Abstract:
본 발명은 네트워크 장치(라우터 등)에 유입된 트래픽의 정보를 분석하여, 유입 트래픽이 네트워크의 성능을 저하시킬 우려가 있는 경우 유입 트래픽이 외부로부터의 공격 트래픽인 지 혹은 과다 유입 트래픽인 지 등 비정상 트래픽에 해당하는 지에 관하여 분석하는 장치 및 그 방법에 관한 것이다. 본 명세서에서 개시하는 비정상 트래픽 정보 분석 장치는 트래픽 처리 시스템으로 유입되는 트래픽을 캡쳐하여 상기 유입 트래픽의 정보를 검출하는 트래픽 정보 검출부; 및 상기 트래픽 정보 검출부로부터 상기 유입 트래픽의 정보를 받아 상기 이전 트래픽 정보와의 비교 결과인 시그너쳐를 생성하는 시그너쳐 생성부를 포함하여 본 발명의 목적 및 기술적 과제를 달성한다.
Abstract:
A file security system uses a security class set by an access control module. The file security system includes a disk, a kernel memory and an encryption file system. The disk includes a key file in which an encryption key corresponding to the security class is stored and a file encoded by the encryption key. The encryption key stored in the disk is loaded into the kernel memory when the file security system starts operating. The encryption file system extracts an encryption key corresponding to a security class of a file that a user intends to read or store; decodes or encodes the file by using the extracted encryption key; and then provides the decoded file to the user or stores the encoded file in the disk.
Abstract:
PURPOSE: An access control system and method is provided to secure a secrecy irrespective of an openness of a system OS, and to maintain a security against a system hacking by using a daemon determining an access authority and a security kernel performing a communication with the daemon via a character process device. CONSTITUTION: The method comprises steps of generating a packet to be requested via a system call module within a security kernel(S411), inserting the packet into a request list(S412), waking up a process sleeping at a read queue of a character process queue(S413), making the process sleep at a write process queue(S414), enabling a daemon, having an access authority and sleeping at the write queue of the character process device, to receive a request from a corresponding character process device and bring a corresponding packet from the request list(S421), checking if the corresponding packet exists at the request list(S422), if the corresponding packet exists at the request list, copying the brought packet at a user mode space(S423), if it does not, sleeping at the read queue(S424), if the security kernel wakes up a process sleeping at the read queue, instantly processing the request transmitted to the packet(S425), copying a response packet from the user space to a kernel space(S426), waking up the process sleeping at the write queue, and then executing the security kernel for receiving the result(S427), and giving back an execution result to a kernel module requesting an access control approval(S415).
Abstract:
PURPOSE: An access control method for an access control system using identification base is provided to flexibly and efficiently compose permission groups by being expanded to a specific user and a specific group and providing the permission of a corresponding object to the expanded specific user and specific group. CONSTITUTION: An access control list regarding a corresponding object(250) is stored in a security DB(240). The object(250) is classified into other user except for a user and a group, a specific user, and a specific group. The access control list is provided to the classified user and specific group. The access control list of the corresponding object(250) is stored in the security DB(240) using an NDBM(New DataBase Manager).
Abstract:
본 발명은 네트워크 장치(라우터 등)에 유입된 트래픽의 정보를 분석하여, 유입 트래픽이 네트워크의 성능을 저하시킬 우려가 있는 경우 유입 트래픽이 외부로부터의 공격 트래픽인 지 혹은 과다 유입 트래픽인 지 등 비정상 트래픽에 해당하는 지에 관하여 분석하는 장치 및 그 방법에 관한 것이다. 본 명세서에서 개시하는 비정상 트래픽 정보 분석 장치는 트래픽 처리 시스템으로 유입되는 트래픽을 캡쳐하여 상기 유입 트래픽의 정보를 검출하는 트래픽 정보 검출부; 및 상기 트래픽 정보 검출부로부터 상기 유입 트래픽의 정보를 받아 상기 이전 트래픽 정보와의 비교 결과인 시그너쳐를 생성하는 시그너쳐 생성부를 포함하여 본 발명의 목적 및 기술적 과제를 달성한다.
Abstract:
PURPOSE: An apparatus and a method for encrypting user authentication information and data using MAC(Mandatory Access Control) and RBAC(Role Based Access Control) are provided to perform an encrypting process corresponding to a grade of the user information by encrypting selectively a transmitting file according to an important grade of the transmitting file. CONSTITUTION: An apparatus for encrypting user authentication information and data using MAC and RBAC includes an FTP client program(10), a kernel layer(20), an FTP demon program(15), and a security database(30). The FTP client program(10) provides a user authentication information request and a server connection request. The kernel layer(20) is used for requesting the user authentication according to the server connection request of the FTP client program. In addition, the kernel layer is used for performing an encrypting/decrypting processing data of the FTP client program when being connected by a grade of MAC corresponding to the user authentication request. The FTP demon program(15) is used for analyzing the encrypted user authentication information and performing a user authentication process according to the grade of MAC. The security database(30) is used for storing the grade of MAC for the client and the grade of MAC for the data.
