DOI QR코드

DOI QR Code

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment

캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계

  • Ko, Bong-Koo (Department of Information Technology, Chonbuk University) ;
  • Park, Jong-Seon (Division of Computer Science and Engineering, Chonbuk University) ;
  • Chung, Seung-Jong (Department of Information Technology, Chonbuk University) ;
  • Cho, Gi-Hwan (Division of Computer Science and Engineering, Chonbuk University)
  • Received : 2013.12.16
  • Accepted : 2014.01.28
  • Published : 2014.03.31

Abstract

A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

대학전산망은 방화벽에 의한 접근제어를 근간으로 보안정책을 세분화, 다양화하고 있다. 그러나 정보의 탈취, 침해사고, 그리고 서비스 거부 등 보안위협이 줄어들지 않고 있다. 본 논문은 개방적 특성을 갖는 캠퍼스 전산망에서 정보보호 구성요소를 기준으로 보안대상에 적응적으로 보안을 강화할 수 있는 차등적인 보안정책 방안을 제시한다. 보안장비의 보안수준은 사용자와 보안대상의 사상에 의해 결정된다. 제안된 보안정책은 창의적인 캠퍼스 환경에서 비용 대비 보안효과를 극대화하고 사용자에게 빠르고 안정된 서비스 환경을 제공함을 목적으로 한다.

Keywords

References

  1. M. G. Kang and S. S. Kim, "Design and Implementation of Security Solution Structure to Enhance Inside Security in Enterprise Security Management System," Journal of the Korea Contents Association, vol. 5, no. 6, pp. 360-367, Dec. 2005.
  2. K. Y. Kim, S. W. Lee, and J. H. Kim, "A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure," Journal of the Institute of Electronics Engineers of Korea, vol. 50, no. 2, pp. 60-69, Feb. 2013. https://doi.org/10.5573/ieek.2013.50.2.060
  3. Y. J. Kim, S. Y. Lee, H. Y. Kwon, and J. I. Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Journal of the Korea Institute of Information Security and Cryptology, vol. 19, no. 1, pp. 103-111, Feb. 2009.
  4. KISA, "A Manual of Establishing and Managing a CERT," KISA Guide, no. 2010-13, Jan. 2010.
  5. Y. T. Kim, O. J. Kwon, J. M. Lee, and T. S. Kim, "Implementation and Design of Policy Based Security System for Integration Management," Journal of the Korea Multimedia Society, vol. 10, no. 8, pp. 1052-1059, Aug. 2007.
  6. G. J. Mun, Y. M. Kim, and B. N. Noh "A Performance Comparison of Network Attacks based on Selecting Statistical Criterion," Review of KIISC, vol. 19, no. 2, pp. 16-25, Apr. 2009.
  7. G. H. Lee and C. G. Lee, "A Risk Evaluation and Real-time Alert Alarm Generation for Responding Cyber Attacks in the Cyber Environment," Review of KIISC, vol. 18, no. 5, pp. 112-124, Oct. 2008.
  8. J. H. Yoo, J. H. Kim, G. R. Kim, and J. C. Na, "A Standardization Status of the Integrated Security Management and Cyber Trace Technologies," TTA Journal, no. 118, Aug. 2008.
  9. Cisco, "Integrated Security Architecture Framework," White paper.
  10. J. C. Ahn, "A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-base Security Policy," Journal of the Korea Institute of Information Security and Cryptology, vol. 14, no. 6 pp. 91-103, Dec. 2004.
  11. H. H. Choi and T. M. Chung, "Study on Generalization of Security Policies for Enterprise Security Management System," The KIPS Transactions, vol. 9, no. 6, pp. 823-830, Aug. 2002. https://doi.org/10.3745/KIPSTC.2002.9C.6.823
  12. J. D. Kim, K. W. Kim, and Y. D. Lee, "The Concept and Approach of Convergence Security," Review of KIISC, vol. 19, no. 6, pp. 68-74, Dec. 2009.
  13. W. S. Seo and M. S. Jun, "A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm," Journal of the Korea Institute of Information Security and Cryptology, vol. 21, no. 4, pp. 39-46, Aug. 2011.
  14. W. S. Jang, J. Y. Choi, and J. I. Lim, "A study on method of setting up the defense integrated security system," Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 3, pp. 575-584, Jun. 2012.

Cited by

  1. The rating model of corporate information for economic security activities pp.1743-4645, 2019, https://doi.org/10.1057/s41284-019-00171-z