• Title/Summary/Keyword: Security Enforcement Engine

Search Result 10, Processing Time 0.023 seconds

Implementation of Security Enforcement Engine for Active Nodes in Active Networks (액티브 네트워크 상에서 액티브 노드의 보안 강화를 위한 보안 엔진 구현)

  • Kim, Ok-Kyeung;Lim, Ji-Young;Na, Hyun-Jung;Na, Ga-Jin;Kim, Yeo-Jin;Chae, Ki-Joon;Kim, Dong-Young
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.413-422
    • /
    • 2003
  • An active network is a new generation network based on a software-intensive network architecture in which applications are able to inject new strategies or code into the infrastructure for their immediate needs. Therefore, the secure active node architecture is needed to give the capability defending an active node against threats that may be more dynamic and powerful than those in traditional networks. In this paper, a security enforcement engine is proposed to secure active networks. We implemented an operating engine with security, authentication and a authorization modules. Using this engine, it is possible that active networks are protected from threats of the malicious active node.

Design of Security Enforcement Engine for Active Nodes (능동 노드를 위한 보안강화엔진 설계)

  • 김옥경;임지영;김여진;나가진;나현정;채기준;나중찬;김영수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.362-364
    • /
    • 2003
  • 본 논문은 액티브 네트워크 환경에서 액티브 노드를 위한 보안강화엔진의 구조와 기능을 설계하였다. 액티브 노드의 자원에 접근 시 발생되는 보안상의 문제점들을 해결하기 위한 보안강화엔진 구조를 제안하고 보안강화엔진 내에 Security, Authentication, Authorization 모듈을 두어 액티브 네트워크 환경에 노출되어있는 악의적인 위협 요소들로부터 액티브 노드들을 보호하고자 하였다. 본 논문에서는 보안강화엔진에서 Security, Authentication, Authorization 모듈의 설계 내용에 대해 기술한다.

  • PDF

Security Enforcement based on Cooperative Architecture in Active network (액티브 네트워크에서의 협업적 구조를 통한 보안 강화)

  • Oh, Ha-Young;Chae, Ki-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.223-225
    • /
    • 2005
  • 기존의 패킷 교환 네트워크는 해킹과 같은 보안 공격에 많은 취약점을 가지고 있다. 침입차단시스템 (Firewall system)과 침입탐지 시스템 (Intrusion Detection system)같은 보안 시스템이 개발되고 있지만 DOS나 Probe등을 비롯한 다양한 공격에 대해 적극적으로 대처 할 수 없다. 결과 DARPA를 비롯한 여러 기관에서 전송중인 액티브 패킷이 라우터에서 관리자의 정책을 담고 있는 코드를 실행할 수 있고 그 코드의 실행결과에 따라 라우터의 상태를 변경할 수 있는 액티브 네트워크 전반적인 구조를 제안하였다. 하지만 액티브 네트워크에서 중요한 것은 기존 네트워크와 달리 액티브 패킷이 액티브 노드의 자원에 접근함으로써 발생하게 되는 네트워크 보안이다. 따라서 액티브 노드의 NodeOs단에 Crypto engine, Integrity Engine, Authentication Engine, Authorization Engine등을 비롯한 액티브 노드 인증 및 액티브 패킷/코드 인증 보안 모듈을 둠으로써 액티브 노드 간 서로 안전한 협업적 관리를 통해 보안을 강화한다.

  • PDF

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF

Implementation of Security Enforcement Engine Using COM Programming (컴포넌트 개발방법을 이용한 보안 강화 엔진 구현)

  • 김은아;김미희;채기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.331-333
    • /
    • 2004
  • 네트워크 보안의 요구 사항을 만족시키기 위한 필수적인 보안 서비스에는 인증과 권한부여가 있다. 이러한 서비스를 제공하는 보안 강화 엔진을 구현함에 있어 컴포넌트 개발방법을 이용하면 구축비용 및 시간을 절감할 수 있고 바이너리 단위로의 재사용이 가능하며 유지 보수의 용이성 및 확장성이 뛰어나다는 장점을 갖는다. 이에 본 논문에서는 컴포넌트 모델 중 마이크로소프트사의 COM(Component Object Model)을 기반으로 보안 강화 엔진을 구현하였다.

