• 제목/요약/키워드: Network Security Level

검색결과 715건 처리시간 0.024초

VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구 (A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments)

  • 최원우;안성진;정진욱
    • 융합보안논문지
    • /
    • 제5권1호
    • /
    • pp.35-43
    • /
    • 2005
  • 네트워크(IP/MAC) 주소를 관리함에 있어 네트워크의 임의의사용자가 사용자가 사용 중인 네트워크 장비 혹은 PC의 IP 주소나 네트워크 인터페이스 카드를 임의적으로 또는 악의적으로 변경하는 것을 차단할 필요성이 있다. 또한 새로운 네트워크 자원 장비의 도입 시 수많은 네트워크 자원을 임의적으로 할당하지 않고, 관리자가 관리하게 됨으로써 효율적인 자원관리 및 네트워크 문제 발생시 신속한 대처를 할 수 있어야 한다. 이것은 하위레벨에서의 네트워크 관리 및 보안을 유지할 수 있게 한다. 그러나 이러한 작업을 현재는 대부분 관리자에 의한 수작업으로 진행하고 있으며 이로 인한 관리 인력의 낭비와 업무능률의 저하는 관리효율 자체의 저하로 이어진다. 본 논문에서는 기업이나 관공서에서 사용되는 VLAN 환경에서 네트워크 주소 인증을 통해 보안성을 더욱 향상시키기 위한 방안을 제시하고자 한다.

  • PDF

Cost Optimization in SIS Model of Worm Infection

  • Kim, Jong-Hyun;Radhakrishnan, Sridhar;Jang, Jong-Soo
    • ETRI Journal
    • /
    • 제28권5호
    • /
    • pp.692-695
    • /
    • 2006
  • Recently, there has been a constant barrage of worms over the Internet. Besides threatening network security, these worms create an enormous economic burden in terms of loss of productivity not only for the victim hosts, but also for other hosts, as these worms create unnecessary network traffic. Further, measures taken to filter these worms at the router level incur additional network delays because of the extra burden placed on the routers. To develop appropriate tools for thwarting the quick spread of worms, researchers are trying to understand the behavior of worm propagation with the aid of epidemiological models. In this study, we present an optimization model that takes into account infection and treatment costs. Using this model we can determine the level of treatment to be applied for a given rate of infection spread.

  • PDF

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

BPFast: 클라우드 환경을 위한 eBPF/XDP 기반 고속 네트워크 패킷 페이로드 검사 시스템 (BPFast: An eBPF/XDP-Based High-Performance Packet Payload Inspection System for Cloud Environments)

  • 유명성;김진우;신승원;박태준
    • 정보보호학회논문지
    • /
    • 제32권2호
    • /
    • pp.213-225
    • /
    • 2022
  • 컨테이너 기술은 클라우드 환경에서 마이크로서비스의 효율적인 구축 및 운영을 가능하게 했지만, 심각한 보안 위협도 함께 가져왔다. 다수의 컨테이너가 서비스 구성을 위해 네트워크로 연결되기 때문에 공격자는 탈취한 컨테이너에서 네트워크 공격을 수행해 인접한 다른 컨테이너를 공격할 수 있다. 이러한 위협을 막기 위해 다양한 컨테이너 네트워크 보안 솔루션이 제안되었으나 성능적인 측면에서 많은 한계점을 갖고 있다. 특히 이들은 컨테이너 네트워크 보안에 필수적인 패킷 페이로드 검사 과정에서 매우 큰 네트워크 성능 저하를 일으킨다. 본 논문에서는 이러한 문제를 해결하기 위해 클라우드 환경을 위한 eBPF/XDP 기반 고속 패킷 페이로드 검사 시스템인 BPFast를 제안한다. BPFast는 별도의 유저 수준 컴포넌트 없이 커널 영역에서 컨테이너가 전송한 패킷의 헤더와 페이로드를 검사하여 컨테이너를 네트워크 공격에서부터 보호한다. 본 논문에서는 Kubernetes 환경에서 진행한 실험을 통해 BPFast 프로토타입이 Cilium, Istio 등 최신 솔루션보다 최대 7배 더 빠르게 동작할 수 있음을 증명했다.

