• Title/Summary/Keyword: VPN security

Search Result 179, Processing Time 0.021 seconds

Implementation of Image Security System for CCTV Using Analysis Technique of Color Informations (색 정보 분석 기법을 이용한 효율적인 CCTV 영상 보안 시스템의 구현)

  • Ryu, Su-Bong;Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.219-227
    • /
    • 2012
  • This paper describes the design and implementation of an efficient image security system for CCTV using the analysis technique of color informations. In conventional approaches, the compression and encryption techniques are mainly used for reducing the data size of the original images while the analysis technique of color information is first proposed, which eliminates the overlapping part of the original image data in our approach. In addition, security-enhanced CCTV image security system is presented using SSL/VPN tunneling technique. When we use the method proposed in this paper, an efficient image processing is enable for a mount of information, and also security problem is enhanced. Through the implementation results, the proposed method showed that the original image information are dramatically reduced.

A Configuration of LINUX router VPN using FreeS/WAN IPSEC (FreeS/WAN IPSEC을 이용한 LINUX 라우터 VPN 구성)

  • 김한철;이계상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.499-502
    • /
    • 2001
  • FreeS/WAN[l] 은 LINUX 상에서 네트워크 보안 프로토콜표준인 IPSEC을 구현한 공개 S/W이다. 현재 LINUX Project로 수행되고 있으며 1.91 version 까지 나와 있다. 라우터와 라우터간에 IPSEC을 사용하여 통신함으로써 access control, connectionless integrity, data origin authentication, protection against replays, confidentiality의 서비스를 보장받을 수 있고, 또한 이러한 서비스들은 IP 계층에서 제공되기 때문에 IP 계층뿐만 아니라 그 이상의 계층에 대한 보호를 제공한다. [2] 본 논문에서는 LINUX router에 FreeS/WAN IPSEC을 설치하여 Security Gateway를 구성하고, 이 Security Gateway를 통해 전형적인 가상사설망을 구성할 수 있음을 보였다. 양단의 Security Gateway에 설치되어진 FreeS/WAN으로 VPN connection을 설정하고, 인증방법으로 RSA authentication key를 setup 하였다. IPSEC을 통하여 암호화되어진 데이터로 양단의 Gateway 구간에서 보안통신이 이루어짐을 알아본다.

  • PDF

A Study on Emerging IP VPN Services and ISP Security Architecture (IP VPN 서비스의 출현과 ISP 보안 구조에 대한 연구)

  • Lee, Seung-Min;Nam, TaeK-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2129-2132
    • /
    • 2003
  • 현재 ISP 에서 제공하는 보안 서비스는 보안 솔루션이 적용되는 위치관점에서 개별 고객망 기반의 보안 구조로 볼 수 있다. 이는 확장성과 외부 공격에 대한 대응 등에 많은 한계점을 가지고 있다. 최근 이러한 문제점을 해결하고 보다 다양한 보안 서비스를 가능하게 하는 네트워크 기반의 보안 구조가 대두되고 있다. 본 논문에서는 먼저 ISP 보안 구조의 변화에 많은 영향을 끼친 IP VPN 서비스의 출현에 대하여 살펴보고, 앞으로 ISP의 주된 보안 구조가 될 네트워크 기반의 보안 구조에 대하여 논의해 보기로 한다.

  • PDF

Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication (IPsec VPN 위성통신에서 인증알고리즘이 미치는 영향 분석)

  • Jeong, Won Ho;Hwang, Lan-Mi;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.147-154
    • /
    • 2015
  • Satellite broadcasting networks, like if you have if you have just received information that everyone must bring the required security attributes this earth should be done as encryption. In this paper, a satellite communication network AH additional security header in transport mode IPsec VPN by applying the SHA-256 and MD-5 authentication algorithm to authenticate the data portion Error rate and analyze the BER and Throughput. First, to generate a normal IP packet added to IPsec transport mode security header AH were constructed internal authentication data by applying the SHA-256 and MD-5 algorithm. Channel coder was applied to the Rate Compatible Punctured Turbo Codes, packet retransmission scheme Hybrid-ARQ Type-II and Type-III were used. Modulation method was applied to the BPSK, the wireless channel Markov channel (Rician 80%, Rayleigh 20% and Rician 90%, Rayleigh 10%) as an authentication algorithm according to the satellite channel state analyzed how they affect the error rate and Throughput.

High Availability and Load Balancing for Virtual Private Networks by Multiple Links (링크 다중화를 통한 가상 사설망의 고가용성 및 부하 분산 기법)

  • Kwon, Jin-Baek
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.51-56
    • /
    • 2008
  • A combination of VPNs and dial-up access, such as DSL and Cable, usually provides the cost-effective solution as the substitution of private networks on high-cost leased line. The business demand for high availability has increased with VPN spreading. This paper presents the schemes for a high availability of network access and a load balancing of network traffic in VPN gateways by using multiple links or multihoming capability based on active-active approach. The high availability and load balancing of network links can be achieved by duplicating external network access into multiple independent links. This can provide a continuous network connection to internal users even if one of the links is failed. Moreover, it can provide twice network bandwidth by distributing the traffic into the links. Static and dynamic algorithms are proposed as the load balancing algorithms.

