• 제목/요약/키워드: Port-security

검색결과 306건 처리시간 0.029초

RFC 1867 규격을 준수하는 ASP 업로드 컴포넌트 설계 (Implementation of an ASP Upload Component to Comply with RFC 1867)

  • 황헌주;강구홍
    • 한국콘텐츠학회논문지
    • /
    • 제6권3호
    • /
    • pp.63-74
    • /
    • 2006
  • 오늘날 RFC 1867 표준문서를 따르는 HTML POST 폼을 사용해 웹 브라우저를 통해 업로드된 파일을 저장하고 관리하는 ASP응용들이 다양하게 출시되고 있다. 특히 인터넷의 대중화와 함께 보안이 큰 이슈로 대두되면서 HTTP 포트를 통한 파일 송수신의 중요성이 한층 대두되고 있다. 본 논문에서는 ASP 환경에서 사용 할 수 있는 'Form based ASP 업로드 컴포넌트'를 직접 제작하고 대부분의 주요 코드들을 공개함으로서 향후 업로드 기능을 포함하는 다양한 새로운 ASP 응용들을 개발하는데 활용하도록 하였다. 한편 제작된 업로드 컴포넌트의 업로드 시간 및 CUP 사용시간을 잘 알려진 기존 상용 제품과 비교 분석함으로서 타당성을 검증하였다.

  • PDF

TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구 (A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers)

  • 서우석;박대우;전문석
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

네트워크 트래픽 분포 엔트로피를 이용한 비정상행위 탐지 방법 (Anomaly Detection Method Using Entropy of Network Traffic Distributions)

  • 강구홍;오진태;장종수
    • 정보처리학회논문지C
    • /
    • 제13C권3호
    • /
    • pp.283-294
    • /
    • 2006
  • 악의적인 네트워크 트래픽은 흔히 공격의 성질을 구체적으로 알지 않고서도 평상시 트래픽과 구별된다. 본 논문에서는 네트워크 인바운드 트래픽 분포를 이용해 네트워크 트래픽 비정상행위를 탐지하는 방법을 제시한다. 이를 위해 먼저 실제 캠퍼스 네트워크의 트래픽 특성을 프로토콜, 패킷 길이, 목적지 IP/포트 주소, TTL 값, TCP SYN 패킷, 그리고 프래그멘트 패킷 분포 등을 통해 조사하였다. 이렇게 구해진 다양한 베이스라인 트래픽 분포로부터 엔트로피를 계산하고 이를 기준으로 비정상행위를 탐지하는 방법을 제시하였다. 특히 본 논문에서는 잘 알려진 서비스거부공격을 실제 캠퍼스 네트워크를 대상으로 실시하였고 그 결과를 제시함으로서 제안된 기법의 타당성을 검증하였다.

구내외 정보통신기기 제어를 위한 Linux System상에서의 UPnP프로토콜 구현 (Implementation of UPnP Protocol on the Linux System for Controlling Premises Equipment)

  • 최동진
    • 조명전기설비학회논문지
    • /
    • 제19권5호
    • /
    • pp.103-108
    • /
    • 2005
  • 본 연구에서는 UPnP(Universal Plug and Play)기술을 이용하여 사용자가 구내외의 제어 가능한 모든 디바이스 즉 조명설비, 냉난방용 보일러, 방범장치와 같은 다양한 기기들을 쉽게 제어할 수 있고, 인터넷이나 휴대폰 등을 이용하여 구내외 어디에서든지 제어할 수 있도록 하였다. 이러한 UHnP프로토콜을 각 디바이스 제조사들은 자신의 기기에 탑재하기 위해 현재 PC시장의 대부분을 차지하는 윈도우즈뿐만 아니라 Linux와 같은 유연한 OS(Operating System)로의 포팅이 필요하다. 그러므로 모든 사용자들이 보다 표준화되고 안정적인 기본 네트워크 위에서 자신이 원하는 기능을 제공받아 사용하기 위하여 본 연구에서는 이러한 기능들을 Linux system에서 구현하였다.

