Abstract:
인위적인 통신을 이용하여 제어 시스템의 네트워크에서 트래픽 추이 및 통신 패턴을 보호하는 장치에 관한 것이다. 일 실시예에 따르면, 그 장치는 네트워크에 설치되어 인위적인 통신을 생성하고 필터링하는 통신 단말 장치와, 그 통신 단말 장치에 현재시간에 인위적인 통신을 생성할지 여부를 결정하여 송신측 통신 단말 장치에 인위적인 통신 생성을 요청하고, 수신측 통신 단말 장치에 그 인위적인 통신을 필터링하도록 요청하는 통신 서버 장치를 포함할 수 있다.
Abstract:
The present invention relates to a communications control method using a MAC address in a smart grid environment and an apparatus thereof. The communications control method comprises the steps of: detecting the connection of a terminal by a communications control device; determining whether the terminal corresponds to a product of an authorized company based on a manufacturing company of the detected terminal; using the MAC address corresponding to the terminal to distinguish a path, if the terminal is to be applicable to the product of the authorized company; requesting a smart grid network IP address or a general net IP address according to the distinguished path to an address providing server; and controlling the communications with a network gateway according to the IP address received from the address providing server.
Abstract:
The present invention relates to a network security apparatus and a method thereof. The network security method comprises steps of: the network security apparatus receiving network security apparatus setup information, a security policy and a log generation policy from an external device; checking whether the security policy is corresponding to a setup type; in the case that the security policy is corresponding to the setup type, monitoring whether a communication node to which the network security is applied performs a communication according to the security policy; generating a monitoring log based on the log generation policy, and checking whether the monitoring log is corresponding to a log setup type; and in the case that the log generation policy is corresponding to the log setup type, transmitting a security log generated based on the log generation policy to the external device and performing network security. [Reference numerals] (110) Management part; (115) Security policy storage part; (120) Security policy monitoring part; (130) Security detection part; (135) Monitored log storage part; (140) Log safety detection part; (150) Log transmission part; (AA) S port; (BB) A port; (CC) B port
Abstract:
PURPOSE: A remote monitoring control apparatus, a remote monitoring control command authentication apparatus, and a control command authentication method are provided to block a fake control command, thereby preventing damage due to wrong command operation. CONSTITUTION: A control command is transmitted to a remote monitoring control command authentication apparatus(130) from a remote monitoring control apparatus(110). The remote monitoring control command authentication apparatus performs user authentication and server authentication. The remote monitoring control command authentication apparatus transmits a received control command to a remote terminal apparatus(140). The remote terminal apparatus performs an authentication process with respect to the remote monitoring control command authentication apparatus. The remote terminal apparatus performs a corresponding control command according to an authentication result.