The System for Ensuring the Financial and Economic Security of the State in an Aggressive External Environment

  • Kryshtanovych, Myroslav;Vartsaba, Vira;Kurnosenko, Larysa;Munko, Anna;Chepets, Olha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.51-56
    • /
    • 2022
  • The main purpose of the study is to analyze the features of ensuring the financial and economic security of the state in an aggressive external environment. The concept of financial and economic security should contain the priority goals and objectives of ensuring security, ways and methods to achieve them, adequately reflecting the role of finance in the socioeconomic development of the state. Its content is designed to coordinate nationwide actions in the field of security at the level of individual citizens, business entities, industries, sectors of the economy, as well as at the regional, national and international levels. The methodology includes a number of scientific and theoretical methods of analysis. Based on the results of the study, the key aspects of the system for ensuring the financial and economic security of the state in an aggressive external environment were identified.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권1호
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

무선 센서 네트워크에서 경계값 결정을 위한 재귀적 계약망 프로토콜의 적용 (Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks)

  • 서희석
    • 정보보호학회논문지
    • /
    • 제19권4호
    • /
    • pp.41-49
    • /
    • 2009
  • 유비쿼터스 센서 네트워크에서 센서 노드들은 불리한 환경에 배치되므로 공격자에 의해 훼손될 수 있다. 훼손된 노드들은 허위 감지 보고서들을 네트워크에 주입하는데 사용할 수 있는데 이러한 허위 보고서들은 허위 경보를 유발할 수 있을 뿐만 아니라, 네트워크의 제한된 에너지 자원도 고갈시킬 수 있다. 허위 보고서 여파를 위한 보안 기법들에서, 보안성을 결정하는 보안 경계 값의 선택은 매우 중요하다. 기존의 적응적 보안 기법들에서는 경계 값의 결정이 전체 노드들에게도 적용되어 에너지 자원을 불필요하게 소모하는 문제점을 가진다. 본 논문에서는 충분한 보안성을 제공하면서 에너지를 절약할 수 있는 보안 경계 값 결정을 위하여 재귀적 계약망 프로토콜 적용 기법을 제안한다. 보다 효과적으로 네트워크를 운용하기 위하여, 네트워크를 계층척으로 그룹핑하고, 각 그룹에 대하여 재귀적으로 계약 망 프로토콜이 적용된다. 이를 통해 베이스 스테이션에서 퍼지 로직을 사용하여 결정된 경계 값은 보안 공격이 발생한 지역에 국한되어 적용된다.

WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구 (A Study on the Security System of the Web Based Defense Information Service Network)

  • 신유찬;남길현
    • 한국국방경영분석학회지
    • /
    • 제28권1호
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

Using Highly Secure Data Encryption Method for Text File Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.53-60
    • /
    • 2021
  • Many standard methods are used for secret text files and secrete short messages cryptography, these methods are efficient when the text to be encrypted is small, and the efficiency will rapidly decrease when increasing the text size, also these methods sometimes have a low level of security, this level will depend on the PK length and sometimes it may be hacked. In this paper, a new method will be introduced to improve the data protection level by using a changeable secrete speech file to generate PK. Highly Secure Data Encryption (HSDE) method will be implemented and tested for data quality levels to ensure that the HSDE destroys the data in the encryption phase, and recover the original data in the decryption phase. Some standard methods of data cryptography will be implemented; comparisons will be done to justify the enhancements provided by the proposed method.

Access Control Mechanism for CouchDB

  • Ashwaq A., Al-otaibi;Reem M., Alotaibi;Nermin, Hamza
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.107-115
    • /
    • 2022
  • Recently, big data applications need another database different from the Relation database. NoSQL databases are used to save and handle massive amounts of data. NoSQL databases have many advantages over traditional databases like flexibility, efficiently processing data, scalability, and dynamic schemas. Most of the current applications are based on the web, and the size of data is in increasing. NoSQL databases are expected to be used on a more and large scale in the future. However, NoSQL suffers from many security issues, and one of them is access control. Many recent applications need Fine-Grained Access control (FGAC). The integration of the NoSQL databases with FGAC will increase their usability in various fields. It will offer customized data protection levels and enhance security in NoSQL databases. There are different NoSQL database models, and a document-based database is one type of them. In this research, we choose the CouchDB NoSQL document database and develop an access control mechanism that works at a fain-grained level. The proposed mechanism uses role-based access control of CouchDB and restricts read access to work at the document level. The experiment shows that our mechanism effectively works at the document level in CouchDB with good execution time.