• Title/Summary/Keyword: Network Security Management

Search Result 1,366, Processing Time 0.027 seconds

The Design and Implementation of MCCL(Mark-Compact-Compress-Lazy Allocate) Garbage Collection for effective Heap Memory Management in KVM (KVM의 효율적인 힙 메모리 관리를 위한 MCCL 가비지 콜렉션의 설계 및 구현)

  • 최인범;이재규;조문행;남상훈;이철훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.682-684
    • /
    • 2004
  • IT 산업이 발전하고, 제한된 리소스를 탑재한 소형 기기들의 사용이 증가함에 따라, 이러한 소형 기기들의 성능을 극대화하고 안정된 서비스를 제공하기 위한 다양한 핵심 소프트웨어 플랫폼들이 제안되고 있다. 자바는 플랫폼 독립성(Platform Independency), 보안성(Security), 네트워크 이동성(Network Mobility) 둥의 장점을 가지고 있어, 많은 분야의 소형 기기들에서 핵심 소프트웨어 플랫폼으로 채택되고 있다. 임베디드 장치나 모바일 같은 제한된 리소스를 사용하는 기기들은 자바의 소프트웨어 플랫폼중의 하나인 K 가상 머신(K Virtual Machine: KVM)을 탑재하여 사용하고 있다. 본 논문에서는 제한된 리소스를 사용하는 소형 기기의 KVM 에서 좀 더 효율적으로 힙 메모리 관리를 하기 위한 MCCL(Mark-Compact-Compress-Lazy Allocate) 가비지 콜렉션 기법을 설계하고 구현한 내용을 설명한다.

  • PDF

Management System of Security Vulnerability on the Distribution Network Environment (분산 네트워크 환경의 보안취약점 관리 시스템)

  • 곽인섭;석원홍;강흥식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.655-657
    • /
    • 2002
  • 인터넷에 정보화가 급속도로 진전되고 정보에 대한 의존도가 확산됨에 따라 정보시설에 대한 침입피해 사례가 급증하고 있다 일어나는 해킹 사고의 대부분은 취약점 분석 도구를 이용하여 공격하고자하는 시스템의 취약점 정보를 수집한 다음 이를 바탕으로 시스템에 대해 공격을 시도하고 있다. 하지만, 네트워크 시스템 관리자들은 시스템 취약점에 대한 정보 및 기술 부족으로 시스템에 대한 관리가 무방비 상태로 이루어지고 있는 실정이다. 본 논문에서는 보안에 미숙한 관리자도 공격 대상이 되는 시스템의 취약점을 쉽게 발견하고 이를 바탕으로 공격대상이 되는 호스트를 미리 방지할 수 있고 또한 분산 네트워크 환경에서도 관리할 수 있는 취약점 관리 시스템을 설계 및 구현하였다.

  • PDF

Key Recovery for IETF Internet Protocol Based on TTP (IETF 표준 인터넷 프로토콜과 호환되는 TTP 기반 키 복구)

  • Rhee Yoon-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.6
    • /
    • pp.56-63
    • /
    • 2006
  • Key recovery has been the subject of a lot of discussion, of much controversy and of extensive research. Key recovery, however, might be needed at a corporate level, as a form of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far completely ignore the communication context. IPSec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the Internet. We propose example to provide key recovery capability by adding key recovery information to an IP datagram. It is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more efficient.

  • PDF

An Efficient Test Scenario Management on Virtual Network (가상 네트워크 망에서의 효율적인 테스트 시나리오 관리 기법)

  • Jang, Jun-Young;Kim, Jai-Hoon;Kim, Eung-Gu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.867-870
    • /
    • 2010
  • 여러 장치들과 연동하여서 동작하는 네트워크 시스템 개발 시, 회귀 테스트는 전체 시스템의 안정성을 보장하기 위한 가장 필요한 테스트중의 하나이다. 그러나, 서비스가 되고 있거나 연동을 위한 추가적인 장비가 필요할 경우 테스트의 제약을 받게 된다. 본 논문에서는 자동 회귀 테스트를 위한 가상 네트워크 망을 제공하는 시뮬레이터를 디자인 한다. 또한, 시뮬레이터를 효율적으로 관리 및 동작하기 위한 UI 환경을 제안한다. 오픈 소스를 기반으로 제작된 본 시나리오의 관리 툴은 회귀 테스트의 자동화와 시나리오의 생성 및 배포가 가능하며 여러 프로토콜을 통합하여 사용할 수 있는 환경과 검증 코드를 제공한다. 이로 인해 네트워크 시스템 상의 소프트웨어에 대해 기능 및 회귀 테스트가 가능해 질것이고 결과적으로 프로그램의 개발 시간 단축과 유지보수에 탁월한 환경을 제공받게 될 것이다.

