• 제목/요약/키워드: 네트워크 공유

검색결과 1,953건 처리시간 0.035초

Design of Intrusion Detection System to be Suitable at the Information System Organized by Homogeneous Hosts (동질형 호스트들로 구성된 정보시스템에 적합한 침입탐지시스템의 설계)

  • 이종성;조성언;조경룡
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제4권1호
    • /
    • pp.267-282
    • /
    • 2000
  • With the development of computer&network technology and the growth of its dependance, computer failures not only lose human and material resources but also make organization's competition weak as a side-effect of information society. Therefore, people consider computer security as important factor. Intrusion Detection Systems (IDS) detect intrusions and take an appropriate action against them in order to protect a computer from system failure due to illegal intrusion. A variety of methods and models for IDS have been developed until now, but the existing methods or models aren't enough to detect intrusions because of the complexity of computer network the vulnerability of the object system, insufficient understanding for information security and the appearance of new illegal intrusion method. We propose a new IDS model to be suitable at the information system organized by homogeneous hosts and design for the IDS model and implement the prototype of it for feasibility study. The IDS model consist of many distributed unit sensor IDSs at homogeneous hosts and if any of distributed unit sensor IDSs detect anomaly system call among system call sequences generated by a process, the anomaly system call can be dynamically shared with other unit sensor IDSs. This makes the IDS model can effectively detect new intruders about whole information system.

  • PDF

DMB Filecasting Service Technology (DMB 파일캐스팅 서비스 기술)

  • Choi, Ji-Hoon;Yang, Kyu-Tae;Cha, Ji-Hun
    • Journal of Broadcast Engineering
    • /
    • 제17권1호
    • /
    • pp.152-164
    • /
    • 2012
  • DMB provides various kinds of data services such as BWS and TPEG service in addition to audio and video services. But recently the necessity of new business models creating profit has been on the rise due to the saturation of DMB receiver market and break-down of market barrier between mobile IPTV and DMB services. This paper introduces DMB filecasting service technology, which can be expected a new profit-creative business model. The purpose of DMB filecasting service is to transmit non-real time multimedia contents based on DMB AF format to the users through DMB channels. It makes possible to consume DMB contents with any DMB-installed device anytime, anywhere and share them with others. Also DMB filecasting service makes consumption and request of DMB contents possible to be extented to a variety of networks as well as DMB channels. The paper explains the standardization status of DMB filecasting service and various DMB filecasting service scenarios. And also it proposes a signalling methode, a transmission and reception protocol and a receiver structure using DMB broadcasting program guide information.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • 제17권6호
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

Bus-only Lane and Traveling Vehicle's License Plate Number Recognition for Realizing V2I in C-ITS Environments (C-ITS 환경에서 V2I 실현을 위한 버스 전용 차선 및 주행 차량 번호판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • 제52권11호
    • /
    • pp.87-104
    • /
    • 2015
  • Currently the IoT (Internet of Things) environments and related technologies are being developed rapidly through the networks for connecting many intelligent objects. The IoT is providing artificial intelligent services combined with context recognition based knowledge and communication methods between human and objects and objects to objects. With the help of IoT technology, many research works are being developed using the C-ITS (Cooperative Intelligent Transport System) which uses road infrastructure and traveling vehicles as traffic control infrastructures and resources for improving and increasing driver's convenience and safety through two way communication such as bus-only lane and license plate recognition and road accidents, works ahead reports, which are eventually for advancing traffic effectiveness. In this paper, a system for deciding whether the traveling vehicle is possible or not to drive on bus-only lane in highway is researched using the lane and number plate recognition on the road in C-ITS traffic infrastructure environments. The number plates of vehicles on the straight ahead and sides are identified after the location of bus-only lane is discovered through the lane recognition method. Research results and experimental outcomes are presented which are supposed to be used by traffic management infrastructure and controlling system in future.

