• Title/Summary/Keyword: Security Structure

Search Result 1,316, Processing Time 0.025 seconds

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.

An Ontology Based Security Protection of SOAP Messages

  • Nasridinov, Aziz;Byun, Jeong-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.131-134
    • /
    • 2011
  • Several Web Service security standards are widely utilized aiming at securing exchanges of SOAP messages among partners in a collaborative environment. Although such standards are suitable for ensuring end-to-end message level security, certain attacks such as XML rewriting may still occur and lead to significant security vulnerabilities. This paper explores the security vulnerabilities of SOAP messages and proposes an ontology-based approach that can successfully combat the security threats. We develop ontology-based schema to include SOAP structure information in outgoing SOAP message and validate this information in the receiving end. Thus, allow to detect XML rewriting attacks early in the validating process.

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

Establishment of Cyber Security Countermeasures amenable to the Structure of Power Monitoring & Control Systems (전력계통 제어시스템 구조에 따른 사이버 보안대책 수립)

  • Woo, Pil Sung;Kim, Balho H.
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.12
    • /
    • pp.1577-1586
    • /
    • 2018
  • The emergence of the Smart Grid is an integrated solution for the next generation power system that combines IT technology in the power system to create optimal energy utilization and various services. However, these convergence technologies (power systems and information communications) are not only improving the related technologies but also producing various problems especially exposure to cyber risk. In particular, the intelligent power grid has security vulnerabilities through real-time information sharing among various organically linked systems, and it is more complicated than the cyber risk problem in the existing IT field and is directly connected to national disaster accidents. Therefore, in order to construct and operate a more stable smart grid, this paper analyzes the system of power system control system in Korea, and proposes a cyber security element definition and a countermeasure establishment method of power monitoring & control systems based on security standards of smart grid (No. SPS-SGSF-121-1-1).

Security Risk Management of an Educational Institution: Case Study

  • Almarri, Bayenah;Alraheb, Fatimah;Alramis, Shahad;Almilad, Noor;Aldahasi, Ezaz;Ali, Azza
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.172-176
    • /
    • 2021
  • This study is conducted with an educational institution to minimize the potential security hazards to an acceptable level where the vulnerabilities and threats are revealed in this institution. The paper provides a general structure for the risk management process in educational institutions, and some recommendation that increases security levels is presented.

Security Risk Assessment in Conducting Online Exam

  • Danah AlDossary;Danah AlQuaamiz;Fai AlSadlan;Dana AlSharari;Lujain AlOthman;Raghad AlThukair;Ezaz Aldahasi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.77-83
    • /
    • 2023
  • This research is conducted to minimize the potential security risks of conducting online exams to an acceptable level as vulnerabilities and threats to this type of exam are presented. This paper provides a general structure for the risk management process and some recommendations for increasing the level of security.

An Empirical Study on User Acceptance of Micro e-Payment Systems : System Features, Transaction Cost, and Provider (소액 전자결제시스템 수용의지에 관한 실증연구 : 시스템 특성, 거래비용과 제공업체를 중심으로)

  • Chung, Suk-Kyun;Ryoo, Chang-Wan;Ku, Tae-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.130-137
    • /
    • 2010
  • This paper analyzes the main factors affecting user selection of a small-sum electronic payment system using survey data of 396 users. Several findings emerge. First, users consider three pillars and eight factors in adopting a new system : system features(stability, security, and flexibility), transaction cost(payment commission and settlement period), and financial capability of provider(stability of financial structure, risk management capability, and funding capability). Second, the stability of the financial structure of the system provider is the most important factor to user acceptance of a new e-payment system. Users tend to consider uncertainty risk more seriously than transaction cost. This reflects the reality that electronic payment system service industry has not fully fledged yet. Third, some moderating effects exist according to payment methods and business usages. As for payment methods, speedy settlement cycle for wired/wireless phone payment, system stability for credit card and account transfer payment, and security for advance payment means are crucial factors. As for business usages, the stability of financial structure for online game content, system stability for music and video content, proxy payment commission for e-learning content, flexibility of the payment system for digital adult content, and security for public services are decisive ones.

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

TG-SPSR: A Systematic Targeted Password Attacking Model

  • Zhang, Mengli;Zhang, Qihui;Liu, Wenfen;Hu, Xuexian;Wei, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2674-2697
    • /
    • 2019
  • Identity authentication is a crucial line of defense for network security, and passwords are still the mainstream of identity authentication. So far trawling password attacking has been extensively studied, but the research related with personal information is always sporadic. Probabilistic context-free grammar (PCFG) and Markov chain-based models perform greatly well in trawling guessing. In this paper we propose a systematic targeted attacking model based on structure partition and string reorganization by migrating the above two models to targeted attacking, denoted as TG-SPSR. In structure partition phase, besides dividing passwords to basic structure similar to PCFG, we additionally define a trajectory-based keyboard pattern in the basic grammar and introduce index bits to accurately characterize the position of special characters. Moreover, we also construct a BiLSTM recurrent neural network classifier to characterize the behavior of password reuse and modification after defining nine kinds of modification rules. Extensive experimental results indicate that in online attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 275%, and respectively outperforms its foremost counterparts, Personal-PCFG, TarGuess-I, by about 70% and 19%; In offline attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 90%, outperforms Personal-PCFG and TarGuess-I by 85% and 30%, respectively.

On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis (Rijndael 유사 구조의 차분 공격과 선형 공격에 대한 안전성에 관한 연구)

  • 박상우;성수학;지성택;윤이중;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.3-14
    • /
    • 2002
  • Rijndael-like structure is the special case of SPN structure. The linear transformation of Rijndael-like structure consisits of linear transformations of two types, the one is byte permutation $\pi$ and the other is linear tranformation $\theta$= ($\theta_1, \theta_2, \theta_3, \theta_4$), where each of $\theta_i$ separately operates on each of the four rows of a state. The block cipher, Rijndael is an example of Rijndael-like structures. In this paper. we present a new method for upper bounding the maximum differential probability and the maximum linear hull probability for Rijndael-like structures.