• Title/Summary/Keyword: Security networks

Search Result 1,811, Processing Time 0.028 seconds

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

A Technical Assessment of Possibility Sanction for Assistance to DPRK (대북 바이오가스플랜트 지원의 제재 가능성에 대한 기술적 평가)

  • Chung, Yongjin;Kwon, Yongchai
    • Journal of Energy Engineering
    • /
    • v.24 no.4
    • /
    • pp.192-199
    • /
    • 2015
  • Under the economic banner of "self-reliance," North Korea has focused on hydro and thermal power as its main energy supply sources. However, in the face of extreme energy penury caused by machinery and material supply instability in the wake of the collapse of the former communist block as well as equipment aging and deterioration due to floods and other disasters, North Korea and international aid organizations are increasingly turning their attention toward energy source diversification. In particular, renewable energy is recognized as the best strategic energy source for North Korea and it is a decentralized energy option that is suitable in light of North Korea's power distribution networks and its pursuit of self-reliance. Biogas can contribute to improving the human rights situation of North Koreans in conjunction with an increase in food production. For this reason, renewable energy is the most promising option for an energy source that is likely to secure humanitarian aid from international organizations such as the Food and Agricultural Organization (FAO) and the World Food Programme (WFP). However, the implementation of such humanitarian aid has been hampered by rising concerns about the diversion of provided energy materials for military purposes and the disguised introduction of dual use items strategic materials as well as UN Security Council resolutions and sanctions of the international community against North Korea's military provocation, including nuclear tests and missile launches. This paper explores the possibility of solving this dilemma and proceeding with the humanitarian aid to North Korea by evaluating the potential for sanction and the risk of diversion of the possible products for biogas-related aid on the basis of the list of UN-sanctioned items.

A Method for Scalar Multiplication on Elliptic Curves against Differential Power Analysis using Efficient Key-Randomization (효율적인 키-난수화를 사용한 차분 전력 분석 공격에 대응하는 타원곡선 위의 스칼라 곱셈 방법)

  • Jung, Seok Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.356-363
    • /
    • 2020
  • As a becoming era of Internet-of-Things, various devices are connected via wire or wirless networks. Although every day life is more convenient, security problems are also increasing such as privacy, information leak, denial of services. Since ECC, a kind of public key cryptosystem, has a smaller key size compared to RSA, it is widely used for environmentally constrained devices. The key of ECC in constrained devices can be exposed to power analysis attacks during scalar multiplication operation. In this paper, a key-randomization method is suggested for scalar multiplication on SECG parameters. It is against differential power analysis and has operational efficiency. In order to increase of operational efficiency, the proposed method uses the property 2lP=∓cP where the constant c is small compared to the order n of SECG parameters and n=2l±c. The number of operation for the Coron's key-randomization scalar multiplication algorithm is 21, but the number of operation for the proposed method in this paper is (3/2)l. It has efficiency about 25% compared to the Coron's method using full random numbers.

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN (차세대 전술정보통신체계에서의 무선 메쉬 MSAP 노드 간 상호 인증 기법)

  • Son, Yu-Jin;Bae, Byoung-Gu;Shon, Tae-Shik;Ko, Young-Bae;Lim, Kwang-Jae;Yun, Mi-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.385-394
    • /
    • 2012
  • The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.

Site Monitoring of Crews and Passengers on Board by the BLE and PLM Combination (BLE와 PLM 조합의 승선자 위치 모니터링)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.463-467
    • /
    • 2015
  • When unforeseen accidents occur in a ship, it is important to save passengers safely and remove them from the accident area quickly. To solve such a situation, site information of passengers on board always must be identified. This paper implemented a site monitoring of crews and passengers based on the BLE and PLM combination, to prepare for unexpected accidents of the ships. This system was composed of BLE tag for crews, passengers and each room, PLM networks, data server, and monitoring PC. In this system, site information derived from the tag attached to the bodies and cabins of crews and passengers are transmitted through a power line network, and monitored on the screen of a monitoring PC. The proposed system guides them into the only authorized area considering the ship security and passengers' safety, and even has a special alarm call to warn them after entering an unauthorized area. This system enables the BLE-embedded tag battery to use for a long time because the BLE consumes low electric power, and can gain an economic advantage.

