• 제목/요약/키워드: security model

검색결과 3,960건 처리시간 0.04초

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Two-Stage Model for Security Network-Constrained Market Auction in Pool-Based Electricity Market

  • Kim, Mun-Kyeom
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권6호
    • /
    • pp.2196-2207
    • /
    • 2017
  • This paper presents a two-stage market auction model in a pool-based electricity market, which explicitly takes into account the system network security. The security network-constrained market auction model considers the use of corrective control to yield economically efficient actions in the post-contingency state, while ensuring a certain security level. Under this framework, the proposed model shows not only for quantifying the correlation between secure system operation and efficient market operation, but also for providing transparent information on the pricing system security for market participants. The two-stage market auction procedure is formulated using Benders decomposition (BD). In the first stage, the market participants bid in the market for maximizing their profit, and the independent system operator (ISO) clears the market based on social welfare maximization. System network constraints incorporating post-contingency control actions are described in the second stage of the market auction procedure. The market solutions, along with the BD, yield nodal spot prices (NSPs) and nodal congestion prices (NCPs) as byproducts of the proposed two-stage market auction model. Two benchmark systems are used to test and demonstrate the effectiveness of the proposed model.

이동 에이전트 기술에서의 보안성 문제 분석 (Analyses of Security Issues in Mobile Agent Technology)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.815-818
    • /
    • 2007
  • As wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the kamework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

무선 이동 Ad hoc 네트워크에서의 보안성 문제 분석 (Analyses of Security Issues in Wireless Mobile Ad Hoc Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 추계종합학술대회
    • /
    • pp.737-740
    • /
    • 2007
  • A s wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the framework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

A Novel Abnormal Behavior Detection Framework to Maximize the Availability in Smart Grid

  • Shin, Incheol
    • 스마트미디어저널
    • /
    • 제6권3호
    • /
    • pp.95-102
    • /
    • 2017
  • A large volume of research has been devoted to the development of security tools for protecting the Smart Grid systems, however the most of them have not taken the Availability, Integrity, Confidentiality (AIC) security triad model, not like CIA triad model in traditional Information Technology (IT) systems, into account the security measures for the electricity control systems. Thus, this study would propose a novel security framework, an abnormal behavior detection system, to maximize the availability of the control systems by considering a unique set of characteristics of the systems.

인터넷 뱅킹 사용과 보안우려의 관계: 기술수용모형의 확장 (The Relationship between Use of Internet Banking and Security Anxiety: Extending TAM)

  • 황하진;이웅규
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2003년도 춘계학술대회
    • /
    • pp.93-105
    • /
    • 2003
  • Although, recently, studies on Internet banking users' behavior have been frequently found in some academic journals, most of them have ignored security anxiety which may be considered as important factors influencing usages of Internet banking. We propose an research model for Internet banking users which is an extended version of the Technology Acceptance Model(TAM) by adding new variable, security anxiety. For empirical support of our model, we survey for 298 samples and analyze it by structured equation model(SEM). In result, our proposed model is proved as a valid one in which all hypotheses except one are accepted and the values of model fitness are relatively high.

  • PDF

다단계 보안통제가 가능한 확장된 역할기반 접근통제 모델 (Extended Role Based Access Control Model with Multilevel Security Control)

  • 김학범;홍기융;김동규
    • 한국정보처리학회논문지
    • /
    • 제7권6호
    • /
    • pp.1886-1902
    • /
    • 2000
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandator Access Control). In this paper, e newly propose ERBAC\ulcorner(Extended RBAC\ulcorner) model by considering subject's and object's roles and security levels for roles additionally to RBAC\ulcorner model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC\ulcorner model provides finer grained access control with multilevel security on he base of subject and object level than RBAC\ulcorner model.

  • PDF

Advanced insider threat detection model to apply periodic work atmosphere

  • Oh, Junhyoung;Kim, Tae Ho;Lee, Kyung Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1722-1737
    • /
    • 2019
  • We developed an insider threat detection model to be used by organizations that repeat tasks at regular intervals. The model identifies the best combination of different feature selection algorithms, unsupervised learning algorithms, and standard scores. We derive a model specifically optimized for the organization by evaluating each combination in terms of accuracy, AUC (Area Under the Curve), and TPR (True Positive Rate). In order to validate this model, a four-year log was applied to the system handling sensitive information from public institutions. In the research target system, the user log was analyzed monthly based on the fact that the business process is processed at a cycle of one year, and the roles are determined for each person in charge. In order to classify the behavior of a user as abnormal, the standard scores of each organization were calculated and classified as abnormal when they exceeded certain thresholds. Using this method, we proposed an optimized model for the organization and verified it.

사물인터넷 환경에서 침해사고대응 교육과정 모델에 관한 연구 (A Study on the Infringement Incident Response Curriculum Model in IoT Environment)

  • 이근호
    • 사물인터넷융복합논문지
    • /
    • 제9권3호
    • /
    • pp.55-60
    • /
    • 2023
  • 사물인터넷 환경은 보안 위협에 상당히 취약하며, 침해사고가 발생하면 큰 피해를 줄 수 있다. 사물인터넷 환경의 보안을 강화하기 위해서는 사물인터넷 환경의 특성을 고려한 교육과정이 필요하다. 본 논문에서는 사물인터넷 환경에서의 침해사고대응 교육과정 모델을 제안하고자 한다. 제안된 교육과정 모델은 사물인터넷 환경의 보안 위협, 침해사고의 종류, 침해사고대응 절차 등을 위한 모델로 설계하였다. 제안된 교육과정 모델은 사물인터넷 환경에서의 보안 인식을 향상시키고, 사물인터넷 분야에서의 침해사고대응 전문가를 양성하는 데 기여가 예상된다. 제안된 교육과정 모델은 사물인터넷 환경의 보안을 강화하고, 사물인터넷에서의 침해사고대응을 통한 안전성이 기대된다.

중소기업 정보보호관리 모델의 개발: 실증 연구 (Developing Information Security Management Model for SMEs: An Empirical Study)

  • 이정우;박준기;이준기
    • Asia pacific journal of information systems
    • /
    • 제15권1호
    • /
    • pp.115-133
    • /
    • 2005
  • This study is to develop an information security management model(ISMM) for small and medium sized enterprises(SMEs). Based on extensive literature review, a five-pillar twelve-component reference ISMM is developed. The five pillars of SME's information security are: centralized decision making, ease of management, flexibility, agility and expandability. Twelve components are: scope & organization, security policy, resource assessment, risk assessment, implementation planning, control development, awareness training, monitoring, change management, auditing, maintenance and accident management. Subsequent survey designed and administered to expose experts' perception on the importance of these twelve components revealed that five out of tweleve components require relatively immediate attention than others, especially in SME's context. These five components are: scope and organization, resource assessment, auditing, change management, and incident management. Other seven components are policy, risk assessment, implementation planning, control development, awareness training, monitoring, and maintenance. It seems that resource limitation of SMEs directs their attention to ISMM activities that may not require a lot of resources. On the basis of these findings, a three-phase approach is developed and proposed here as an SME ISMM. Three phases are (1) foundation and promotion, (2) management and expansion, and (3) maturity. Implications of the model are discussed and suggestions are made for further research.