Abstract:
PURPOSE: An apparatus and a method for providing a reliable channel in a security OS(Operating System) to which MAC(Mandatory Access Control) is applied is provided to offer a new header for independently encoding a packet used in communication by a security level of the MAC and minimize network performance degradation using the security level of the MAC. CONSTITUTION: If data according to a communication request provided from a transmission-side user(S1) are for a packet transmission request, a reliable channel subsystem(12) judges whether a reliable channel is applied. If the reliable channel is applied, the reliable channel subsystem(12) composes a reliable channel header, encodes a specific portion of a packet, stores authentication information in the reliable channel header, and transmits the packet through a network(A). A MAC module(20) provides MAC information for indicating whether the reliable channel is applied. A kernel memory(30) provides an encryption key and an authentication key necessary for encoding a reliable channel application host address and the packet and generating authentication data. A reliable channel subsystem(12-1) retrieves the authentication data of the reliable channel header before decoding the packet received through the network(A). If the authentication data are valid, the reliable channel subsystem(12-1) decodes the encoded packet. If process for the reliable channel is ended, the reliable channel subsystem(12-1) transmits the packet to an upper level to transmit the packet to a reception-side user(S2). A kernel memory provides an authentication key and an encryption key necessary for checking authentication with respect to the packet encoded by the reliable channel subsystem(12) and decoding the packet.
Abstract:
PURPOSE: A file security system using a security level and a method for managing an encryption key are provided to encrypt or decrypt a file having the security level by using the encryption key of each security level, and to offer the file to a user, or save the file in a disk. CONSTITUTION: The disk(130) stores the encryption key matched with the security level set by an access control module(120), a key file storing the encryption key, and the file encrypted by the encryption key. A kernel memory(140) stacks the encryption key stored in the disk(130) according to the driving of the encryption file system(110). The encryption file system(110) draws out the encryption key matched with the security level of the file to read or stored by the user from the kernel memory(140), and transmits the file decrypted or encrypted by the encryption key to the user, or stores the file in the disk.
Abstract:
본 발명은 강제적 접근 제어가 적용된 보안 운용 체제에서의 신뢰 채널 제공 장치 및 방법에 관한 것으로, 송신 측면에서 송신측 사용자로부터 제공된 통신 요청에 따른 데이터가 패킷 전송 요청일 경우, 신뢰 채널 적용 여부를 판단하여 신뢰 채널이 적용되면, 신뢰 채널 헤더를 구성하고, 패킷의 특정 부분을 암호화하며, 인증 정보를 신뢰 채널 헤더에 저장하여 네트워크를 통해 송신하는 신뢰 채널 서브 시스템; 신뢰 채널 적용 여부에 대한 정보를 제공하는 강제적 접근제어(Mandatory Access Control, MAC) 모듈; 신뢰 채널 서브 시스템에서 신뢰 채널 적용 정보 및 암호, 인증 키 등을 제공하는 커널 메모리; 수신 측면에서 네트워크를 통해 수신된 패킷을 복호화하기 전에 신뢰 채널 헤더 부분의 인증 데이터를 검색하고, 인증 데이터가 유효하면, 암호화된 패킷을 복호화하고, 신뢰 채널 수행에 대한 처리가 끝나면, 상위 레벨의 입력 처리 부분으로 전달하는 루틴을 이용해 패킷을 상위 레벨로 전달하여 수신측 사용자에게 전달하는 신뢰 채널 서브 시스템; 암호화된 패킷의 복호화에 필요한 인증 및 암호 키를 제공하는 커널 메모리를 구비한다. 따라서, 사용자가 보안 등급을 가지고 있지 않을 경우에는 데이터의 보호보다 전송에 더 큰 비중을 두어 암호화 대신 전송에 시스템 자원을 더 많이 제공하고, 사용자가 보안 등급을 가지고 있고, 그리고 그 보안 등급의 강도에 따라 각기 다른 키와 알고리즘을 적용하여 보안 등급이 높을수록 전송보다는 보안에 더 큰 비중을 두어 암호화에 시스템 자원을 활용할 수 있는 효과가 있다.
Abstract:
Disclosed is an access control method using a token having security attributes in a computer system when a user gains access to a specific file. The computer system adopts a token having encryption, modification, execution, and provision attributes to determine access permission or access denial between a user and a file in such a way that a file access request is controlled. The access control method enciphers a file and stores the enciphered file in a storage unit, so that it can maintain security of the file even though the storage unit is stolen. The access control method enables a system manager to read only enciphered contents of the file when the system manager performs a data backup operation, thereby eliminating limitations in commonly operating a system simultaneously with maintaining file security. The access control method enables programs for executing operations on behalf of a user to automatically obtain a corresponding token, confirms authority to execute the file, and prevents that the authority is stolen or drained due to a program error.