• Title/Summary/Keyword: secure operating system

Search Result 236, Processing Time 0.029 seconds

Design of the Security Evaluation System for Internet Secure Connectivity Assurance Platform (인터넷 패킷 보호 보증 플랫폼에서의 보안성 평가 시스템 설계)

  • 김상춘;한근희
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.207-216
    • /
    • 2004
  • IPsec protocol has been developed to provide security services to Internet. Recently IPsec is implemented on the various operating systems Hence, it is very important to evaluate the stability of the Ipsec protocol as well as other protocols that provide security services. However, there has been little effort to develop the tools that require to evaluate the stability of IPsec protocols. Therefore, in this paper, we develope the security requirements and suggest a security evaluation system for the Internet packet protection protocols that provide security services at the If level that can be used to check if the security protocols Provide the claimed services correctly This system can be used as debugging tool for developing IPsec based security system.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.

Prevention of the Malfunction of the ATS Signaling System by Parallel Operation with ATC (철도신호시스템 병행운전(ATS/ATC)에 따른 ATS신호기 오동작개선)

  • Jeong, Rag-Gyo;Kim, Baek-Hyun;Kang, Seok-Won;Park, Geon-Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.7
    • /
    • pp.1019-1025
    • /
    • 2015
  • The performance requirements on the safety-based functionality of railway signal systems have been reinforced and the effort for enhancement of the existing system or development of the new system is being accordingly made. In particular, various technical researches on replacement or improvement of the existing ATS(Automatic Train Stop) signaling system are now in progress for better operational efficiency. In this study, the complementary points for improvement or replacement of the currently used system(i.e., ATS) will be derived in terms of operating efficiency in an integrated operating environment with the newly introduced system(e.g., ATC: Automatic Train Control). This study can contribute to derive the need for improvement of the signaling system by checking the interface problems and comparing between different systems through the analysis of real operation cases in the field. Eventually, this analysis can be applied to prevent and estimate the collision accidents can be caused by the failure of the signaling system in advance. In addition, the results can be used to provide a future direction to secure the reliability in the parallel operation by integration based on different railway signaling systems.

Design and Implementation of File Access Control Module for Secure Operating System Using on Windows (윈도우 기반의 보안 운영체제를 위한 와일 접근 제어 모듈 설계 및 구현)

  • 한석재;김완경;소우영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.131-137
    • /
    • 2004
  • With the rapid development of information sharing through network, If system is exposed to various threatener and security incident are became a social problem. As a countermeasure, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. In this paper, design and implementation of file access control module for secure operation system. The module, implemented in this paper, is based on Windows and has effect integrity and non-repudiation for a file.

  • PDF

Study on Optimal Power Flow Considering Voltage Stability Margin (전압안정도 여유를 고려한 최적조류계산에 관한 연구)

  • Kim, S.;Jeong, M.H.;Lee, B.;Song, K.Y.;NamGoong, J.;Choi, H.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.3-6
    • /
    • 2000
  • In this paper the concept of voltage stability operating limit in optimal power flow problem is described. A methodology of optimal power flow considering voltage stability margin is proposed based on auxiliary constraint to get a secure dispatch solution. The look-ahead margin is used to shift dispatch solutions to the secure direction in proposed framework. The a1gorithm proposed is successfully tested on IEEE 30-bus system.

  • PDF

Rotordynamic Design and Analysis of the Rotor-Bearing System of a 500Wh Flywheel Energy Storage Device (플라이휠 에너지 저장장치 회전체계의 동역학적 설계및 해석)

  • 최상규;김영철;경진호
    • Journal of KSNVE
    • /
    • v.8 no.1
    • /
    • pp.81-86
    • /
    • 1998
  • A 500Wh class high-speed Flywheel Energy Storage System (FESS) driven by a built-in BLDC motor/generator has been designed, which runs from 30000 to 60000rpm nominally. Due to the motor/generator inside, the flywheel rotor made of composites supported by PM/EM hybrid bearing system has a shape of bell or pendulum and thus requires accurate rotordynamic analysis and prediction of its dynamic behavior to secure the operating reliability. Rotordynamic analyses of the flywheel rotor-bearing system revealed that the bell shaped rotor has two conical rigid-body modes in the system operating range and the first conical mode, of which nodal point lies in the radial EM bearing position, can adversely affect the dynamic response of the rotor at the corresponding critical speed. To eliminate the possibility of wild behavior of the rotor, two guide bearings are adopted at the upper end of the rotor and motor/generator. It was also revealed that the EM bearing stiffness if 0.5~1.0E+6 N/m and damping of 2000 Ns/m are favirable for smooth operation of the system around the 2nd critical speed.