한국해기사의 교육개발에 관한 연구 (한국해양대학 승선학과교육의 발전과제) (Some Suggestions for the Development of the Nautical Education in Korea Maritime University)

  • 정세모;김효중;노장주;이상집
    • 한국항해학회지
    • /
    • 제8권1호
    • /
    • pp.71-102
    • /
    • 1984
  • In Korea, the importance of keeping the see transportation facilities and well-trained maritime officers cannot be overemphasized, because of her geographical location and the national security in terms of both political and economical situations. In this paper, some points are suggested for the development of the nautical education in Korea Maritime University: (1) the strict regimental training should be kept as a vital important part of students life and its program should be designed to provide students with leadership training and experience, and to develope in the qualities of responsibilities for good citizenship and self-discipline to overcome hardwork for careers as leaders in Korea maritime industry. And therefore the dormitory and training vessel as essential parts of the educational facilities should be improved both in quality and quantity, (2) the undergraduate course should be extended to more than 5 years so that accredited baccalaureate curriculum and licensing professional education might be well conducted to meet the requirements to cope with the international competition in the facet of seafarers quality, (3) more enlarging the opportunities of incentive payments for students is required so that better qualified applicants can be admitted, (4) finally, a conjugal maritime officer service system should be put into practice in the foresseable furture so that seafarers might live normal family lives while staying at sea.

  • PDF

Network Traffic Classification Based on Deep Learning

  • Li, Junwei;Pan, Zhisong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4246-4267
    • /
    • 2020
  • As the network goes deep into all aspects of people's lives, the number and the complexity of network traffic is increasing, and traffic classification becomes more and more important. How to classify them effectively is an important prerequisite for network management and planning, and ensuring network security. With the continuous development of deep learning, more and more traffic classification begins to use it as the main method, which achieves better results than traditional classification methods. In this paper, we provide a comprehensive review of network traffic classification based on deep learning. Firstly, we introduce the research background and progress of network traffic classification. Then, we summarize and compare traffic classification based on deep learning such as stack autoencoder, one-dimensional convolution neural network, two-dimensional convolution neural network, three-dimensional convolution neural network, long short-term memory network and Deep Belief Networks. In addition, we compare traffic classification based on deep learning with other methods such as based on port number, deep packets detection and machine learning. Finally, the future research directions of network traffic classification based on deep learning are prospected.

IoT를 활용한 항만보안 시스템 (Port Security Management System using IoT)

  • 정홍주;김채은;이동민;윤동욱;유상오
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2022년도 추계학술발표대회
    • /
    • pp.1068-1070
    • /
    • 2022
  • 우리나라의 무역 활동을 처리하는 항만은 국가 주요시설로 보안에 만전을 기하고 있다. 그러나 항만의 면적이 넓고 복잡하기 때문에 사각지대가 존재하고 사각지대에서의 불법행위 단속 건수는 매년 증가하고 있다. 이에 항만의 보안 강화를 위한 대책이 필요하다. 본 논문은 항만의 상황을 이동형 CCTV에 부착된 IoT 센서들로 인식하여 YOLOv5 딥러닝 모델로 분석한 후 웹 대시보드에 시각화하는 항만 보안 시스템을 제안한다. 이동형 CCTV는 특정 위치로 직접 이동할 수 있어 거리에 따라 해상도가 낮아지는 기존 CCTV의 단점을 보완할 수 있다. 또한 해당 시스템은 주변에서 쉽게 구할 수 있는 장비들과 오픈소스 라이브러리를 활용하기 때문에 다른 보안장비들에 비해 효율적인 비용으로 높은 보안 효과를 얻을 수 있다는 강점을 지닌다. 본 시스템은 항만시설뿐 아니라 군사시설, 물류시설 등 보안을 중요시하는 다른 분야에 확대 적용될 수 있다는 점에서 의의가 있다.

Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계 (Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection)

  • 이협건;김영운;김기영;최종석
    • 한국정보전자통신기술학회논문지
    • /
    • 제11권1호
    • /
    • pp.76-81
    • /
    • 2018
  • 미래 경제 성장 동력으로 부상하고 있는 사물인터넷은 이미 생활과 밀접한 분야에서는 도입이 활발하게 이루어지고 있으나, 잠재된 보안위협은 여전히 잔존하고 있다. 특히 인터넷 상의 유해 정보는 스마트홈 및 스마트시티의 활성화로 인해 폭발적으로 설치된 CCTV에 할당된 IP 정보 및 심지어 접속 포트 번호들이 포털 검색 결과 및 페이스북, 트위터와 같은 소셜 미디어 등에 공개되어 간단한 툴로도 보다 쉽게 해킹이 가능하다. 사용자들이 많이 사용하는 포털 검색 데이터 및 소셜 미디어 데이터의 보안취약점 및 불법 사이트 정보들을 데이터 분석하여, 보안취약성 같은 위험 요소가 내포된 데이터 및 사회적 문제를 야기하는 불법 사이트에 대한 대응을 신속하게 수행할 수 있게 지원하는 빅데이터 분석 시스템이 필요하다. 본 논문에서는 빅데이터 분석 시스템 설계를 위해 하둡 기반 빅데이터 분석 시스템과 스파크 기반 빅데이터 분석 시스템 연구를 통해 요구사항을 도출하여 요구사항에 맞게 Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템을 설계하였다.

텍스트 마이닝을 활용한 자율운항선박 분야 주요 이슈 분석 : 국내 뉴스 데이터를 중심으로 (Analysis of major issues in the field of Maritime Autonomous Surface Ships using text mining: focusing on S.Korea news data)

  • 이혜영;김진식;구병수;남문주;장국진;한성원;이주연;정명석
    • 시스템엔지니어링학술지
    • /
    • 제20권spc1호
    • /
    • pp.12-29
    • /
    • 2024
  • The purpose of this study is to identify the social issues discussed in Korea regarding Maritime Autonomous Surface Ships (MASS), the most advanced ICT field in the shipbuilding industry, and to suggest policy implications. In recent years, it has become important to reflect social issues of public interest in the policymaking process. For this reason, an increasing number of studies use media data and social media to identify public opinion. In this study, we collected 2,843 domestic media articles related to MASS from 2017 to 2022, when MASS was officially discussed at the International Maritime Organization, and analyzed them using text mining techniques. Through term frequency-inverse document frequency (TF-IDF) analysis, major keywords such as 'shipbuilding,' 'shipping,' 'US,' and 'HD Hyundai' were derived. For LDA topic modeling, we selected eight topics with the highest coherence score (-2.2) and analyzed the main news for each topic. According to the combined analysis of five years, the topics '1. Technology integration of the shipbuilding industry' and '3. Shipping industry in the post-COVID-19 era' received the most media attention, each accounting for 16%. Conversely, the topic '5. MASS pilotage areas' received the least media attention, accounting for 8 percent. Based on the results of the study, the implications for policy, society, and international security are as follows. First, from a policy perspective, the government should consider the current situation of each industry sector and introduce MASS in stages and carefully, as they will affect the shipbuilding, port, and shipping industries, and a radical introduction may cause various adverse effects. Second, from a social perspective, while the positive aspects of MASS are often reported, there are also negative issues such as cybersecurity issues and the loss of seafarer jobs, which require institutional development and strategic commercialization timing. Third, from a security perspective, MASS are expected to change the paradigm of future maritime warfare, and South Korea is promoting the construction of a maritime unmanned system-based power, but it emphasizes the need for a clear plan and military leadership to secure and develop the technology. This study has academic and policy implications by shedding light on the multidimensional political and social issues of MASS through news data analysis, and suggesting implications from national, regional, strategic, and security perspectives beyond legal and institutional discussions.

"무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)" (E-Commerce in the Historical Approach to Usage and Practice of International Trade)

  • 춘홍차
    • 무역상무연구
    • /
    • 제19권
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF