• 제목/요약/키워드: Security network management

검색결과 1,366건 처리시간 0.031초

신뢰성을 보장하는 IEEE802.11 기반의 그룹핸드오버 기법 (Reliable Group Handover Scheme based on IEEE802.11)

  • 김기영;고훈
    • 디지털산업정보학회논문지
    • /
    • 제5권1호
    • /
    • pp.33-41
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others.The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현 (Design and Implementation of Unified Network Security System support for Traffic Management)

  • 황호영;김승천
    • 한국인터넷방송통신학회논문지
    • /
    • 제11권6호
    • /
    • pp.267-273
    • /
    • 2011
  • 고속의 대역폭과 원활한 트래픽 관리, 그리고 보안 기능을 갖춘 인터넷 접속 네트워크는 기업의 전략적인 인프라로 그 위상이 강화되고 있다. 이러한 전략적 인터넷 인프라로서의 역할을 수행하기 위해서는 늘어나는 트래픽에 맞추어 네트워크 속도의 향상이 있어야 함과 동시에 내/외부 네트워크로부터의 보안공격에 대비하여 안심하고 자원을 사용할 수 있어야 한다. 본 논문에서는 인터넷 속도의 향상, 능동적 네트워크 보안, 응용 및 사용 목적에 따른 트래픽 분할 관리를 통합적으로 제공할 수 있는 솔루션으로서 종단간 트래픽 관리를 지원하는 네트워크 보안 시스템을 개발한다. 제안된 시스템에서는 초고속 인터넷 접속과 방화벽 기능, VPN, 침입 방지, 콘텐츠 필터링, 트래픽 및 QoS 관리, History Log 기능 등을 통합적으로 일체형 장비에 구현하여 기업이 전략적인 인터넷 인프라를 구축하면서도 통신비용을 절감할 수 있는 통합 네트워크 보안시스템을 제공할 수 있다.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Summary of Maritime Cyber Attacks and Risk Management

  • Al-Absi, Mohammed Abdulhakim;Al-Absi, Ahmed Abdulhakim;Kim, Ki-Hwan;Lee, Young-Sil;Lee, Hoon Jae
    • International journal of advanced smart convergence
    • /
    • 제11권3호
    • /
    • pp.7-16
    • /
    • 2022
  • The targets of cyber-attacks are not limited to the websites and internal IT systems of shipping agencies. Ships and ports have become important targets for cyber attackers. This paper examines the current state of ship network security, introduces the International Maritime Organization's resolution on ship network security management, and summarizing the cyber-attacks in maritime so the readers can have a general understanding of maritime environment.

Information System of Anti-Crisis Management in the Context of Ensuring National Security

  • Kryshtanovych, Myroslav;Antonova, Liudmyla;Pohrishchuk, Borys;Mironova, Yulia;Storozhev, Roman
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.719-725
    • /
    • 2021
  • The main purpose of the study is to determine the main aspects of information support for anti-crisis management in the context of ensuring national security. In modern conditions, under the influence of COVID-19, it becomes important to develop a modern paradigm for the transformation of anti-crisis management, based on the determination of the laws of state development on the basis of the imperative of national interests and territorial integrity. These are, firstly, the patterns of development of the state system of public administration, secondly, the patterns of development of a complex of state interests, and thirdly, patterns of development of the modern model of the country's territorial integrity. As a result of the study, the key aspects of the anti-crisis management system were identified in the context of ensuring the security of national interests.

Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구 (A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture)

  • 나상엽;노시춘
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

일반망과 보안망을 연계한 네트워크 보안체계 설계 (A Design for Network Security System via Non-security Common Network)

  • 조창봉;이상국;도경철
    • 한국군사과학기술학회지
    • /
    • 제12권5호
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

네트워크 통합관리시스템과 보안스위치를 이용한 반송정수장 무선랜 구축사례 (The case study on wireless lan design technique for Bansong purification plant using network integrated management system and security switch)

  • 박은철;최현주
    • 상하수도학회지
    • /
    • 제32권4호
    • /
    • pp.309-315
    • /
    • 2018
  • Currently, the commercialization of the $5^{th}$ Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.

원형 좌표계를 이용한 센서네트워크 키 관리 기법 (Management Scheme of Sensor Network using Circular Coordinates)

  • 홍성식;유황빈
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.71-80
    • /
    • 2006
  • 센서네트워크는 매우 제한된 자원을 갖는 작은 노드들로 구성되어 온도, 진동 등의 지역적 정보를 수집하고 통신망을 통하여 이들 정보를 제공한다. 센서네트워크는 일반적으로 매우 작고 제한적인 자원을 갖는 노드들로 구성되므로 이러한 노드들에 보안 서비스를 추가하는 것은 상당히 어려운 문제이다. 센서네트워크의 안정성을 위해서는 일반 네트워크 노드들에 비하여 보다 더 효율적인 키 관리 기법이 필요하다. 본 논문에서는 원형 좌표계를 이용한 위치 정보를 기반으로 키 관리하는 기법을 제시한다. 원형좌표계의 원점을 중심으로 노드와 노드간의 상대적인 위치 정보를 이용하여 키를 생성하였다. 이러한 방법은 대칭적 위치 구조에 의해 키 생성이 다른 방법에 비하여 간결하면서도 효율적임을 보였다.

  • PDF