• 제목/요약/키워드: Network Security Management

검색결과 1,396건 처리시간 0.022초

네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례 (The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch)

  • 박은철;최현주
    • 상하수도학회지
    • /
    • 제32권4호
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

원형 좌표계를 이용한 센서네트워크 키 관리 기법 (Management Scheme of Sensor Network using Circular Coordinates)

  • 홍성식;유황빈
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.71-80
    • /
    • 2006
  • 센서네트워크는 매우 제한된 자원을 갖는 작은 노드들로 구성되어 온도, 진동 등의 지역적 정보를 수집하고 통신망을 통하여 이들 정보를 제공한다. 센서네트워크는 일반적으로 매우 작고 제한적인 자원을 갖는 노드들로 구성되므로 이러한 노드들에 보안 서비스를 추가하는 것은 상당히 어려운 문제이다. 센서네트워크의 안정성을 위해서는 일반 네트워크 노드들에 비하여 보다 더 효율적인 키 관리 기법이 필요하다. 본 논문에서는 원형 좌표계를 이용한 위치 정보를 기반으로 키 관리하는 기법을 제시한다. 원형좌표계의 원점을 중심으로 노드와 노드간의 상대적인 위치 정보를 이용하여 키를 생성하였다. 이러한 방법은 대칭적 위치 구조에 의해 키 생성이 다른 방법에 비하여 간결하면서도 효율적임을 보였다.

  • PDF

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

Mobile Ad-hoc Network에서 영역기반 보안 멀티캐스트 기법 연구 (A Study on Region-based Secure Multicast in Mobile Ad-hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.75-85
    • /
    • 2016
  • MANET is a network composed only mobile network having limited resources and has dynamic topology characteristics. Therefore, every mobile node acts as a route and delivers data by using multi-hop method. In particular, group communication such as multicast is desperately needed because of characteristics such as battery life of limited wireless bandwidth and mobile nodes. However, the multicast technique can have different efficient of data transmission according to configuring method of a virtual topology by the movement of the nodes and the performance of a multicast can be significantly degraded. In this paper, the region based security multicast technique is proposed in order to increase the efficiency of data transmission by maintaining an optimal path and enhance the security features in data transmission. The group management node that manages the state information of the member nodes after the whole network is separated to area for efficient management of multicast member nodes is used. Member node encrypts using member key for secure data transmission and the security features are strengthened by sending the data after encrypted using group key in group management node. The superiority of the proposed technique in this paper was confirmed through experiments.

분산 환경에서 정보보호 연관 경고 메시지를 이용한 ESM 구현 (An Implementation of ESM with the Security Correlation Alert for Distributed Network Environment)

  • 한근희;전상훈;김일곤;최진영
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제10권2호
    • /
    • pp.199-208
    • /
    • 2004
  • 본 논문에서는 각 센서에서 수집한 수 많은 경고 메시지중에서 불필요한 정보는 필터링하여, 위험 상태를 크게 4가지의 유형으로 분류하는 SIA 시스템을 제안하고 구현하였다. 또한 제안한 방법을 실제 환경에서 구현하여 현장에서 적용해 본 결과, 실시간으로 이루어지는 네트워크의 위험요소 판정에 도움을 줌으로써 보안관리자가 실질적인 위협에 즉각적으로 대처 할 수 있음을 확인하였다.

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Experiment in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.54-60
    • /
    • 2024
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is showed with experiment in feasibility.

강화학습 기반 네트워크 취약점 분석을 위한 적대적 시뮬레이터 개발 연구 (A Study on the Development of Adversarial Simulator for Network Vulnerability Analysis Based on Reinforcement Learning)

  • 김정윤;박종열;오상호
    • 정보보호학회논문지
    • /
    • 제34권1호
    • /
    • pp.21-29
    • /
    • 2024
  • ICT와 network의 발달로 규모가 커진 IT 인프라의 보안 관리가 매우 어려워지고 있다. 많은 회사나 공공기관에서 시스템과 네트워크 보안 관리에 어려움을 겪고 있다. 또한 하드웨어와 소프트웨어의 복잡함이 커짐에 따라 사람이 모든 보안을 관리한다는 것은 불가능에 가까워지고 있다. 따라서 네트워크 보안 관리에 AI가 필수적이다. 하지만 실제 네트워크 환경에 공격 모델을 구동하는 것은 매우 위험하기에 실제와 유사한 네트워크 환경을 구현하여 강화학습을 통해 사이버 보안 시뮬레이션 연구를 진행하였다. 이를 위해 본 연구는 강화학습을 네트워크 환경에 적용하였고, 에이전트는 학습이 진행될수록 해당 네트워크의 취약점을 정확하게 찾아냈다. AI를 통해 네트워크의 취약점을 발견하면, 자동화된 맞춤 대응이 가능해진다.

멀티미디어 인터넷 망에서의 트래픽 엔지니어링을 위한 기능 및 프로세스 모델 (Functional and Process Model for Traffic Engineering in Multimedia Internet)

  • 장희선;김경수;신현철
    • 융합보안논문지
    • /
    • 제2권2호
    • /
    • pp.9-17
    • /
    • 2002
  • 트래픽 엔지니어링 기능은 트래픽 관리(Traffic Management), 용량 관리(Capacity Management), 그리고 네트워크 계획(Network Planning) 등을 포함한다. 본 논문에서는 트래픽 엔지니어링의 각각의 기능에 대해 설명하며, 멀티미디어 인터넷 망에서의 효율적인 트래픽 엔지니어링을 위한 기능 및 프로세스 모델을 제시하고 각 단계에서 필요한 구체적인 트래픽 관리방안을 소개한다.

  • PDF

사물인터넷 보안 문제제기와 대안 (Security Vulnerability of Internet of Things and Its Solution)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제11권1호
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.