  • PDF

Smart Gateway VPN Tunneling Control System based on IoT (IoT 기반 스마트 게이트웨이 VPN 터널링 제어 시스템)

  • Yang, Seungeui;Kim, Changsu;Lee, Jongwon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.575-576
    • /
    • 2017
  • Recently, research have smart gateways can provide additional services through the IoT and Big Data. However, the existing System is number of devices connected increases to the Server, the stability of the network is degraded and data security is poor. In this paper, we design a smart gateway VPN tunneling control system based on IoT to solve these problems. we propose an effective VPN tunneling technology for low-end targets such as routers, and a method for efficiently controlling traffic in real-time in an environment where the quality of the Internet line changes dramatically. It is possible to control the sensor in the home safely through the VPN at the remote place.

  • PDF

VPN(Virtual Private Network)기술의 개요

  • 정태명
    • Review of KIISC
    • /
    • v.9 no.4
    • /
    • pp.3-10
    • /
    • 1999
  • 현재의 산업 상황은 제한적인 내부 네트워크의 사용만으로는 충분히 뒷받침할수 없 는 새로운 업무형태로 바뀌었다. 기업에서는 내부 네트워크의 구성뿐만 아니라 증가하는 지 사나 이동 근무자나 재택근무자들을 지원하기 위한 네트워크 확장이 필요하게 되었다. 그러 나 기존 네트워크 구성에서 사용하던 전용선이나 PSTN을 이용하는 방법은 많은 비용 때문 에 기업에 과중한 부담을 가져오게 되었으며 이에 대한 해결책으로 VPN이 제안되었다. VPN은 공중망을 매개로 한 가상적인 네트워크 구성으로서 네트워크 확장에 소요되는 비용 을 크게 절감하고 네트워크 관리를 용이하게 하였다. 특히 근래에 인터넷 사용자가 급격하 게 증가하면서 보안 솔루션으로서의 IP 기반 VPN에 대한 관심이 집중되고 있다, 본 고에서 는 VPN 기술의 전반적인 내용에 대해 소개하고 VPN의 핵심기술이라 할수 있는 터널링 기 술을 IPsec 중심으로 살펴보기로 한다.

  • PDF

An Efficient and Secure Handover Mechanism for MVPN Services (MVPN 서비스 제공을 위한 효율적이고 안전한 핸드오버 메커니즘)

  • Woo, Hyun-Je;Kim, Kyoung-Min;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.62-72
    • /
    • 2007
  • Mobile Virtual Private Network (MVPN) provides VPN services without geographical restriction to mobile workers using mobile devices. Coexistence of Mobile IP (MIP) protocol for mobility and IPsec-based VPN technology are necessary in order to provide continuous VPN service to mobile users. However, Problems like registration failure or frequent IPsec tunnel re-negotiation occur when IPsec-based VPN Gateway (GW) and MIP are used together. In order to solve these problems, IETF proposes a mechanism which uses external home agent (x-HA) located external to the corporate VPN GW. In addition, based on the IETF proposal, a mechanism that assigns x-HA dynamically in the networks where MN is currently located was also proposed with the purpose to reduce handover latency as well as end-to-end delay. However, this mechanism has problems such as exposure of a session key for dynamic Mobility Security Association (MSA) or a long latency in case of the handover between different networks. In this paper, we propose a new MVPN protocol in order to minimize handover latency, enhance the security in key exchange, and to reduce data losses cause by handover. Through a course of simulation, the performance of proposed protocol is compared with the existing mechanism.

VPN-swIPe

  • 천광철
    • Review of KIISC
    • /
    • v.9 no.4
    • /
    • pp.11-18
    • /
    • 1999
  • VPN 또는 침입차단시스템 간 비밀 통신의 기본구조로 사용되는 IP 네트워크 보안 (IPnetwork-layer security)프로토콜인 swIPe 프로토콜에 대하여 설명한다. 우선 swIPe 프 로토콜에 대하여 분석하고 침입차단시스템에서 이를 실제로 적용하는 방법에 대하여 서술한 다. swIPe 프로토콜에서는 swIPe 개요, 개념적 구조 swIPe를 이용한 통신 절차, 패킷의 포 맷 encryption과 decryption 프로세스등을 서술하며 실제 적용에서는 Host-to -Host 터널링 침입차단시스템간 비닐통신 절차 swIPe driver에 대하여 설명한다.

  • PDF

Efficient security solution structure design for enterprise security management system (통합 보안 관리 시스템 구축을 위한 효율적인 보안 솔루션 구조 설계)

  • Kang Min-gyun;Han Kun-Hee;Ha Kyung-Jae;Kim Seok-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.824-831
    • /
    • 2005
  • Past corporaion's network security system is single security solution, or mixed several ways, but there was inefficient system because doing not get into organic link But, constructed more strong security system by ESM enterance on. ESM uses way to integrate of each agent to manage easily various kinds security solution. That is, it is system that connect system of existent VPN, FireWall, IDS and so on configurationally depending on security policy and manage. ESM is security system that is developed more than existent security system. But, practical use of network and the development speed of technology being increasing with the mon faster speed, is heightening the level more as well as dysfunction of information crime and so on. Many improvements are required at ESM system, this research wished to make up for the weak-point in the ESM system about interior security. Studied on structure of security solution that is basis of security policy. VPN, Firewall, IDS's link that is main composition of existing security system analysis, reconstructed. And supplemented security of ESM system itself. Establish imaginary intrusion and comparative analysis access data that apply each Telnet Log analysys IDS existent ESM system and proposed ESM system comparative analysis. Confirm the importance of interior security and inspected security of proposed system.