  • PDF

Rotordynamic Design and Analysis of the Rotor-Bearing System of a 500Wh Flywheel Energy Storage Device (플라이휠 에너지 저장장치 회전체계의 동역학적 설계 및 해석)

  • 최상규;김영철;경진호
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1997.04a
    • /
    • pp.283-289
    • /
    • 1997
  • A 500Wh class high-speed Flywheel Energy Storage System (FESS) driven by a built-in BLDC motor/generator has been designed, which runs from 30000 to 60000rpm nominally. Due to the motor/generator inside, the flywheel rotor made of composites supported by PM/EM hybrid bearing system has a shape of bell or pendulum and thus requires accurate rotordynamic analyses and prediction of its dynamic behavior to secure the operating reliability. Rotordaynamic analyses of the flywheel rotor-bearing system revealed that the bell shaped rotor has two conical rigid-body modes in the system operating range and the first conical mode, of which nodal point lies in the radial EM bearing position, can adversely affect the dynamic response of the rotor at the corresponding critical speed. To eliminate the possibility of wild behavior of the rotor, two guide bearings are adopted at the upper end of the rotor and motor/generator. It was also revealed that the EM bearing stiffness of 0.5~1.0E+6 N/m and damping of 2000 Ns/m are favorable for smooth operation of the system around the 2nd critical speed.

  • PDF

The Trends of Secure Operating System Technology for Mobile Platform (모바일 단말 보안 운영체제 기술 동향)

  • Bae, Geun-Tae;Kim, Gi-Yeong
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.4
    • /
    • pp.39-47
    • /
    • 2008
  • PC, 노트북 컴퓨터, 스마트폰, PDA, PMP, 텔레매틱스 단말 등 다양한 정보단말은 소형화, 모바일화, 복합화 추세에 있으며 이에 따라 다루는 정보, 접근하는 인터페이스, 서비스의 종류가 다양해지고 단말 자체의 이동성이 증가하여 보안 위험이 높아지고 있다. 또한 단말의 컴퓨팅 성능과 서비스의 질적 향상으로 모바일플랫폼이 데스크톱 환경 수준의 일반적인 환경으로 발전하게 되어 요구되는 보안 수준 역시 높아지고 있다. 본 고에서는 Linux, Windows 등 데스크톱 운영체제를 비롯하여 Wqnit 등 모바일 플랫폼까지 보안 요구사항과 기술 추세를 살펴보고 향후 발전방향에 대하여 논의해 보고자 한다.

A Design of Loadable Kernel Module enhancing the security on Solaris 8 (Solaris 8 기반의 보안 강화용 LKM(loadable Kernel Module) 설계)

  • 최은정;심원태;김명주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.853-855
    • /
    • 2002
  • 안전한 운영체제(Secure Operating System)는 컴퓨터 운영체제의 보안상 결함으로 인하여 발생 가능한 각종 해킹으로부터 시스템을 보호하기 위하여 기존의 운영체제 내에 보안 기능을 통합시킨 보안 커널(Security Kernel)을 추가로 이식한 운영체제이다. 본 논문에서는 polaris 8에서 동작하는 보안 커널을 설계하기 위해 안전한 운영체제와 보안 커널 개발 기술, 솔라리스 운영체제 및 커널 기술을 살펴본다. 이를 토대로 RBAC(Role-Based Access Control)을 지원하고 시스템의 취약점을 감시하는 Solaris 8 기반의 보안 강화용 LKM(Loadable Kernel Module)을 설계한다.

  • PDF