• 제목/요약/키워드: Multi-level security

Search Result 219, Processing Time 0.022 seconds

Multi-level Protection Infrastructure for Virus Protection (다단계 바이러스 차단 구조 연구)

  • 노시춘;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.187-198
    • /
    • 2004
  • Virus protection infrastructure management is network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Unproved virus protection infrastructure fitters unnecessary mail at the gateway stage to reduce the toad on server. As a result, number of transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

Multi-level Certification System Using Arduino (아두이노를 이용한 다중 레벨 인증 시스템)

  • Yoo, Ho-weon;Kim, Yong-seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.87-88
    • /
    • 2015
  • 최근 IT기술의 발전과 더불어 보안의 중요성이 부각되면서 Pin Number, Password, Pattern Recognition 등 인증 방식에 대한 연구가 진행되고 있지만 위와 같은 One-factor 인증 시스템에는 "Shoulder Attack"과 같은 사용자 레벨에서의 보안공격에 취약하다. 위와 같은 문제점을 해결하기 위하여 'Google E-mail' 등 일부 강화된 보안이 필요한 시스템에서는 추가 모듈을 이용한 Two-factor 인증 시스템을 적용하여 보안을 제공하고 있지만 사용상의 번거로움과 복잡성으로 인해 고도의 보안 기술의 적용을 받지 못하는 등 많은 제약사항이 남아있다. 본 논문에서는 위 와 같은 One-factor 시스템의 취약점을 파악하여 그에 따라 보안 인증 절차를 향상시키기 위해 암호화와 인증 방법으로 지문인식을 사용하여 Multi-level 인증 시스템을 제안한다. 본 시스템은 Send 디비이스를 구현한 아두이노를 통해 M2M 서비스를 수행하며, 암호와 지문 정보를 아두이노 디바이스에 저장하여 두 가지의 신뢰적인 정보를 바탕으로 인증하는 시스템이다. 아두이노를 이용하여 디바이스 분리를 통한 사용자 레벨에서의 보안을 강하고 지문인식을 통해 불편함과 복잡성을 간소화하였다.

  • PDF

Tightly Secure Transaction Management in Multi-Level Secure Database Management Systems (다단계 보안 데이타베이스 관리시스템에서의 고수준 보안성을 제공하는 거래관리)

  • 손용락;문송천
    • Review of KIISC
    • /
    • v.5 no.3
    • /
    • pp.38-48
    • /
    • 1995
  • 다단계 보안 데이타베이스 관리체계(Multi-Level Secure Database Management System: MLS/DBMS)에서 모든 거래와 데이타는 각각 유일한 보안성을 가지고 있다 MLS/DBMS 상에서 동시수행중인 거래들은 공유 데이타를 접근하는 과정에서 충돌가능성을 항시 지니고 있다. 이러한 충돌을 해결하는 과정에서 만약 낮은 보안등급을 가지는 거래가 지연되는 현상이 발생하였을 경우, 높은 보안등급의 정보가 낮은 보안등급의 거래로 유출되어 결과적으로 보안정책을 위반하게된다 이러한 종류의 통신경로를 비밀경로라고 한다. 비밀경보 문제를 해결하기 위한 몇몇 종류의 거래관리 기법들이 제시되었다. 이들 기법들은 비록 비밀경로 문제를 해결하였지만, 불행하게도 이들은 보안의 또 다른 측면인 무결성에 대한 고려를 간과하고 있다. 본 논문에서 제안하는 고수준 보안 거래 관리기는 동시에 수행중인 거래들을 스케줄링하는 과정에서 정보의 기밀성 유지를 무결성의 손실없이 이루고 있다. 기밀성을 위하여 고수준 보안 거래관리기는 비완료된 데이타의 은닉에 방법적 기반을 두고 있다. 또한, 무결성을 얻기 위하여 데이타의 적절성을 판단하는 과정에서 데이타의 신뢰성을 최신성과 함께 고려하고 있다.

  • PDF

Arduino Multi-Authentication System using NFC and OTP (NFC와 OPT를 활용한 아두이노 다중 인증 시스템)

  • Lee, BeomJin;Kim, JuSeong;Yang, GiYeol;Yang, WooBeom;Choi, Changwon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.25-30
    • /
    • 2016
  • The issued problem in the existed NFC authentication system is the security problem caused by the fixed key and the inconvenience occurred by the extra NFC tag. This paper aims to enhance the security level through OTP system added up the key generation mechanism and the convenience level by the integrated Android App. This proposed authentication system on Arduino will be widely applied to IoT security and will be used on diverse applications.

