• Title/Summary/Keyword: Security-Zone

Search Result 220, Processing Time 0.036 seconds

Applying CBR algorithm for cyber infringement profiling system (사례기반추론기법을 적용한 침해사고 프로파일링 시스템)

  • Han, Mee Lan;Kim, Deok Jin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1069-1086
    • /
    • 2013
  • Nowadays, web defacement becomes the utmost threat which can harm the target organization's image and reputation. These defacement activities reflect the hacker's political motivation or his tendency. Therefore, the analysis of the hacker's activities can give the decisive clue to pursue criminals. A specific message or photo or music on the defaced web site and the outcome of analysis will be supplying some decisive clues to track down criminals. The encoding method or used fonts of the remained hacker's messages, and hacker's SNS ID such as Twitter or Facebook ID also can help for tracking hackers information. In this paper, we implemented the web defacement analysis system by applying CBR algorithm. The implemented system extracts the features from the web defacement cases on zone-h.org. This paper will be useful to understand the hacker's purpose and to plan countermeasures as a IDSS(Investigation Detection Support System).

A Study On RFID Security Enhancement Protocol Of Passive Tag Using AES Algorithm (AES 알고리즘을 이용한 수동형 태그의 RFID 보안 강화 프로토콜에 관한 연구)

  • Kim, Chang-Bok;Kim, Nam-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • Recently arithmetic circuit of lightweight AES symmetric key algorithm that can apply to passive tag have been developed, then security protocol of RFID system using AES symmetric encryption techniques have been proposed. This paper proposed security enhancement protocol of RFID system using lightweight AES arithmetic circuit and random number generator of passive tag. The proposed protocol have AES algorithm and random number generator at server, reader, tag, and transmit encrypted message by separate secret key using random number at each session. The mutual authentication of tag and reader used reader random number and tag random number. As a result, proposal protocol reduce authentication steps of the existing mutual authentication protocol, and reduce amount of computation of tag, and demonstrate as secure protocol to every attack type of attacker by decrease communication step of Air Zone.

A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network (Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

Algorithm of Line dangerous Index and Predicting Distance Relay Zone 3 acting time by using real time data (실시간 데이터를 이용한 선로 위험도 산출 알고리즘 및 거리계전기 Zone 3 동작 예측 알고리즘)

  • Kim, Jin-Hwan;Lee, Seung-Jae;Choi, Myeon-Song;Lim, Il-Hyung;Lim, Seong-Il;Kim, Sang-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.278_279
    • /
    • 2009
  • Nowaday, many people study about Black-Out. In this paper, I introduce how to calculate the Dangerous Index against Black-Out, and prediction of Distance relay error action on Zone 3. we consider the real data by I-PIU which will be set on the system. The dangerous Index is calculated three index about Cascading. The prediction of Distance relay is considered by other facilities of power system. This two algorithm can be used on the center system, when the system is on danger, also on the normal states for security.

  • PDF

A Study on the Prospect of Customs Free Zone in Korea (우리나라의 관세자유지역의 전망에 관한 연구)

  • 김용진
    • Journal of Korea Port Economic Association
    • /
    • v.19 no.2
    • /
    • pp.141-158
    • /
    • 2003
  • There are several Customs Free Zone in Korea. Those are Susan Port, Kwangyang Port, Inchun Port. and International Airport Inchun. And there are several zone which will be appointed soon, Busan Port area, Kwangyang Port area, Inchun Port and International Airport Inchun area. But there are many problems to operate CFZ in Korea. This paper aim at pointing out for the problems and drawing up the plan. The problems are an unreasonable incentive standard, security of the behind site related to CFZ, present customs law not to process and assemble, and several similar system related CFZ. Globalization and regionalization are major trends in the international economic system recently. So we have to make desperate efforts to win the severe competition among many countries in economic aspect and make a good plan to solve the problems related CFZ in future.

  • PDF

A Framework on secure remote control in plant system (안전한 공장 원격제어 시스템 프레임 워크)

  • Lee, Jaemin;Mun, Jiman;Jung, Souhwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.989-992
    • /
    • 2012
  • 본 논문에서는 안전한 공장 원격제어를 위한 시스템 프레임 워크를 제안한다. 공장기계와 IT의 융합으로 기술 발전함에 따라 공장 제어 시스템을 공장내부에서는 무선 제어시스템, 공장 외부에서는 원격 시스템의 필요성이 대두되어 많은 연구들이 진행되고 있다. 기존의 공장 자동화 시스템 SCADA(Supervisory Control And Data Acquisition)는 생산 공정 및 플랜트의 상태를 감시하고 제어하기 위한 목적으로 개발되었지만 원격제어 관련 내용이 부족하다. 공장 내부 보안을 위한 표준으로 ISA99 Security Standards에서도 통합 공정 제어 Zone & Conduits 방식 제시 공장의 각 영역을 Zone으로 나누고 허가된 사용자만 Conduit를 통해 다른 Zone의 노드와 통신을 하는 방식을 제안하였다. 하지만, 전체적인 프레임워크는 정의를 하고 있으나 외부 원격 제어 내용 부족하다. 따라서 본 논문에서는 스마트폰을 활용한 공장 외부에서의 안전한 원격 제어를 제공하는 통합관제시스템 프레임워크 구조를 제시하여 향후 관련 기술에 대한 기준점을 제시한다.

A Storage Method to Enhance Cookie File Security (쿠키파일의 보안성 향상을 위한 저장 방식)

  • Sim, Won-Tae;Choi, Yo-Han;Seo, Hee-Suk;Noh, Bong-Nam
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • Cookie file can be properly protected by designing security zone to enhance the safety of cookie file vulnerable to cyber attacks. In this paper, the model, in which cookie file is stored in the security area and the current visiting page is closely linked with cookie, is proposed to help users utilize in the same existing way, as well as enhance the security of user cookie files. Even if attacker tries to compromise web browser's cookie folder, the security of other cookies can be preserved. It is possible since the folder has the only cookie for the current web page where user is visiting.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.

A Empirical Study on Influence of Safety on Elementary School Road Considering Commuting Distance & Mode Type (통학거리 및 수단특성을 반영한 초등학교 안전도 영향관계 실증연구)

  • Kim, Tae Ho;Kim, Seung Hyun;Lee, Soo Il
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.6
    • /
    • pp.139-147
    • /
    • 2015
  • This study deals with actual commuting distance and influence of risk factors depending on commuting distance and mode in order to reestablish actual commuting zone of primary school students. Data mining analysis(CHAID) was applied for this reestablishment using survey results from 6,927 primary school students in Seoul Metro. Six risk factors; convenience level of commuting path condition, convenience level of road crossing condition, vehicle speed on commuting path, segregation level between commuter and vehicle, congestion level of commuting path, and public security level and two mode; walking and cycle are considered in the analysis. As the results of CHAID analysis, commuting distance was divided into four zones; Internal Zone(0.491km under), External Zone(0.492 ~ 1.492km, 1.493 ~ 2.699km), Commutable Zone(2.70km over), and awareness level on safety is declined as commuting distance is increased. The risk factor affecting on safety is recognized differently by students depending on commuting distance and mode. For students commuting by walking, vehicle speed on commuting path and convenience level of commuting path condition are recognized as the prime risk factor within Internal Zone and Commutable Zone, respectively. For students commuting by cycle, convenience level of road crossing condition and vehicle speed on commuting path are recognized as the prime risk factor within Commutable Zone. Analysis results show that improved plan and program for commuting path for primary school students are required considering actual commuting distance and method.