Implementation of a security system using the MITM attack technique in reverse (MITM 공격기법을 역이용한 보안시스템 구현)

  • Rim, Young-woo;Kwon, Jung-jang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.79-80
    • /
    • 2021
  • 본 논문은 MITM 공격기법을 역이용한 네트워크 보안 기술 및 구현 방안을 제시한다. MITM(Man In The Middle) 공격은 통신 경로 중간에 개입하여 양 단간의 통신 내용을 가로채거나 행위 제어를 수행하는 전통적인 해킹 방법으로 그 공격 기법을 역이용하여 네트워크 공격을 방어하는 보안기술 및 시스템 구현에 대해 기술한다. Linux 시스템을 이용하여 ARP Poisoning을 통해 양단간 통신 트래픽에 개입하며, Netfilter 및 Suricata를 이용하여 Network IDS/IPS 및 Firewall을 구현하였고, Contents 필터링 및 Anti-Virus 구현이 가능하며, 여러 기능을 확장하여 UTM(Unified Threats Management) 시스템을 구현하였다.

  • PDF

Study on Practical Design of Datalink in Interoperable UAV Systems (무인기 상호운용시스템에서 실용적인 데이터링크 설계방안 연구)

  • Kyu-Hwan Lee;Myeonggeun Oh;Jihoon Kim
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.51-59
    • /
    • 2024
  • Uumanned aerial vehicle(UAV) systems have been used in various fields including industry and military. According to increasing the number of UAVs, the attention on interoperable UAV systems is increasing. In this paper, we propose the practical design of datalink in interoperable UAV systems. For practical design, we firstly review the operational scenarios in the interoperable UAV system. We then propose the system model of the datalink in interoperable UAV system. Consequently, the technical components such as the design of the network, the link management, the support of the multicast transmission, the support for autonomous mission and flight safety, and the datalink security are derived and reviewed for the practical design.

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

A Study on the Promotion of the Availability of Multipurpose School Auditoriums for Use by Local Community - Based on Case Studies of Primary, Middle and High Schools in Busan - (학교시설 다목적강당의 지역주민이용 활성화 방안에 관한 연구 - 부산시내 초.중.고교 중심으로 -)

  • Bang, Taek-Hoon;Kim, Ki-Hwan
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.13 no.3
    • /
    • pp.56-65
    • /
    • 2006
  • The multipurpose auditoriums in schools are the center of local community and the places of their life-long education. The multipurpose auditoriums are to be open and made available for use by local public as far as it does not interfere with the education of the schools. However, most of them are not open to public on the pretext of management problems while demands of local communities for the opening of the facility is rising. The role of the multipurpose auditorium as the place of physical training and its maximum availability to local community have be taken into account of from its design stage. The location of the auditorium itself has to be close to the main entrance of the school for easy access, its facilities located in one common area, their management and maintenance scheme adopted appropriately but legally, and then security and safety measurement have to be devised. Also, more studies are necessary to propose detail regulations for local sports facilities and to develop their interrelationship and network, in connection with sophistication of school facilities and BTL system.

An Efficient and Secure Authentication Scheme Preserving User Anonymity

  • Kim, Mi Jin;Lee, Kwang Woo;Kim, Seung Joo;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.69-77
    • /
    • 2010
  • Authentication and key establishment are fundamental procedures to establish secure communications over public insecure network. A password-based scheme is common method to provide authentication. In 2008, Khan proposed an efficient password-based authentication scheme using smart cards to solve the problems inherent in Wu-Chieu's authentication scheme. As for security, Khan claimed that his scheme is secure and provides mutual authentication between legal users and a remote server. In this paper, we demonstrate Khan's scheme to be vulnerable to various attacks, i. e., password guessing attack, insider attack, reflection attack and forgery attack. Our study shows that Khan's scheme does not provide mutual authentication and is insecure for practical applications. This paper proposes an improved scheme to overcome these problems and to preserve user anonymity that is an issue in e-commerce applications.

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.