• Title/Summary/Keyword: VPN system

Search Result 118, Processing Time 0.021 seconds

A Study on a Security Engineering Methodology for Information Security Systems Considering Quality and Cost (품질과 비용을 고려한 프로세스 기반의 보안공학방법론에 관한 연구)

  • Choi, Myeong-Gil
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.2
    • /
    • pp.23-43
    • /
    • 2009
  • For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

  • PDF

인터넷 보안: 가상사설망, 방화벽 그리고 침입탐지시스템

  • 임채훈;강명희
    • Information and Communications Magazine
    • /
    • v.17 no.3
    • /
    • pp.97-110
    • /
    • 2000
  • 인터넷은 본질적으로 신뢰할 수 없는 네트웍들의 집합체로, 정보의 흐름을 통제하기가 대단히 어렵기 때문에, 인터넷에 산재한 자원을 충분히 활용하면서, 내부의 중요한 자원을 인터넷으로부터 보호해 줄 수 있는 인터넷 보안이 가장 심각한 문제로 대두되고 있다. 본 고에서는 현재 인터넷 보안의 주류를 이루는 있는 가상사설망(VPN : Virtual Private Network)과 방화벽(Firewall), 그리고 방화벽의 부족한 부분을 보강해 줄 수 있는 침입탐지시스템(IDS: Intrusion Detection System)에 대한 기본 구현 기술들을 비교 분석해 본다.

  • PDF

Internet Key Exchange based on PKI in wireless environment (공개 키를 기반으로 하는 무선망에서의 암호화 키 분배 방법)

  • 안수현;한규호;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.139-141
    • /
    • 2002
  • 최근 보안에 관한 관심이 높아지면서 IPSec을 이용한 VPN system이 널리 이용되고 있다. IPSec에서 암호화에 사용되는 키를 생성하는 IKE는 IPSec의 핵심 프로토콜이지만다소 복잡하고 메시지 교환도 많아 패킷의 손실이 큰 무선망에는 적합하지 않다. 무선망에서 좀 더 효율적으로 동작하기 위한 인터넷 키 교환 방법 및 공개키 기반구조를 제시하였다.

  • PDF

Design and Implementation of the Alert Transport Interface between Secure Router and Management System (보안 라우터와 보안 관리 시스템과의 경보 전달 인터페이스 설계 및 구현)

  • 이호균;김정녀
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.287-290
    • /
    • 2003
  • 본 논문에서는 가까운 미래에 시장에서 요구하게 될 여러 보안 장비 형상 중에서 라우터 장비 자체 내에 침입 탐지, 서비스 거부 공격 대응, VPN 서비스 등과 같은 보안 기능을 구현하는 프로젝트의 일부로 보안 라우터와 보안 관리 장비 간 경보 전달 인터페이스의 설계 및 구현 과정을 보이고 있다.

  • PDF

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

A Study on the Feature and Improvement for e-Commerce of Parts Procurement in the Japanese Automobile Industry (일본의 자동차부품조달 전자상거래의 특징과 개선방안)

  • Han Kwang-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.273-282
    • /
    • 2005
  • The purpose of this study is how to apply to e-Commerce of parts procurement system in the Japanese Automobile Industry and examine the influence of that through the case studies of automobile makers. In the Japanese automobile industry, B2B e-Commerce of parts procurement system have a shifted from closed circuits through VAN to opened IP-VPN and eventually to the JNX of internet environment. The Japanese automobile industry depends mainly on IP-VPN and JNX, especially EDI on a one to one basis with parts procurement suppliers. As to the future direction of B2B e-Commerce of parts procurement in the Japanese automobile industry, many of commodity parts will be traded among established participants on internet websites owned by automobile maker groups. Finally, for improvement of B2B e-Commerce of parts procurement in the Japanese automobile industry I suggested that there are 'revitalize of e-Marketplace', 'improvement of IT and business process', 'extension of B2B e-Commerce among small and medium sized suppliers'.

  • PDF

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).

Design and Implementation of Ethernet and TDM Convergence System (이더넷/TDM 통합전달 시스템의 설계 및 구현)

  • Youn, Ji-Wook;Yeom, Kyung-Whan;Lee, Jong-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.237-240
    • /
    • 2005
  • We propose a fully converged Ethernet and TDM transport system. Developed Ethernet and TDM convergence system can support not only L2VPN service and premium multimedia service based on MPLS protocol but also TDM leased line service, simultaneously. Developed convergence system can provide high reliability for Ethernet data due to support protection and restoration function of circuit based networks. Evaluation for Ethernet and TDM path was successfully performed to show the typical application of the proposed system in the legacy networks.

  • PDF

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Biometrics System for User Authentication in e-biz (전자상거래에서 사용자 인증을 위한 생체측정 시스템)

  • 조동욱;이내준;한길성
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1329-1338
    • /
    • 2001
  • This paper describes the biometrics system for user authentication in electronic commerce. At present, social demands are increasing for information security techniques against the information wiretapping in open communications network. For this, these techniques such as anti-virus, firewall, VPN, authentication, cryptography, public key based systems and security management systems have been developed. This Paper discusses the user authentication for the implementation of efficient electronic payment systems. In particular. user authentication system has keen developed using biometrics techniques and the effectiveness of this paper is demonstrated by several experiments.

  • PDF