• Title/Summary/Keyword: Physical network separation

Search Result 32, Processing Time 0.023 seconds

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.6
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

A Study on NAS-Linked Network Separation System Using AHP (AHP를 이용한 NAS 연동형 망분리 시스템에 관한 연구)

  • Kim, Min Su;Shin, Sang Il;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.85-90
    • /
    • 2013
  • To provide high-quality services, national public institutions and companies have provided information and materials over the internet network. However, a risk of malware infection between transmission and reception of data leads to exposure to various security threats. For this reason, national institutions have proceeded with projects for network separation since 2008, and data linkage has been made using network connection storage through network separation technologies, along with physical network separation. However, the network connection storage has caused waste of resources and problems with data management due to the presence of the same data in internal network storage and external network storage. In this regard, this study proposes a method to connect internal and external network data using NAS storage as a way to overcome the limitations of physical network separation, and attempts to verify the priority of items for the optimization of network separation by means of AHP techniques.

Design and Implementation of a Physical Network Separation System using Virtual Desktop Service based on I/O Virtualization (입출력 가상화 기반 가상 데스크탑 서비스를 이용한 물리적 네트워크 망분리 시스템 설계 및 구현)

  • Kim, Sunwook;Kim, Seongwoon;Kim, Hakyoung;Chung, Seongkwon;Lee, Sookyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.7
    • /
    • pp.506-511
    • /
    • 2015
  • IOV is a technology that supports one or more virtual desktops, and can share a single physical device. In general, the virtual desktop uses the virtual IO devices which are provided by virtualization SW, using SW emulation technology. Virtual desktops that use the IO devices based on SW emulation have a problem in which service quality and performance are declining. Also, they cannot support the high-end application operations such as 3D-based CAD and game applications. In this paper, we propose a physical network separation system using Virtual Desktop Service based on HW direct assignments to overcome these problems. The proposed system provides independent desktops that are used to access the intranet or internet using server virtualization technology in a physical desktop computer for the user. In addition, this system can also support a network separation without network performance degradation caused by inspection of the network packet for logical network separations and additional installations of the desktop for physical network separations.

A study on a security model for the establishment of a non-face-to-face smart work working environment in a physical network separation environment of public institutions (공공기관 물리적 망분리 환경에서의 비대면 스마트워크 근무 환경구축을 위한 보안 모델 연구)

  • Park, Sang-Kil;Kim, Gi-Bong;Son, Gyeong-Ja;Lee, Won-Suk;Park, Jae-Pyo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.37-44
    • /
    • 2020
  • Due to the recent COVID 19 pandemic, public institutions are increasingly working from home. Working in public institutions is rapidly changing into a smart work environment where time and space constraints disappear. However, many public institutions currently lack a security model for an efficient smart work environment due to the physical network separation system that separates the Internet network and the business network. Therefore, in this paper, we describe the current limitations for implementing smart work in a physical network separation environment of public institutions, and propose a security model necessary for a work environment to supplement them. As a related study, explain SSL VPN and explain smart work business model through security model research of SDP (Software Defined Perimeter), RDP (Remote Desktop Protocol), and VDI (Virtual Desktop Infrastructure) to overcome the security limitations of SSL VPN. As a result, we intend to propose a security model for a smart work environment suitable for public institutions while complying with the physical network separation security guide.

Pervaporation Separation of Water/Ethanol Mixtures through PBMA/anionic PAA IPN Membrane

  • Jin, Young-Sub;Kim, Sung-Chul
    • Proceedings of the Membrane Society of Korea Conference
    • /
    • 1996.10a
    • /
    • pp.86-87
    • /
    • 1996
  • IPN (Interpenetrating Polymer Network) is a mixture of two or more crosslinked polymers with physically interlocked network structures between the component polymers. IPN can be classified as an alloy of thermosets and has the characteristics of thermosets such as the thermal resistance and chemical resistance and also has the characteristics of polymer alloys with enhanced impact resistance and amphoteric properties. The physical interlocking during the synthesis restricts the phase separation of the component polymer with chemical pinning process, thus the control of morphology is possible through variations of the reaction temperature and pressure, catalyst concentration and crosslinking agent concentration. Finely dispersed domain structure can be obtained through IPN synthesis of polymer components with gross immiscibility. In membrane applications, particularly for the separation of liquid mixtures, crosslinked polymer component with specific affinity to the permeate is needed. With the presence of the permeant-inert polymer component, the mechanical strength and the selectivity of the membranes are enhanced by restricting the swelling of the transporting polymer component networks.

  • PDF

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

Scalable Search based on Fuzzy Clustering for Interest-based P2P Networks

  • Mateo, Romeo Mark A.;Lee, Jae-Wan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.157-176
    • /
    • 2011
  • An interest-based P2P constructs the peer connections based on similarities for efficient search of resources. A clustering technique using peer similarities as data is an effective approach to group the most relevant peers. However, the separation of groups produced from clustering lowers the scalability of a P2P network. Moreover, the interest-based approach is only concerned with user-level grouping where topology-awareness on the physical network is not considered. This paper proposes an efficient scalable search for the interest-based P2P system. A scalable multi-ring (SMR) based on fuzzy clustering handles the grouping of relevant peers and the proposed scalable search utilizes the SMR for scalability of peer queries. In forming the multi-ring, a minimized route function is used to determine the shortest route to connect peers on the physical network. Performance evaluation showed that the SMR acquired an accurate peer grouping and improved the connectivity rate of the P2P network. Also, the proposed scalable search was efficient in finding more replicated files throughout the peer network compared to other traditional P2P approaches.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.