state of information systems. It has also been used as an important input for the various applications in cybersecurity. It is an essential part to get necessary information from log data, to make a decision with the information, and to take a suitable countermeasure according to the information for protecting and operating systems in stability and reliability, but due to the explosive increase of various types and amounts of log, it is quite challenging to effectively and efficiently deal with the problem using existing tools. Therefore, this study has suggested a multiclass classification of the security severity level of multi-source event log using machine learning based on natural language processing. The experimental results with the training and test samples of 472,972 show that our approach has archived the accuracy of 99.59%.

A Cooperative Multiagent System for Enhancing Smart Grid Performance

  • Mohammad A Obeidat
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.164-172
    • /
    • 2023
  • Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.

ML/RBBAC (Multi-Level/Role-Behavior Based Access Control) (ML/RBBAC (Multi-Level/Role-Behavior Based Access Control) 접근통제)

  • Shin, Wook;Lee, Dong-Ik
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.396-400
    • /
    • 2001
  • 본 논문은 현재 안전한 운영체제 개발에 사용되고 있는 강제 접근통제(MAC)와 역할행위 기반 접근통제(RBBAC)의 혼합 기법인 다중 등급 역할 행위 기반 접근통제 (ML/RBBAC)를 제안하고, 접근통제 모델을 기술한다. ML/RBBAC은 안전한 운영체제가 MAC과 RBBAC을 동시 지원하기 위한 최적의 방법이며, 기존 MAC의 단점인 지나치게 엄격한 정보흐름 통제 및 보안 관리 부담의 증대 문제를 해결한다.

  • PDF

Enhanced Reference Monitor on MLS(Multi Level Security) Policy (다중등급보안정책(MLS)에서 개선된 참조모니터)

  • Lee, Seung-Min;Lee, Young-Gu;Lee, Sang-Hun;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1131-1134
    • /
    • 2005
  • 정보보호를 위해 네트워크 수준에서의 침입탐지 시스템이나 방화벽 시스템을 사용한다. 그러나 외부에서의 공격을 네트워크 수준에서 미처 대비하지 못하였을 경우에는 각 호스트들은 무방비 상태이므로 공격받을 경우 침형적인 피해를 입을 수 있다. 이러한 피해를 막기 위해서는 운영체제단에서의 대비가 필요하다. 이에 본 논문에서는 보안 운영체제 연구에 대한 동향을 살펴보고, MLS(Multi Level Security)정책을 사용하는 보안 운영체제에서 보안등급이 서로 다른 주체와 객체의 긴급접근이 이루어져야 할 때, 기존 MLS의 참조모니터(Reference Monitor)를 개선시켜 접근을 해결하는 방안을 제시했다.

  • PDF

Implementation of A Network-based Multi-Level Security System using LDAP (LDAP을 이용한 네트워크 기반의 다중레벨보안 시스템의 구현)

  • 이병주;이승형;홍순좌;박중길
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.298-301
    • /
    • 2002
  • 다중레벨보안은 하나의 시스템 내에 여러 보안등급의 데이터와 사용자를 수용하여 효율성을 높이기 위한 것이다. 본 논문에서는 네트워크를 통해서 여러 보안등급의 데이터가 저장된 디렉토리 서버에 다중레벨의 사용자들의 접근을 통제하기위한 방안을 제시하고 구현한다. 보안과 무결성 모두를 보장해주기 위해서 보안 모델과 무결성 모델을 결합한 새로운 형태의 모델을 정의한다. 이 모델을 OpenLDAP의 ACL(Access Control List)을 사용하여 구현하고 사용자의 등급에 따른 시스템의 접근통제를 가능하게 한다.

  • PDF