• Title/Summary/Keyword: 가상 서버

Search Result 628, Processing Time 0.032 seconds

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

Design and Implementation of Virtual Tutoring Estimation System on the Internet Environment (인터넷 환경에서 가상 학습평가 시스템 설계 및 구현)

  • 이석호;김창수;황현숙
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.2
    • /
    • pp.204-214
    • /
    • 1998
  • The existing tutoring estimation systems using the authoring tools or HTML forms on the Web environment don't have been improved inconvenient factors of uni-directional interactive systems. In this paper, we design and implement the interactive tutoring estimation system which is conveniently considered to user on the internet environment. The proposed system is divided into teacher and student modules, which have the functions of the new problem insertion and deletion in database, regular examination marking for the former and lecture/test selection, scoring look, etc for the letter. The environment of server system in this thesis is implemented using the IDC file and SQL database for internet access based on Windows NT, client systems are composed to Windows 95 environment based on Explorer or Netscape to access for interactive tutoring systems.

  • PDF

(A Study on an Adaptive Multimedia Synchronization Scheme for Media Stream Transmission) (미디어 스트림 전송을 위한 적응형 멀티미디어 동기화 기법에 관한 연구)

  • 지정규
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1251-1260
    • /
    • 2002
  • Real-time application programs have synchronization constraints which need to be met between media-data. Synchronization method represents feedback method including virtual client-side buffer. This buffer is used in buffer level method. It is client-leading synchronization that is absorbing variable transmission delay time and that is synchronizing by feedback control. It is the important factor for playback rate and QoS if the buffer level is normal or not. To solve the problems, we can control the start of transmission in multimedia server by appling filtering, control and network evaluation function. Synchronization method is processing for smooth presentation without cut-off while media is playing out. When audio frame which is master media is in high threshold buffer level we decrease play out time gradually, otherwise we increase it slowly.

  • PDF

Design and Implementation of Server-based Resource Obfuscation Techniques for Preventing Copyrights Infringement to Android Contents (안드로이드 콘텐츠 저작권 침해 방지를 위한 서버 기반 리소스 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.13-20
    • /
    • 2016
  • Most software is distributed as a binary file format, so reverse engineering is not easy. But Android is based on the Java and running on virtual machine. So, Android applications can be analyzed by reverse engineering tools. To overcome this problem, various obfuscation techniques are developed. In android environment, the Proguard is most widely used because it is included in the Android SDK distribution package. The Proguard can protect the Java source code from reverse engineering analysis. But it has no function to protect resources like images, sounds and databases. In this paper, we proposed and implemented resource obfuscation framework to protect resources of android application. We expect that this framework can protect android resources effectively.

Adaptive Task Scheduling in High-speed movement Environment Based Mobile Grid (초고속 이동 환경 기반 모바일 그리드에서 적응적 작업 처리 기법)

  • Cho, In-Seock;Lee, Dae-Won;Park, Ji-Su;Chung, Kwang-Sik;Yu, Heon-Chang
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.321-326
    • /
    • 2007
  • 그리드 컴퓨팅은 지리적으로 분산되어 있고 보안상으로 분리되어 있는 기관들 사이의 자원들을 공유하여 협동 작업을 가능하게 하는 대규모 가상 컴퓨팅 환경이다. 다양한 모바일 기기들의 출현으로 인하여 전통적인 그리드 컴퓨팅 환경에 모바일 개념이 도입되어 모바일 그리드 환경이 나타나게 되었다. 모바일 그리드 환경에서 우선 고려해야 할 것은 모바일 기기의 고유한 특성으로 인해 발생하는 제약사항들이다. 본 논문에서 고려하는 환경에서는 이런 제약사항들은 다소 해결이 가능하다. 본 논문에서 제안한 적응적 작업처리 기법은 모바일 그리드 컴퓨팅 환경에서 모바일 기기가 자원 이용자 역할 뿐만 아니라 자원 제공자 역할도 수행할 수 있다. 또한, 결함 포용적인 프록시 서버 역할을 하는 모바일 라우터를 두어서 전체적인 작업 수행에 있어 안정성과 신뢰성을 제공한다.

  • PDF

User behavior analysis in No Disk System Configuration (No Disk System 환경에서의 사용자 행위 분석)

  • Kim, Deunghwa;Namgung, Jaeung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.491-500
    • /
    • 2013
  • With the advent of big data and increased costs of SSD(HDD), domestic and foreign Internet cafes and organizations have adopted NDS(No Disk System) solution recently. NDS is a storage virtualization solution based on a kind of cloud computing. It manages Operating System and applications in the central server, which were originally managed by individual computers. This research will illustrate the way to analyze user's behaviors under NDS circumstance.

Design and Implementation of Internet Disk for Mobile Device (모바일 기기를 위한 인터넷 디스크 설계 및 평가)

  • Noh Tae-Ho;Cho Kyung-Won;Song Seok-Il;Kwak Yoon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.253-261
    • /
    • 2005
  • The proposed internet disk for mobile devices is a new technique in order for mobile devices to recognize remote storage spaces as local storage card. The proposed technique is not to upload and download data of remote sites. It virtualizes remote storage space as local storage of mobile devices. Then mobile users can use the virtualized storage space as their local storage card. Also the remote storage space can be virtualized to desktop as local hard disk. It is possible to share data between mobile devices and desktop through the proposed internet disk.

A Study on the Technologies of Storage Management System for Digital Contents (디지털콘텐츠의 저장관리시스템 기술에 관한 연구)

  • 조윤희
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.2
    • /
    • pp.187-207
    • /
    • 2003
  • With the rapidly evolving information technologies and the Internet, a network-based storage management system is required that can efficiently save, search, modify, and manage digital contents which are increasing by geometric progression. Recently, the SAN became highlighted as a solution to such issues as the integrated data management for heterogeneous systems, the effective utilization of storage systems, and the limitation of data transfer. SAN allows for effective management and sharing of bulk data by directly connecting the storage systems, which used to be independently connected to servers, to the high-speed networks such as optical channels. In this study, I researched on the technologies, standardization and market trends of storage management systems, and performed comparative analyses of the structures, components, and performances for achieving the integration of diverse system storage systems as well as the virtualization of storage systems.

  • PDF

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • v.4 no.4
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

A Role-based Storage Encryption for the Electronic Approval System of Battle Management Systems (전장관리체계 전자결재시스템을 위한 역할기반 스토리지 암호화 기법)

  • Her, Kyoung-Soon;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.71-85
    • /
    • 2011
  • The most important factors of Electronic approval system of battle management system are availability and reliability. Therefore, the electronic approval system uses a SAN(storage area network) to construct the reliable server and storage. In this paper, we analyze the security vulnerabilities of the SAN storage that stores the critical military information in the electronic approval system of battle management system. Based on the analysis, we verify the possibility of information leakage by the inside attackers through the scenario-based experiment. And we finally propose a new storage encryption algorithm on the basis of user's role that can prevent the leakage of information by the inside attackers.