DOI QR코드

DOI QR Code

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi (Dept. of Convergence Infor. Security, Graduate Sch., Jeju Natl. University) ;
  • Park, Jeonghun (Dept. of Conv. Infor. Security, Graduate Sch., Jeju Natl. University) ;
  • Park, Namje (Dept. of Computer Education, Teachers College, Jeju Natl. University)
  • Received : 2019.07.15
  • Accepted : 2019.08.12
  • Published : 2019.08.30

Abstract

In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Keywords

References

  1. Eun-hye Han, In-seok Kim, "Efficient Operation Model for Effective APT Defense," Journal of the Korea Institute of Information Security and Cryptology, Vol. 27, Issue 3, pp. 501-519, June 2017. https://doi.org/10.13089/JKIISC.2017.27.3.501
  2. D. Lee, N. Park, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment," Personal and Ubiquitous Computing, Vol. 22, Issue 1, pp. 3-10, Feb. 2018. https://doi.org/10.1007/s00779-017-1017-1
  3. Ji-Sang Lee, Jung-Eun Jee, Yong-Tae Shin, "A Study on Network Partition to Cope with Cyber Attack," Proceedings of the Korean Information Science Society Conference, Korean Information Science Society, pp. 313-315, June 2011.
  4. N. Park and M. Kim, "Implementation of load management application system using smart grid privacy policy in energy management service environment," Cluster Computing, Vol. 17, Issue 3, pp. 653-664, Sep. 2014. https://doi.org/10.1007/s10586-014-0367-y
  5. Jungeun Jee, Sangji Lee, Sungryoul Lee, Byungchul Bae, Yongtae Shin, "A Logical Network Partition Scheme for Cyber Hacking and Terror Attacks," Journal of KISS : Information Networking, Vol. 39, No. 1, pp. 95-101, Feb. 2012.
  6. D. Lee and N. Park, "Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance," International Journal of Supercomputing, pp. 1-16, 2016.
  7. Sung-hoon Lee, "A Study on Separate Plan of Efficient Information System Network in Partitioned Network Environment," http://www.riss.kr/link?id=T12468570, pp. 12-33, June 2011.
  8. J. Kim, N. Park, G. Kim, and S. Jin, "CCTV Video Processing Metadata Security Scheme Using Character Order Preserving-Transformation in the Emerging Multimedia," Electronics, Vol. 8, No. 4, pp. 412, Apr. 2019. https://doi.org/10.3390/electronics8040412
  9. Mi-hwa Lee, Ji-won Yoon, “A Study on Detection Method of Multi-Homed Host and Implementation of Automatic Detection System for Multi-Homed Host,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 28, No. 2, pp. 457-469, Apr. 2018. https://doi.org/10.13089/JKIISC.2018.28.2.457
  10. N. Park and N. Kang, "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle," Sensors, Vol. 16, No. 1, pp. 1-16, Dec. 2015. https://doi.org/10.3390/s16010001
  11. Seung Jae Jeon, Hun Yeong Kwon, “Public Enforcement and Private Enforcement of Technical and Organizational Measures for Protecting Personal Information,” Journal of Law & Economic Ragulation, Vol. 11, No. 2, pp. 269-291, Dec. 2018.
  12. Namje Park, Hyo-Chan Bang, "Mobile middleware platform for secure vessel traffic system in IoT service environment," Security and Communication Networks, Vol. 9, Issue 6, pp. 500-512, April 2016. https://doi.org/10.1002/sec.1108
  13. Jin-Woo Park, Hong-Ki Min, Hwanyong Lee, "A Study of Data Exchange System to Prevent Information Leakage Between Intra-Network and Inter-Network," Korea Computer Graphics Society, pp. 156-157, July 2017.
  14. D. Lee, N. Park, Geonwoo Kim, and Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment," Peer-to-Peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, Nov. 2018. https://doi.org/10.1007/s12083-018-0637-1
  15. Namje Park, Hongxin Hu, and Qun Jin, "Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT)," International Journal of Distributed Sensor Networks, Vol. 2016, Article ID 2965438, 3 pages, 2016.
  16. Youn-seo Jeong, Ki-Dong Nam, "An Investigation of Network Separation Solution for Government Network," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 1125-1126, June 2011.
  17. Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, and Howon Kim, "WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment," Advanced Web and Network Technologies, and Applications, LNCS, Vol. 3842, pp. 741-748, Jan. 2006.
  18. Donghyeok Lee, Namje Park, “ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment,” International Journal of Engineering & Technology, Vol. 7, No. 2.33, pp. 151-154, Mar. 2018.
  19. Namje Park, Donghyeok Lee, "Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment," Personal and Ubiquitous Computing, Vol. 22, Issue 1, pp. 3-10, Feb. 2018. https://doi.org/10.1007/s00779-017-1017-1
  20. Donghyeok Lee, Namje Park, “A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 28, No. 2, pp. 417-428, Apr. 2018. https://doi.org/10.13089/JKIISC.2018.28.2.417
  21. Namje Park, "Information Exchange between VTSCs for Secure Next-generation Vessel Traffic System," International Information Institute (Tokyo). Information, Vol. 20, Iss. 2B, pp. 1309-1316, Feb. 2017.
  22. Donghyeok Lee, Namje Park, "A Proposal of Privacy-Enhanced Deduplication Technique in a Cloud Environment," The Journal of Korean Institute of Information Technology, Vol. 16, No.5, pp. 91-102, May 2018. https://doi.org/10.14801/jkiit.2018.16.5.91
  23. Jinsu Kim, Sangchon Kim, and Namje Park, "Access Control Masking Mechanism to Dynamic Image Identification Information," The Journal of Korean Institute of Information Technology, Vol. 17, No. 7, pp. 95-101, Jul. 2019. https://doi.org/10.14801/jkiit.2019.17.7.95
  24. Donghyeok Lee, Namje Park, “Institutional Improvements for Security of IoT Devices,” Journal of the Korea Institute of Information Security & Cryptology, Vol. 27, No. 3, pp. 607-615, June 2017. https://doi.org/10.13089/JKIISC.2017.27.3.607
  25. Jinsu Kim, Sangchon Kim, and Namje Park, "Face Information Conversion Mechanism to Prevent Privacy Infringement," The Journal of Korean Institute of Information Technology, Vol. 17, No. 6, pp. 115-122, June 2019. https://doi.org/10.14801/jkiit.2019.17.6.115
  26. Namje Park, Byung-Gyu Kim, and Jinsu Kim, "A Mechanism of Masking Identification Information regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission ," Electronics, Vol. 8, No. 7, pp. 735, June 2019. https://doi.org/10.3390/electronics8070735
  27. Jinsu Kim, and Namje Park, "Inteligent Video Surveilance Incubating Security Mechanism in Open Cloud Environments," The Journal of Korean Institute of Information Technology, Vol. 17, No. 5, pp. 105-116, May 2019. https://doi.org/10.14801/jkiit.2019.17.5.105
  28. Jinsu Kim, and Namje Park, "Development of a board game-based gamification learning model for training on the principles of artificial intelligence learning in elementary courses," Journal of The Korean Association of Information Education, Vol. 23, No. 3, pp. 229-235, June 2019. https://doi.org/10.14352/jkaie.2019.23.3.229
  29. Namje Park, “Privacy-Enhanced Deduplication Technique in Closed Circuit Television Video Cloud Service Environment,” International Journal of Engineering & Technology, Vol. 7, No. 3.24, pp. 321-325, Oct. 2018.