• Title/Summary/Keyword: SSH 터널링

Search Result 5, Processing Time 0.013 seconds

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.

SSH Traffic Identification Using EM Clustering (EM 클러스터링을 이용한 SSH 트래픽 식별)

  • Kim, Kyoung-Lyoon;Kim, Myung-Sup;Kim, Hyoung-Joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1160-1167
    • /
    • 2012
  • Identifying traffic is an important issue for many networking applications including quality of service, firewall enforcement, and network security. Once we know the purpose of using the traffic in the firewall, we can allow or deny it and provide quality of service, and effective operation in terms of security. However, a number of applications encrypts traffics in order to enhance security or privacy. As a result, effective traffic monitoring is getting more difficult. In this paper, we analyse SSH encrypted traffic and identify differences among SSH tunneling, SFTP, and normal SSH traffics. By using EM clustering, we identify traffics and validate experiment results.

Expansion of An HPC Cluster Over SSH Tunnel (SSH 터널을 이용한 HPC 클러스터의 확장)

  • Park, Pil-Seong;Kumar, Harshit
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.539-543
    • /
    • 2009
  • 실시간으로 데이터를 처리하여 빠른 서비스를 제공하기 위해 PC 클러스터가 널리 사용되고 있다. 본 논문에서는 PC 클러스터의 한 종류인 HPC 클러스터에 전용 노드를 추가하는 대신, 방화벽 외부의 네트워크 상에 존재하는 비전용 노드의 유휴시간을 활용하도록 클러스터를 확장하여 성능을 향상시키는 경우 발생하는 NFS 등의 보안 문제를 SSH 터널링을 사용하여 해결하는 방안을 제시하고 암호화된 NFS의 성능을 실험하였다.

  • PDF

The Analysis of CCTV Hacking and Security Countermeasure Technologies: Survey (CCTV 해킹에 대한 분석 및 보안 대응책 연구: 서베이)

  • Hong, Sunghyuck;Jeong, Sae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.129-134
    • /
    • 2018
  • This is about the CCTV hacking which is one of the recently emerging privacy-spilling crime. Recently, the usage of CCTV is being increased, and Black Hat Hackers spill the individual's privacy by hacking it. However, That crime is being increased. However, most users rarely fulfill the security management, and the government's measures are insufficient. Therfore, this research report implies some security technologies including user authentication protocols such as SSH Tunneling and Media Encryption Algorithm. and recently developed technologies including Wookyeong Information Technology's SecuWatcher for CCTV, Norma's CCTV Care App, and MarkAny's Password SAFERTM for CCTV.

Integrated Management System for Vehicle CCTV Video Using Reverse Tunneling (리버스 터널링을 이용한 차량용 CCTV 영상 통합 관리 시스템)

  • Yang, Sun-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.19-24
    • /
    • 2019
  • The development of ICT technology has a huge impact on the existing closed CCTV security equipment market. With the importance of video data particularly highlighted in areas such as self-driving cars, unmanned vehicles and smart cities, various technologies using video are emerging. In this paper, we proposed a method to transmit videos and metadata as a part of smart city integration, and to solve the traffic, environment and security problems caused in urban life by utilizing the metadata instead of using CCTV videos for simple recording purposes, and reverse tunneling technique was designed and implemented as a method for accessing CCTV videos for vehicles from remote locations. Integrated management of CCTV videos and metadata for vehicles that have been used only for limited purposes in closed environments will enable efficient operation of integrated centers in real time required by smart cities, such as vehicle status check, road conditions and facility management.