{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:55:42Z","timestamp":1774936542702,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021"],"award-info":[{"award-number":["2021"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Attackers\u2019 intrusion into the Enterprise LAN is increasing every year, and the method is becoming more intelligent and crafty. Various security measures against external network intrusions, such as firewalls, are being studied and applied to protect against external attacks, but it is difficult to respond to increasing attacks. Most institutions block access from the external network for the safety of the internal network and allow access from the internal network to the external network through some restricted ports. In particular, restricted ports in subject to a variety of security techniques to block intrusion into the internal network, but in the process, access to the internal network is only applied by restricted ports, making it inefficient to handle internal requests. Although various studies have been conducted on network isolation to address these challenges, it is difficult to perform tasks efficiently as security functions, such as detecting whether request data is attacked or not, during actual application. The proposed technique is a network-blocking-based network separation technique that converts data from the external network connected to the Internet into symmetry data from which malicious code is removed through an agent and delivers it to the client of the internal network. We propose a technique to provide access.<\/jats:p>","DOI":"10.3390\/sym13081550","type":"journal-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T23:19:33Z","timestamp":1629760773000},"page":"1550","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application"],"prefix":"10.3390","volume":"13","author":[{"given":"Won-Chi","family":"Jung","sequence":"first","affiliation":[{"name":"Department of Convergence Information Security, Graduate School, Jeju National University, Jeju 63293, Korea"}]},{"given":"Jinsu","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Convergence Information Security, Graduate School, Jeju National University, Jeju 63293, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4434-8933","authenticated-orcid":false,"given":"Namje","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Education, Teachar\u2019s College, Jeju National University, Jeju 63293, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"key":"ref_1","unstructured":"Kim, C.S. (2019). Policy Study on Elimination of Unnecessary Traffic in Network Detachment Environment. [Master\u2019s Thesis, Korea University]."},{"key":"ref_2","first-page":"137","article-title":"Network Structure and Spatial Separation","volume":"39","author":"Pavithra","year":"2012","journal-title":"Environ. Plan. B Urban Anal. City Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/0142-0615(80)90017-4","article-title":"A network separation scheme for emergency control","volume":"2","author":"Henner","year":"1980","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"ref_4","first-page":"539","article-title":"A Study of Unidirectional Data Transmission System Security Model for Secure Data transmission in Separated Network","volume":"5","author":"Lee","year":"2015","journal-title":"Asia Pac. J. Multimed. Serv. Converg. Art Humanit. Sociol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.cose.2019.05.016","article-title":"Designing an efficient security framework for detecting intrusions in virtual network of cloud computing","volume":"85","author":"Rajendra","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_6","first-page":"45","article-title":"Real-time security Monitoring assessment model for cybersecurity vulnerabilities in network separation situations","volume":"21","author":"Lee","year":"2021","journal-title":"J. Inf. Secur."},{"key":"ref_7","unstructured":"(2021, May 26). ISO 27001 Network Segmentation Overview. Available online: https:\/\/iso27001guide.com\/iso-27001-network-segmentation-overview-iso27001-guide-iso27001-guide.html."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3243","DOI":"10.1166\/jctn.2020.9168","article-title":"A Safe Web in Network Separation Environment","volume":"17","author":"Jung","year":"2020","journal-title":"J. Comput. Theor. Nanosci."},{"key":"ref_9","first-page":"77","article-title":"Safe Web Using Scrapable Headless Browser in Network Separation Environment","volume":"24","author":"Jung","year":"2019","journal-title":"J. Korea Soc. Comput. Inf."},{"key":"ref_10","first-page":"1071","article-title":"Network separation construction method using network virtualization","volume":"24","author":"Hwang","year":"2020","journal-title":"J. Korea Inst. Inf. Commun. Eng."},{"key":"ref_11","first-page":"664","article-title":"A Efficient Network Security Management Model in Industrial Control System Environments","volume":"19","author":"Kim","year":"2018","journal-title":"Korea Acad. Ind. Coop. Soc."},{"key":"ref_12","first-page":"95","article-title":"A Logical Network Partition Scheme for Cyber Hacking and Terror Attacks","volume":"39","author":"Jee","year":"2012","journal-title":"Korean Inst. Inf. Sci. Eng."},{"key":"ref_13","unstructured":"(2021, August 19). Act on the Protection of Information and Communications Infrastructure. Available online: https:\/\/www.law.go.kr\/LSW\/lsInfoP.do?lsiSeq=136754&viewCls=engLsInfoR&urlMode=engLsInfoR&chrClsCd=010202&lsId=009182#0000."},{"key":"ref_14","unstructured":"(2021, August 19). Personal Information Protection Act. Available online: https:\/\/elaw.klri.re.kr\/eng_mobile\/viewer.do?hseq=53044&type=lawname&key=personal+information."},{"key":"ref_15","unstructured":"(2021, August 19). Electronic Financial Trans-Actions Act. Available online: https:\/\/elaw.klri.re.kr\/kor_service\/lawView.do?hseq=44455&lang=ENG."},{"key":"ref_16","unstructured":"(2021, August 19). Enforcement Decree of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. Available online: https:\/\/elaw.klri.re.kr\/kor_mobile\/viewer.do?hseq=42587&type=part&key=43."},{"key":"ref_17","unstructured":"Jung, W.C. (2020). Technical Scheme for Network Separation: Focusing on the Web Data Transmission. [Master\u2019s Thesis, Jeju National University]."},{"key":"ref_18","unstructured":"Ali, M., Pierluigi, N., Alberto, L.S.V., and Jan, M.R. (2017, January 18\u201322). Optimized Design of a Human Intranet Network. Proceedings of the 2017 54th ACM\/EDAC\/IEEE Design Automation Conference (DAC), Austin, TX, USA."},{"key":"ref_19","first-page":"181","article-title":"Study of effectiveness for the network separation policy of financial companies","volume":"25","author":"Cho","year":"2015","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"ref_20","unstructured":"(2021, May 26). CVE-2014-6271. Available online: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2014-6271."},{"key":"ref_21","unstructured":"(2021, May 26). CVE-2014-6277. Available online: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6277."},{"key":"ref_22","unstructured":"(2021, May 26). CVE-2014-6278. Available online: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-6278."},{"key":"ref_23","unstructured":"(2021, May 26). CVE-2017-5638. Available online: https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-5638."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1080\/09720529.2020.1729509","article-title":"Competing secure text encryption in intranet using elliptic curve cryptography","volume":"23","author":"Arpana","year":"2020","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_25","unstructured":"(2021, May 26). A9:2017-Using Components with Known Vulnerabilities. Available online: https:\/\/owasp.org\/www-project-top-ten\/2017\/A9_2017-Using_Components_with_Known_Vulnerabilities."},{"key":"ref_26","unstructured":"(2021, May 26). CWE-20: Improper Input Validation. Available online: https:\/\/cwe.mitre.org\/data\/definitions\/20.html."},{"key":"ref_27","unstructured":"(2021, May 26). CWE-190: Integer Overflow or Wraparound. Available online: https:\/\/cwe.mitre.org\/data\/definitions\/190.html."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/8\/1550\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:50:02Z","timestamp":1760165402000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/8\/1550"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":27,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2021,8]]}},"alternative-id":["sym13081550"],"URL":"https:\/\/doi.org\/10.3390\/sym13081550","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,23]]}}}