Characteristics of Employment and Factors Affecting on the Employment of Elderly with Disabilities -A Comparison of One-Person and Multi-Person Households (장애노인 고용특성 및 취업 영향요인 -1인가구와 다인가구 비교)

  • Park, Ju-Young
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.387-393
    • /
    • 2019
  • This study aimed to analyze characteristics of employment and factors affecting of employment of elderly with disabilities. Data were analyzed using chi-square tests, regression analyses according to the Panel Survey of Employment for the Disabled in Korea. Participants were 452 elderly with disabilities. First, The employment group showed significantly mild disorder, higher health status, absent of chronic disorder, licenses, absent of public employment service, married, absent of basic living security recipient, higher level of household income compared to the unemployed group. Second, Factors affecting employment of elderly with disabilities included public employment service, level of household income. And multi-person factors were acceptance of disabilities and one-person factors were basic living security recipient. Base on these results, suggested for obtaining job of elderly with disabilities.

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

The Emerging security initiatives and forecasting future social and natural environment changes (신흥안보 창발과 미래 사회 및 자연환경 변화예측)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.327-331
    • /
    • 2020
  • In that this study is a subject and character of risk, emerging security covers non-military areas in addition to traditional military security: environmental security, human security, resource security, and cyber security. The rise of these risks is not only changing the phenomenon of the new expansion of security areas, but also the expansion of the number and scope of security entities and the aspect of security world politics. These risks are transnational security issues at the global level in terms of their nature and extent of the damage, as well as multi-layered ones that affect local and personal security issues at the regional and national levels. In addition to national actors, non-state actors such as international organizations, multinational corporations, and global civil society, and furthermore, technology and social systems themselves are causing risks. Therefore, to solve the new security problem, it is necessary to establish a middle-level and complex governance mechanism that is sought at the regional and global levels beyond the fragmented dimension of the occurrence of new security issues that have been overlooked in the existing frame of perception, and to predict and find ways to respond to new security paradigms that have been identified in a broader sense.

An ICI Canceling 5G System Receiver for 500km/h Linear Motor Car

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.27-34
    • /
    • 2023
  • This paper proposed an Inter-Carrier-Interference (ICI) Canceling Orthogonal Frequency Division Multiplexing (OFDM) receiver for 5G mobile system to support 500 km/h linear motor high speed terrestrial transportation service. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceler is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number 𝒏 to receiver sub-carrier number 𝒍 is generated. In case of 𝒏≠𝒍, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 2 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, for modulation schemes below 16QAM, we confirmed that the difference between BER in a 2 path reverse Doppler shift environment and stationary environment at a moving speed of 500 km/h was very small when the number of taps in the multi-tap equalizer was set to 31 taps or more. We also confirmed that the BER performance in high-speed mobile communications for multi-level modulation schemes above 64QAM is dramatically improved by the use of a multi-tap equalizer.

A Study on the Development of DevSecOps through the Combination of Open Source Vulnerability Scanning Tools and the Design of Security Metrics (오픈소스 취약점 점검 도구 및 종합 보안 메트릭 설계를 통한 DevSecOps 구축방안 연구)

  • Yeonghae Choi;Hyeongjun Noh;Seongyun Cho;Hanseong Kang;Dongwan Kim;Suhyun Park;Minjae Cho;Juhyung Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.699-707
    • /
    • 2023
  • DevSecOps is a concept that adds security procedures to the operational procedures of DevOps to respond to the short development and operation cycle. Multi-step vulnerability scanning process should be considered to provide reliable security while supporting rapid development and deployment cycle in DevSecOps. Many open-source vulnerability scanning tools available can be used for each stage of scanning, but there are difficulties in evaluating the security level and identifying the importance of information in integrated operation due to the various functions supported by the tools and different security results. This paper proposes an integrated security metric design plan for scurity results and the combination of open-source scanning tools that can be used in security stage when building the open-source based DevSecOps system.

GDPR Compliant Blockchain Based Access Control(GCBAC) (GDPR 준수 가능한 블록체인 기반 접근제어 시스템)

  • Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.981-997
    • /
    • 2020
  • Blockchain technology can provide a high level security based on a decentralized distributed ledger and consensus-based structure. In order to increase the utilization of blockchain technology, it is necessary to find a way to use it in fields that require personal data processing such as health care and e-commerce. To achieve this goal, the blockchain based system should be able to comply with data privacy regulations represented by European Union(EU)'s GDPR(General Data Protection Regulation). However, because of the properties of the blockchain like the immutability and decentralized recorded data, it is difficult to technically implement the requirements of the existing privacy regulations on the blockchain. In this paper, we propose a multi-chain based access control system that can guarantee the rights of the personal data subject required by GDPR by utilizing Chameleon Hash and Attribute Based Encryption (ABE). Finally, we will show through security analysis that our system can handle personal data while maintaining confidentiality and integrity.