• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.032 seconds

Implementation of Hybrid Firewall System for Network Security (전산망 보호를 위한 혼합형 방화벽 시스템 구현)

  • Lee, Yong-Joon;Kim, Bong-Han;Park, Cheon-Yong;Oh, Chang-Suk;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1593-1602
    • /
    • 1998
  • In this paper, a hybrid firewall system using the screening router, dual-homed gateway, screened host galeway and the application level gateway is proposed, The screened host gateway is comjXlsed of screening router, DMZ and bastion host. All external input traffics are filtered by screening router with network protrcol filtering, and transmitted to the bastion host performing application level filtering, The dual homed gateway is an internlediate equipment prohibiting direct access from external users, The application level gateway is an equipment enabling transmission using only the proxy server. External users can access only through the public servers in the DMZ, but internal users can aeee through any servers, The rule base which allows Telnet only lo the adrnilllslratol is applied to manage hosts in the DMZ According to the equipmental results, denial of access was in orderof Web. Mail FTP, and Telnet. Access to another servers except for server in DMZ were denied, Prolocol c1mials of UDP was more than that of TCP, because the many hosts broadcasted to networds using BOOTP and NETBIOS, Also, the illegal Telnet and FTP that transfer to inside network were very few.

  • PDF

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

Design and Performance Analysis of EU Directory Service (ENUM 디렉터리 서비스 설계 및 성능 평가)

  • 이혜원;윤미연;신용태;신성우;송관우
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.559-571
    • /
    • 2003
  • ENUM(tElephon NUmbering Mapping) is protocol that brings convergence between PSTN Networks and IP Networks using a unique worldwide E.164 telephone number as an identifier between different communication infrastructure. The mechanism provides a bridge between two completely different environments with E.164 number; IP based application services used in PSTN networks, and PSTN based application services used in IP networks. We propose a new way to organize and handle ENUM Tier 2 name servers to improve performance at the name resolution process in ENUM based application service. We build an ENUM based network model when NAPTR(Naming Authority PoinTeR) resource record is registered and managed by area code at the initial registration step. ENUM promises convenience and flexibility to both PSTN and IP users, yet there is no evidence how much patience is required when users decide to use ENUM instead of non-ENUM based applications. We have estimated ENUM response time, and proved how to improve performance up to 3 times when resources are managed by the proposed mechanism. The proposition of this thesis favorably influences users and helps to establish the policy for Tier 2 name server management.

A Web-based Simulation Environment based on the Client/Server Architecture for Distance Education: SimDraw (원격교육을 위한 클라이언트/서버구조의 웹 기반 시뮬레이션 환경 : SimDraw)

  • 서현곤;사공봉;김기형
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1080-1091
    • /
    • 2003
  • Recently, the distance education has been rapidly proliferated with the rapid growth of the Internet and high speed networks. There has been relatively much research with regard to online lecture (teaching and studying) tools for the distance education, compared to the virtual laboratory tools (for self-study and experiments). In this paper, we design and implement a web-based simulation tool, named as SimDraw, for the virtual laboratory in the distance education. To apply the web-based simulation technology into the distance education, some requirements should be met; firstly, the user interface of the simulation should be very easy for students. Secondly, the simulation should be very portable to be run on various computer systems of remote students. Finally, the simulation program on remote computers should be very thin so that students can easily install the program onto their computers. To meet these requirements, SimDraw adopts the client/server architecture; the client program contains only model development and animation functions so that no installation of a client program onto student's system is required, and it can be implemented by a Java applet in Web browsers. The server program supports client programs by offering the functions such as remote compiling, model storing, library management, and user management. For the evaluation of SimDraw, we show the simulation process using the example experimentation of the RIP(Routing Information Protocol) Internet routing protocol.

