• Title/Summary/Keyword: Server Security

Search Result 1,250, Processing Time 0.027 seconds

Implementation of Linux Server System Monitoring and Control Solution for Administrator (관리자를 위한 리눅스 서버 시스템 모니터링 및 제어 솔루션 구현)

  • Yoon, Hyo-Jun;Park, Byung-Ho;Choi, Yong-Seok;Kim, Chong-Soo;Seong, Hyeon-Kyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.125-128
    • /
    • 2010
  • Linux server offers various kinds of service including web, FTP, and SSH. The users of these kinds of service are trying to hack by making use of it. That’s why some countermeasures are required for the security of the server. In this thesis, each type of service log of multiple Linux server was analyzed, and a solution was developed to monitor and control the multiple Linux server system not based on Linux but based on Windows.

  • PDF

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

Roaming Service Support Technique using CHAP in Wireless Internet (무선 인터넷 환경에서 CHAP 인증 기법을 이용한 로밍 서비스 지원 방법)

  • 박정현;유승재;양정모
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.53-60
    • /
    • 2004
  • We describe CHAP authentication for roaming service method of visited ISP subscriber on GPRS network. We also illustrate how visited mobile ISP subscriber can access ISP server and authenticate RADIUS in home network via Gateway GPRS Support Node (GGSN) on GPRS/UMTS network for wireless internet service and roaming. For this we propose the modified CHAP message format, PCO Message format at MT, and interworking message and format between GGSN and RADIUS in home ISP network for wireless internet service of mobile ISP subscriber at GPRS network in this paper. We also show authentication results when visited mobile ISP subscriber via CHAP at GPRS network accesses the RADIUS server in home ISP network.

  • PDF

A Tor Security Policy using Exit Relay Methodology (출구 릴레이 방법론을 이용한 Tor 보안 정책)

  • Jang, Duk-Sung;Park, So-Yeon;Choi, Du-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

The computer system of Mutual Saving Finance service using GIS in Client/Server environment (C/S환경에서 GIS를 이용한 신용금고업무 전산화시스템)

  • 안병규
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.161-165
    • /
    • 2000
  • In the past, the mutual saving finance service was managed by the Packages which consisted of the softwares managing data under the text mode environment. The data was mostly managed at only one place. So it becomes very important things that we efficiently deal various services and systematically support public-relation activities and efficient managements of a security mortgage. Therefor. we develope the system which efficiently manages customer service and management of a security mortgage by using GIS under the Client/server environment.

  • PDF

A study on an Infrastructure for Virus Protection (바이러스 차단 인프라 구조에 관한 연구)

  • Noh, Si-Choon;Kim, Su-Hee;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2005
  • Virus protection infrastructure managementis network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Improved virus protection infrastructure filters unnecessary mail at the gateway stage to reduce the load on server. As a result, numberof transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

A Non-Agent based Identification Scheme for Identifying Database Users in 3-tier System Environments (3-tier 시스템 환경에서 비 에이전트 방식의 데이터베이스 사용자 식별 방안)

  • Han, Jung Sang;Shin, Dong Cheon
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.147-159
    • /
    • 2018
  • The changes of internet environment have made services through web application server (WAS) popular. Accordingly, technical difficulties in identifying users who access databases through WAS were incurred. In order to solve these problems, many companies adopt an agent-based approach for identifying users by installing additional software on WAS. However, this approach must submit to some disadvantages in terms of cost, maintenance, and development process. In this paper, we devise an non-agent based approach for identifying database users in 3-tier environments.

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Delegated Attribute Certificate Validation And Protocol (PMI 인증서 검증 위임 및 검증 프로토콜)

  • 이승훈;송주석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2003
  • PMI(Privilege Management Infrastructure) certificates as well as Public-Key certificates must be validated before being used. Validation for a PMI certificate requires PMI certificate path validation, and PKC(Public-Key Certificate) path validations for each entity in the PMI certificate path. This validation work is quite complex and burdened to PMI certificate verifiers. Therefore, this paper suggests a delegated PMI certificate validation that uses specialized validation server, and defines a validation protocol which is used between validation server and client.