• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.035 seconds

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

A New Intruder Traceback Mechanism based on System Process Structure (시스템 프로세스 구조에 기반을 둔 침입자 추적 메커니즘)

  • 강형우;김강산;홍순좌
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.233-239
    • /
    • 2004
  • In this paper, we describe a defense mechanism to cope with stepping stones attacks in high-speed networks. (Stepping stones Attacker launches attacks not from their own computer but from intermediary hosts that they previously compromised.) We aim at tracing origin hacker system, which attack target system via stepping stones. There are two kind of traceback technology ; IP packet traceback, or connection traceback. We are concerned with connection traceback in this paper. We propose a new host-based traceback. The purpose of this paper is that distinguish between origin hacker system and stepping stones by using process structure of OS(Operating System).

  • PDF

An Authentication Interworking Mechanism between Multiple Wireless LANs for Sharing the Network Infrastructure (망 인프라 공유를 위한 무선랜 시스템들간의 상호 인증 연동 방법)

  • Lee Wan Yeon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.451-458
    • /
    • 2004
  • The previous studies focussed on the security problem and the fast re-authentication mechanism during handoffs in a single wireless LAN system. When the multiple wireless LAN systems share their network infrastructure one another, we propose an authentication mechanism allowing the subscriber to Perform the authentication procedure with the authentication server of its own wireless LAN system even in areas of other wireless LAN systems as well as in areas of its own wireless LAN system. In the proposed mechanism, the access point or the authentication server of other wireless LAN systems plays a role of the authentication agent between the subscriber and the authentication server of the subscriber's wireless LAN system. The proposed authentication mechanism is designed on the basis of the 802.1X and EAP-MD5 protocols.

National Defense Decision-Making : Prospects and New Directions (국방의사결정 : 전망과 대비방향)

  • Gwon Tae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.16 no.1
    • /
    • pp.18-34
    • /
    • 1990
  • In light of the recent developments of transitory nature, it is likely that national defense decision-making will be more difficult to make for years to come. In other words, sudden changes in security environment would call into question the basic assumptions on which we have built our national defense planning and increase the number of the uncertain factors in the decision-making process; the subdivision and ramification of national defense management would increase the factors for decision-making and complicate even further the mutual interactions among these factors; the accelerated pace of sophistication and diversification of weapon systems and military technology would increase the risk of failure and system costs geometrically; and the reduced level of acceptance among the people on the sanctification of national defense in proportion to the rapid progress toward a more democratic and industrial society would engender an increased criticism or checking role by the National Assembly or by the mass media. As the changes in national defense environment and conditions create an innumerable number of new tasks, this paper intends to suggest a few core policy measures to improve the quality of national defense decision-making. More specifically, it proposes to 1) eradicate entirely the bureaucratic behavior and tendencies; 2) utilize actively the brain staff for quality assurance of decision-making; 3) and introduce and apply as a whole set, a total system, or an incorporated pack age the PPBEES(Planning-Programming-Budgeting-Executing-Evaluating-System)/LCMM (Life-Cycle Management Model for System Acquision), the OR/SA(Operations Research/Systems Analysis), and DMIS (Defense Management Information System).

  • PDF

Analysis of the Safety Payment in Second-hand Transactions Using Text Mining (텍스트마이닝을 활용한 중고거래 안전결제 실태분석)

  • Eun-ji Kim;Beom-Soo Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.529-536
    • /
    • 2023
  • The secondhand market in Korea has been showing steady growth. However, the number of fraud cases and the amount of damages from fraudulent activities in secondhand transactions are also increasing. As of 2021, the size of the secondhand market reached 24 trillion won, but the total amount of fraud-related damages reached 360.6 billion won. In order to prevent fraud between individuals, secondhand trading platforms have implemented a safety payment system. However, new types of fraud methods exploiting the safety payment system have emerged, undermining the security of secondhand transaction safety payments. In this study, we aim to utilize text mining to examine the current state of the safety payment system in secondhand transactions and propose improvement measures by analyzing the system through text mining and network analysis.

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.

A Study on Node Authentication Mechanism using Sensor Node's Energy Value in WSN (WSN 환경에서 센서 노드의 에너지 값을 이용한 노드 인증 메커니즘에 관한 연구)

  • Kim, Bo-Seung;Lim, Hui-Bin;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.86-95
    • /
    • 2011
  • Sensor nodes in wireless sensor networks are vulnerable to security than wired network due to using limited hardware performance and wireless communications that network topology changes frequently. Among techniques to enhance the security, the node authentication mechanism is used to defend against data forgery attacks using the ID of the node or to interfere with the routing of the network routing. In this paper, we proposed the AM-E mechanism that makes authentication key by using the energy value of node requesting authentication and performs the communication procedures for data transfer between different nodes. Because the energy value of node is changed depending on time, every time the authentication request is, an authentication key is changed. These features enhance the security of sensor networks and will help to configure the more secure WSN.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Performance Analysis of a Satellite Communication System based on IPsec VPN (IPsec VPN 기반 위성 통신 시스템 성능 분석)

  • Jeong, Won-Ho;Hwang, Lan-Mi;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.53-60
    • /
    • 2015
  • Satellite signal is excellent broadband, can provide the same information in a wide range, but there is a disadvantage that much less of the security level of the data. Therefore, supplementation of safety is a serious problem than anything in the satellite communication. In this paper, it was simulated by applying ARIA in encryption technique and by applying transport mode, tunnel mode in security header AH and ESP in order to examine the effect of IPsec VPN. In addition, we had compare with general services that do not apply encryption in order to analyze the impact of the encryption algorithm. Channel, by applying the Markov channel and adding AWGN, is constituted a satellite communication environment. In case of retransmission based error control scheme, we applied Type-II HARQ scheme and Type-III HARQ scheme which are performance is a good way in recently, and it is constituted by a turbo code and BPSK modulation scheme. we were analyzed performance in BER and Throughput in order to compare the simulation more effectively.