An Efficient Dissemination Protocol for Remote Update in 6LoWPAN Sensor Network (6LoWPAN상에서 원격 업데이트를 위한 효율적인 코드 전파 기법)

  • Kim, Il-Hyu;Cha, Jung-Woo;Kim, Chang-Hoon;Nam, In-Gil;Lee, Chae-Wook
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.2
    • /
    • pp.133-138
    • /
    • 2011
  • In IP-based wireless sensor networks (WSNs), it might be necessary to distribute application updates to the sensor nodes in order to fix bugs or add new functionality. However, physical access to nodes is in many cases extremely limited following deployment. Therefore, network reprogramming protocols have recently emerged as a way to distribute application updates without requiring physical access to sensor nodes. In order to solve the network reprogramming problem over the air interface, this thesis presents a new scheme for new update code propagation using fragmentation scheme and network coding. The proposed code propagation method roughly shows reduced performance improvement in terms of the number of data exchange compared with the previously proposed pipelining scheme. Further, It is shows enhanced reliability for update code propagation and reduced overhead in terms of the number of data exchange. As a result, we can efficiently perform the software update from the viewpoint of speed, energy, and network congestion when the proposed code propagation system is applied. In addition, the proposed system solves overhearing problems of network coding such as the loss of original messages and decoding error using the predefined message. Therefore, our system allows a software update system to exchange reliable data in wireless sensor networks.

Limit State Evaluation of Elbow Components Connected with Flexible Groove Joints (유동식 그루브 조인트로 연결된 엘보 요소의 한계상태 평가)

  • Sung-Wan Kim;Da-Woon Yun;Bub-Gyu Jeon;Dong-Uk Park;Sung-Jin Chang
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.3
    • /
    • pp.91-99
    • /
    • 2024
  • Piping systems are crucial facilities used in various industries, particularly in areas related to daily life and safety. Piping systems are fixed to the main structures of buildings and facilities but do not support external loads and serve as non-structural elements performing specific functions. Piping systems are affected by relative displacements owing to phase differences arising from different behaviors between two support points under seismic loads; this can cause damage owing to the displacement-dominant cyclic behavior. Fittings and joints in piping systems are representative elements that are vulnerable to seismic loads. To evaluate the seismic performance and limit states of fittings and joints in piping systems, a high-stroke actuator is required to simulate relative displacements. However, this is challenging because only few facilities can conduct these experiments. Therefore, element-level experiments are required to evaluate the seismic performance and limit states of piping systems connected by fittings and joints. This study proposed a method to evaluate the seismic performance of an elbow specimen that includes fittings and joints that are vulnerable to seismic loads in vertical piping systems. The elbow specimen was created by connecting straight pipes to both ends of a 90° pipe elbow using flexible groove joints. The seismic performance of the elbow specimen was evaluated using a cyclic loading protocol based on deformation angles. To determine the margin of the evaluated seismic performance, the limit states were assessed by applying cyclic loading with a constant amplitude.

Factors Affecting Nursing College Students' Adherence to Prevention Compliance Behavior of Blood-Born Infection (간호대학생의 혈액매개감염 예방행위 실천도에 영향을 미치는 요인)

  • Ryu, Seong-Mi;Kong, Jeong-Hyeon;Choi, Hye-Ok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.220-229
    • /
    • 2018
  • The purpose of this study is to identify nursing college students' knowledge, awareness and adherence to preventive behavior of blood-borne infection, and the factors affecting the adherence to preventive behavior of blood-borne infection. This study was carried out for 475 juniors in university who have completed clinical practice at the nursing college located in G city from December 1 to 15, 2017. The study findings showed that knowledge score, awareness and adherence to preventive behavior of blood-borne infection were 13.13 points(0-18 points), 4.18 points and 4.34 points, respectively. Nursing college students' adherence to preventive behavior of blood-borne infection showed a positive correlation between knowledge of blood-borne infection and awareness of blood-borne infection, The factors affecting the adherence to preventive behavior of blood-borne infection were found to be age, education experience, exposure, knowledge of blood infection, and the explanatory power of these variables was 16.3%. Therefore, it was found to be necessary to develop and apply a standardized education protocol in ward units for nursing college students to reduce the incidence of exposure to blood-borne infection sources in nursing college students.

