DOI QR코드

DOI QR Code

서비스 기반 정보시스템의 안정성 증대를 위한 보안정책 최적화 균형모듈에 관한 연구

A Study on the Optimized Balance Module of Security Policy to Enhance Stability in the Service-Based Information System

  • 투고 : 2018.07.26
  • 심사 : 2018.12.15
  • 발행 : 2018.12.31

초록

2018년 현재 보안시장은 새로운 변화와 기술들로 인해 보안분야의 진보적인 발전과 혁신이 필요한 시점으로 도래되고 있다. 이는 빠른 서비스 기반의 정보시스템과 서비스 플랫폼의 비약적인 발전을 말하기도 한다. 따라서 본 논문에서는 다양한 서비스가 존재하는 온라인 상에서 특정한 서비스를 선정하는 기준이 아닌 다수의 서비스를 운영하고 보안성을 확보하는 과정을 대상으로 정보시스템들이 운영하는 플랫폼에 대한 관리자의 접근권한을 보호하고 서비스 제공부터 파기까지의 일련의 흐름 속에서 불법적인 침해와 접근이 가능한 영역과 해당 영역에 대한 보안을 위해 최적화 균형모듈을 전체 서비스 플랫폼에 최대 4가지 분류로 제한하고 제한된 보안영역에 대해서는 각각 또 다시 하위 보안정책과 기술 적용을 함으로써 정보시스템의 안전성과 보안성을 제공하고 확대하기 위한 기법과 이를 적용하는 과정을 제안한다.

Presently in 2018, the security market is requiring progressive development and innovation in the area of security on account of new changes and technologies. This means the rapid and prompt development of the service platforms and service-based information systems. Here, this study is going to examine the process of operating a number of services and obtaining security, not the criteria for selecting particular service in online environment where the various services exist. Within a series of flows to protect the manager's authority about the platforms operated by information systems, and to provide and destroy services, this author limits the entire service platforms of the optimized balance module into four categories maximum for the security of the area apt for illegal invasion and access, and the proper area. Also, about the area with limited security, this researcher again applies subordinate security policy and technology respectively. This author here will suggest a method to provide and to extend safety and security for the information system and also propose the process of applying it as well.

키워드

KCTSAD_2018_v13n6_1155_f0001.png 이미지

그림 1. 서비스 기반의 안정성 증대 보안정책 균형모듈 기준 적용환경 Fig. 1 Service-based stability enhancement Security policy balance module standard application environment

KCTSAD_2018_v13n6_1155_f0002.png 이미지

그림 2. 서비스 기반 정보시스템 플랫폼 보안정책 적용에 따른 최적화 균형모듈 설계 Fig. 2 Design of optimization balance module according to application of service-based information system platform security policy

표 1. 온라인 정보운영과 활용을 위한 서비스 제공형태의 정보시스템 현황 Table 1. Information system in the form of providing service for online information operation and utilization

KCTSAD_2018_v13n6_1155_t0001.png 이미지

표 2. 네트워크 경로 접근 및 시스템 취약점 종류 Table 2. Network path access and system vulnerability types

KCTSAD_2018_v13n6_1155_t0002.png 이미지

표 3. 정보시스템 접속을 위한 네트워크 경로 기반의 공격현황 Table 3. Network path based attacks for information system access

KCTSAD_2018_v13n6_1155_t0003.png 이미지

표 4. 정보시스템 서비스 플랫폼의 4가지 보안영역 분류 Table 4. Classification of 4 security areas of information system service platform

KCTSAD_2018_v13n6_1155_t0004.png 이미지

참고문헌

  1. J. Hom, S. Heon, and T. Mhung, "A Sudy on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability," J. of the Korea Society of Digital Industry and Information Management, vol. 6, no. 3, Sept. 2010, pp. 49-57.
  2. J. Jang, D. Mim, and C. Jhoi, "Study on Hybird Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, June 2016, pp. 611-618. https://doi.org/10.13067/JKIECS.2016.11.6.611
  3. S. Park and N. Kim, "A Verification Csae Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, Apr. 2017, pp. 295-300. https://doi.org/10.13067/JKIECS.2017.12.2.295
  4. J. Song, B. Kim, and H. Kim, "A Design of A Modbus Application Protocol for Multiple SCU Connections," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 642-649. https://doi.org/10.5762/KAIS.2018.19.4.642
  5. H. Choi and Y. Cho, "Analysis of Security Threats from Increased Usage of Mobile App Services," J. of the Korea Society of Digital Industry and Information Management, vol. 14, no. 1, Mar. 2018, pp. 45-55. https://doi.org/10.17662/KSDIM.2018.14.1.045
  6. I. Kim, H. Lim, D. Ji, and J. Park, "A Efficient Network Security Management Model in Industrial Control System Environments," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 4, Apr. 2018, pp. 664-673. https://doi.org/10.5762/KAIS.2018.19.4.664
  7. B. Cha, S. Park, and J. Kim, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, Aug. 2015, pp.891-900. https://doi.org/10.13067/JKIECS.2015.10.8.891
  8. Y. Shin, S. Han, I. Jae, and J. Lee, "A Study on the Linkage between Intelligent Security Techno.logy based on Spatial Information and other Technologies for Demonstration of Convergence Technology," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 1, Jan. 2018, pp. 622-632. https://doi.org/10.5762/KAIS.2018.19.1.622
  9. K. Kim, D. Wang, and S. Ban, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 1, Feb. 2017, pp. 147-154. https://doi.org/10.13067/JKIECS.2017.12.1.147
  10. Y. Hee, Y. Seo, and W. Kim, "Hardware Implementation for High-Speed Generation of Computer Generated Hologram," J. of the Korea Society of Digital Industry and Information Management, vol. 9, no. 1, Mar. 2013, pp. 129-139.
  11. J. Lee and J. Lee, "Efficient Hierarchical Mobility Management Scheme for Mobile Content Centric Networking," J. of the Korea Academia-Industrial cooperation Society, vol. 19, no. 2, Feb. 2018, pp. 37-41. https://doi.org/10.5762/KAIS.2018.19.2.37
  12. S. Jung, D. Kum, and S. Choi, "Channel Grade Method of multi-mode mobile device for avoiding Interference at WPAN," J. of the Korea Society of Digital Industry and Information Management, vol. 11, no. 3, Sept. 2015, pp. 91-98. https://doi.org/10.17662/ksdim.2015.11.3.091