Spatial-Sensor Observation Service for Spatial Operation of GeoSensor (GeoSensor의 공간연산을 확장한 Spatial-Sensor Observation Service)

  • Lee, Hyuk;Lee, Yeon;Chung, Weon-Il;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.35-44
    • /
    • 2011
  • Advances in science and technology have made a lot of changes in our life. Especially, sensors have used in various ways to monitor in real time and analyze the world effectively. Traditional sensor networks, however, have used their own protocols and architecture so it had to be paid a lot of additional cost. In the past 8 years, OGC and ISO have been formulating standards and protocols for the geospatial Sensor Web. Although the OGC SWE initiatives have deployed some components, attempts have been made to access sensor data. All spatial operations had to calculate on the client side because traditional SOS architecture did not consider spatial operation for GeoSensor. As a result, clients have to implement and run spatial operations, and it caused a lot of overload on them and decreased approachableness. In this paper we propose S-SOS for in-situ and moving GeoSensor that extends 52 North SOS and provides spatialFilter and spatialFinder operations. The proposed S-SOS provides an architecture that does not need to edit already deployed SOSs and can add spatial operations as occasion. Additionally we explain how to express the spatial queries and to be used effectively for various location based services.

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

A Study on the Trend of Digital Content Industry (디지털 콘텐츠 산업동향에 관한 연구)

  • BAE, Sung-Pil
    • Industry Promotion Research
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2021
  • The content of the information age does not simply convey content but includes all the transactions that arise from its interaction. The types and forms of information being traded through this interaction are recognized differently from the contents that have been passed on to mankind so far by creating new meaningful content. Because the distribution of interactive content transcending the concept of time-to-time in the network environment is an important component of access to added value in the new world, unlike the content of simple concepts seen in the products of communication so far. In this study, the purpose of this study is to recognize the current status and problems of the Korean digital content industry and to seek ways to revitalize the Korean digital content industry to lead the global market in the future. Specifically, first, we want to learn about the concept of digital content. Second, we would like to look at the industrial trends of digital content at home and abroad. Third, we present a plan to streamline digital content. Fourth, derive research results and implications. In this work, the following results are derived: First, in order for Korea to enter a digital content powerhouse, each government department must first break away from the selfishness of the ministry and actively cooperate to efficiently establish and implement various policies. Second, e-books should be introduced just as current paper and CD-ROM titles are exempt from VAT, and security solutions, related technology development, and copyright issues should be urgently addressed to revitalize the market. Third, the demand for high-quality content should increase as information infrastructure such as high-speed information and communication networks and satellite broadcasting is established.

Critique of the Revitalization Trajectory of Bilbao (스페인 빌바오의 지역발전 재생 경로)

  • Kim, Kyoung-Hwan;Moon, Seung-Hee;Jung, Hye-Yoon;Hong, Jin-Ki
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.3
    • /
    • pp.258-273
    • /
    • 2019
  • Bilbao, Spain, made a mark as a example of the regional revitalization by culture and tourism. Korean Government have a perspective that culture and tourism could be an alternative to the regional crisis of manufacturing in 2018. The main purpose of this study is to analyze the locational specificity and the revival strategies for the regional development of Bilbao in a structural context. This could provide implications to the regional crisis of Korea. The main results are summarized as follows. Firstly, the local government of Bilbao has taken an active role, using not only its political and financial autonomy but also its locational advantage as an important nodal region of transnational trade networks in Europe. Secondly, Bilbao was able to sustain its regional revitalization initiatives for a long period by facilitating public-private partnership system. Finally, despite the effectiveness of the mega project and place marketing, low job security and the polarization of the service sector have emerged as a problem at the same time. Still, the deindustrialization of Bilbao could be possible due to the various services including knowledge-based services and financial services as well as culture and tourism.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.