An Experimental Study for RFID Application of Construction Materials in an Apartment House Construction Site (건설자재의 공동주택 현장 적용을 위한 RFID 부착 및 인식에 관한 실험적 연구)

  • Ju, Ki-Beom;Han, Choong-Han
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.5
    • /
    • pp.67-75
    • /
    • 2009
  • While the trend of all industries recently lies in combination, construction industry is much interested in enhancing efficiency and competitiveness in the aspect of site control by adopting RFID. Though RFID has been applied to diverse areas thus far, it cannot be easily applied to construction industry due to diverse physical, chemical and use-environmental properties of construction materials. Furthermore, it is rarely applied to the site because of many problems in its application. It is required to prepare RFID code issuance and system that can systematically control the code as well as to research the standardization of frequency, specification, protocol, package method, recognition method, etc in order to apply RFID to construction industry. In this research, RFID code issuance and management program are proposed as a part of program research to apply RFID. Furthermore, the restricted matters of existing RFID tag are drawn to produce pilot product of RFID tag that can solve it so as to perform site application test. According to the experiment, effective recognition distance varies depending on material/environmental property and control efficiency changes depending on attachment method and application method. Thus, preparing diverse restrictive factors and solutions by systematically analyzing control method(medium, process) of current architecture materials and applying it to construction site can be the way to successfully apply RFID.

An Operations and Management Framework for The Integrated Software Defined Network Environment (소프트웨어 정의 네트워크 통합 운영 및 관리 프레임워크)

  • Kim, Dongkyun;Gil, Joon-Min
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.557-564
    • /
    • 2013
  • An important research challenge about the traditional Internet environment is to enable open networking architecture on which end users are able to innovate the Internet based on the technologies of network programmability, virtualization, and federation. The SDN (Software Defined Network) technology that includes OpenFlow protocol specifications, is suggested as a major driver for the open networking architecture, and is closely coupled with the classical Internet (non-SDN). Therefore, it is very important to keep the integrated SDN and non-SDN network infrastructure reliable from the view point of network operators and engineers. Under this background, this paper proposes an operations and management framework for the combined software defined network environment across not only a single-domain network, but also multi-domain networks. The suggested framework is designed to allow SDN controllers and DvNOC systems to interact with each other to achieve sustainable end-to-end user-oriented SDN and non-SDN integrated network environment. Plus, the proposed scheme is designed to apply enhanced functionalities on DvNOC to support four major network failure scenarios over the combined network infrastructure, mainly derived from SDN controllers, SDN devices, and the connected network paths.

An Implementation of Obesity Management System with Individually Adapted Complex Care (개인 맞춤형 통합 치료가 가능한 비만 관리 시스템 개발)

  • Noh, Si-Cheol;Kim, Ju-Young;Kim, Jin-Su;Kang, Sang-Sik;Choi, Heung-Ho
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.83-91
    • /
    • 2012
  • The obesity is a medical condition in which excess body fat has accumulated to the extent. It may have an adverse effect on health, leading to reduced life expectancy and increased health problems such as lifestyle disease, hypertension, and diabetes. Furthermore, it may cause the mental illness such as depression, bipolar disorder, anorexia, hyperphagia, and so on by shrinking psychologically. So, it is regarded as the serious worldwide social problem. Recently, although there are many general obesity care methods with various approaches, these can't be the radical obesity care because of the side effects such as surgery aftereffect, drug addiction, and so on. For these reasons, a methodical approach with a consideration of individual obesity pattern is strongly demanded. In this study, complex obesity care and management system which is overcome the weakness of non-surgical obesity treatment is proposed. And the individually adapted obesity treatment system with the far-infrared therapy module, oxygen therapy module, color therapy module, and microwave therapy module was developed. The complex obesity treatment system which is proposed in this study, could improve the efficiency of treatment by suggesting the various treatment protocols. And proposed system could be the foundation of the high quality obesity treatment system.