  • PDF

A Study on the Temperature Characteristics of High Voltage Power Cable for Hybrid Electric Vehicle (하이브리드 자동차용 고압 케이블의 온도 특성에 관한 연구)

  • Lee, Ki-Yeon;Kim, Dong-Woo;Kim, Dong-Ook;Gil, Hyoung-Jun;Kim, Hyang-Kon;Choi, Chung-Seog
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.3
    • /
    • pp.338-342
    • /
    • 2008
  • Hybrid Electric Vehicle(HEV) is driven by an internal-combustion engine and an electric motor. It is a combination of an internal-combustion engine and several electrical equipments which use a high voltage battery, an electric motors, an inverter and others. But there is not any separate detailed enforcement regulations for high voltage electric appliances in the existing vehicle-related safety standards. So, test standards suggestion as well as test technique development need to be done for ensuring electrical safety, for an electric motor, a high voltage battery, a(n) inverter/converter and an electric power transmission units and other equipments to ensure the safety of high voltage electric appliances which is the HEV key electrical component. In this paper, We are to provide helpful data to support test technique development and test standard establishment for HEV design and electrical safety security by the following methods; by measuring the voltage, the electric current, and the frequency of HEV, by analyzing electrical characteristics of high voltage electric appliances, and by analyzing temperature characteristics of the electrical current among the analyzed electrical characteristics by thermal imagining cameras.

The Examination and Development Plan of Maritime Policing Act ("해양경비법" 검토와 발전방안)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.95-122
    • /
    • 2012
  • The ocean in the 21st century is getting emphasized as a treasury of natural resources and a growth engine for the nation. And nations around the world have entered into the hyper-competition to take the initiative for those marine resources. Under the situation, the Korea Coast Guard is devoting itself with full force to protecting maritime sovereignty, ensuring maritime safety and security and preserving the marine environment. Purpose of this study is to analyze Maritime Policing Act of 2012 and their problems and to suggest improvement measures. Objectives of Maritime Policing Act of 2012 is national Defence, policing for maritime security, protection of marine natural resources and marine facility in territorial waters and exclusive economic zone(EEZ) of Korea. Limits of Maritime Policing Act of 2012 are as follows. First, As organization related rules in Maritime Policing Act of 2012 are not enough, Maritime police agency Act should be revised and enacted in order to cope with future administrative demands and legal ground. Second, Article 22 penal regulation is more severe than regulations of another Act. Third, Article 14 should be made improvement for pre-prevention through the pre-report and the establishment of prohibition boundary in maritime demonstration.

  • PDF

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Open Policy Agent based Multilateral Microservice Access Control Policy (개방형 정책 에이전트 기반 다자간 마이크로서비스 접근제어 정책)

  • Gu Min Kim;Song Heon Jeong;Kyung Baek Kim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.60-71
    • /
    • 2023
  • A microservice architecture that accommodates the heterogeneity of various development environments and enables flexible maintenance can secure business agility to manage services in line with rapidly changing requirements. Due to the nature of MSA, where communication between microservices within a service is frequent, the boundary security that has been used in the past is not sufficient in terms of security, and a Zerotrust system is required. In addition, as the size of microservices increases, definition of access control policies according to the API format of each service is required, and difficulties in policy management increase, such as unnecessary governance overhead in the process of redistributing services. In this paper, we propose a microservice architecture that centrally manages policies by separating access control decision and enforcement with a general-purpose policy engine called OPA (Open Policy Agent) for collective and flexible policy management in Zerotrust security-applied environments.

A discussion on the issues of human trafficking and global economy, HIV, and inhumanity: A case study of Nepal women (인신매매와 관련된 국제경제, HIV, 그리고 비인간적 문제들에 대한 담론: 네팔여성들에 대한 사례제시를 중심으로)

  • Jang, Duck-Hyung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.171-187
    • /
    • 2016
  • Human trafficking is a booming underground business and is the fastest growing and criminal activity in today's society. The use of coercion or fraud marks the territory of trafficking. Most people trafficked suffer constant threats, violence, and forced acts while imprisoned by their traffickers. Such human trafficking entails significant problems not only for the victims but also for the economies and community health. Large corporations overseas have also been known to partake in the sex slave industry. Another hidden cost to the global economy is the cost of law enforcement and anti-trafficking measures being implemented. Further, sex Trafficking carries many potential health consequences, one of the biggest risks is HIV infection. That means, sex trafficking is an engine of the global AIDS epidemic with one study portraying nearly fifty six percent of all sex slaves having HIV or AIDS. Therefore, many of people are being infected with HIV and many other diseases every day through contact with the sex slave industry costing millions to society and the global economy. in this study, the author presents a case study of trafficking against Nepalese women. Nepalese women being trafficked are found to have a high prevalence of HIV infection. In conclusion and discussion, a few of solutions needed to be addressed for controling human trafficking for sex slavery suggested.

  • PDF