• 제목/요약/키워드: Security Architecture

검색결과 1,068건 처리시간 0.024초

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

스마트 금융을 위한 비즈니스 로직과 분리된 보안프레임워크 (A Business-Logic Separated Security Framework for Smart Banking)

  • 서동현;이상진
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.669-679
    • /
    • 2014
  • 본 연구에서는 스마트금융 서비스를 위한 서버 측 보안 프레임워크를 제안한다. 국내 금융기관의 전자금융서비스를 제공하는 서버 측 프레임워크 구조를 살펴보면 대부분 서비스제공위주의 구조를 가지고 있다. 따라서, 보안관련 요구사항들은 비즈니스 로직들에 같이 포함되어 있는 경우가 대부분이기 때문에 보안 사고에 효과적으로 대응하기 어렵다. 본 논문에서는 전자금융서비스시 보안영역을 비즈니스영역과 분리하여 업무에 대한 의존도(Dependency) 없이 보안 정책을 실시간으로 적용할 수 있는 프레임워크를 제안한다. 이를 통하여 보안관련 위협에 대한 신속하고 효과적인 대응기반을 제시한다. 또한 현재 서비스하고 있는 시스템구조에서도 시스템의 큰 변경없이 제안 프레임워크를 적용할 수 있는 방안을 제시한다.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks

  • Haque, Md. Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권5호
    • /
    • pp.265-277
    • /
    • 2008
  • In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes.

능동보안 아키텍쳐를 위한 컴포넌트 분류 및 명세방법 (Component Classification and Specification on Active Security Architecture)

  • 김상영;김재웅;황선명
    • 한국멀티미디어학회논문지
    • /
    • 제7권1호
    • /
    • pp.113-125
    • /
    • 2004
  • 능동 네트워크는 능동 네트워크 애플리케이션의 통신 중 요구사항의 처리를 할 수 있게 하는 소프트웨어 프레임 워크를 제공한다. 능동보안을 위한 컴포넌트 아키텍쳐는 관련 컴포넌트들의 조합으로 재사용 시스템을 쉽게 구축할 수 있다. 이 아키텍쳐는 컴포넌트를 획득하고, 이해하며 조립하기 위한 표준 계층으로서 컴포넌트 식별, 탐색과 조정을 위한 지침을 제공해야 한다. 본 논문에서는 최근 연구되어지고 있는 능동네트워크의 보안에 대한 부분을 관리하기 위한 능동보안 컴포넌트 개발을 위한 아키텍쳐 설계 및 도메인 분석을 하였으며, 능동보안 도메인 아키텍쳐를 이용한 컴포넌트 개발을 위한 설계명세에 대하여 연구하였다.

  • PDF

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

  • PDF

센서 네트워크를 위한 부가적인 암호모듈의 구조 분석 (Analyses of additive Crypto-module Architecture for a Sensor Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.795-798
    • /
    • 2005
  • In this paper, we analyses of additive crypto-module architecture for a sensor network. Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the development of a large number of sensor devices in the field. Limitations in processing power, battery life, communication bandwidth and memoryconstrain devices. A mismatch between wide arithmetic for security and embedded data buscombined with lack of certain operations. Then, we compared the architecture of crypto-module in this paper.

  • PDF

사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석 (Analyses of Requirement of Security based on Gateway Architecture for Secure Internet)

  • 김정태
    • 예술인문사회 융합 멀티미디어 논문지
    • /
    • 제6권3호
    • /
    • pp.461-470
    • /
    • 2016
  • 최근 차세대 성장 동력으로 사물인터넷망이 각광받고 있다. 이러한 사물인터넷망의의 특징은 모든 사물들이 상호 연결되는 초연결성을 이루고 있으며, 센서 노드에서의 제한된 연산 능력, 메모리, 배터리 등에 기인하여 많은 한계점을 가진다. 이러한 문제 등으로 인하여 보안 및 프라이버시 문제가 대두되고 있다. 또한 많은 연구자들이 사물인터넷망에서의 보안적인 문제 및 공개된 문제점을 연구하고 있으나, 현재 까지 보안 관점에서 명쾌한 문제점을 해결하기 위한 접근을 보이고 있지 않다. 따라서 이러한 문제점을 해결하기 위한 IoT 의 구조, 프로토콜, 서비스 및 응용 분야에 대한 문제점을 해결하고 있다. 따라서 본 논문에서는 이러한 보안 문제를 해결하기 위해 요구되어지는 보안 사항 및 보안 프레임워크의 구조를 분석하고자 한다. 현실적으로 센서들이 안전하지 않을 지라도 이를 해결할 수 있는 대안이 IoT 게이트웨이를 통한 구현 방법이 한 대안이 되고 있다. 따라서 이러한 보안게이트를 통한 구조를 분석하고자 한다.