Study for implementation of smart water management system on Cisangkuy river basin in Indonesia (인도네시아 찌상쿠이강 유역의 지능형 물관리 시스템 적용 연구)

  • Kim, Eugene;Ko, Ick Hwan;Park, Chan Ho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 한국수자원학회 2017년도 학술발표회
    • /
    • pp.469-469
    • /
    • 2017
  • 기후 변화 및 환경오염으로 인하여 물부족 국가가 세계적으로 증가하고 있는 추세이며, 특히 집중형 강우의 형태가 많아짐에 따라 홍수피해 및 상수공급의 문제가 사회적으로 큰 이슈가 되고 있다. 최근 20여 년간의 급속한 경제성장과 도시화 과정에서 인도네시아는 인구와 산업의 과도한 도시집중으로 지난 1960-80년대 한국이 산업화 과정에서 겪었던 것보다 훨씬 심각한 환경문제에 직면하고 있으며, 자카르타와 반둥을 포함하는 광역 수도권 지역의 물 부족과 수질 오염, 환경문제가 이미 매우 위험한 수준에 도달하고 있는 실정이다. 특히, 찌따룸강 중상류에 위치한 인도네시아 3대 도시인 반둥시는 고질적인 용수부족 문제를 겪고 있다. 2010년 현재 약 일평균 15 CMS의 용수가 부족한 상황이며, 2030년에는 지속적인 인구증가로 약 23 CMS의 용수가 추가로 더 필요한 것으로 전망된다. 이러한 용수공급 문제 해결을 위해 반둥시 및 찌따룸강 유역관리청은 댐 및 지하수 개발, 유역 간 물이동 등의 구조적인 대책뿐만 아니라 비구조적인 대책으로써 기존 및 신규 저수지 연계운영을 통한 용수이용의 효율성을 높이는 방안을 모색하고 있다. 이에 따라 본 연구에서는 해당유역의 용수공급 부족 문제를 해소할 수 있는 비구조적인 대책의 일환으로써 다양한 댐 및 보, 소수력 발전, 취수장 등 유역 내 수리 시설물의 운영 최적화를 위한 지능형 물관리 시스템 적용 방안을 제시하고자 한다. 본 연구의 지능형 물관리 시스템은 센서 및 사물 인터넷(Internet of Things, IoT), 네트워크 기술을 바탕으로 시설물 및 운영자, 유관기관 간의 양방향 통신을 통해 유기적인 상호연계 체계를 제공 할 수 있다. 또한 유역의 수문상황과 시설물의 운영현황, 용수공급 및 수요 현황을 실시간으로 확인함으로써 수요에 따른 즉각적인 용수공급량의 조절이 가능하다. 또한, 빅데이터 분석 및 기계학습(Machine Learning)을 통해 개별 물관리 시설물에 대한 최적 운영룰을 업데이트할 수 있으며, 유역의 수문상황과 용수 수요 현황을 고려하여 최적의 용수공급 우선순위를 선정할 수 있다. 지능형 물관리 시스템 개발의 목적은 찌상쿠이 유역의 수문현황을 실시간으로 모니터링하고, 하천시설물의 운영을 분석하여 최적의 용수공급 및 배분을 통해 유역의 수자원 활용 효율성을 향상시키는 데 있다. 이를 위해 수문자료의 수집체계를 구축하고 기관간 정보공유체계를 수립함으로써 분석을 위한 기반 인프라를 구성하며, 이를 기반으로 유역 유출을 비롯한 저수지 운영, 물수지 분석을 수행하고, 분석 및 예측결과, 과거 운영 자료를 토대로 새로운 물관리 시설 운영룰 및 시설물 간 연계운영 방안, 용수공급 우선순위 의사결정 등을 지원하고자 한다. 본 연구의 지능형 물관리 시스템은 통합 DB를 기반으로 수리수문 현상의 모의 분석을 통해 하천 시설물 운영의 합리적 기준을 제시함으로써 다양한 관리주체들의 시설물운영에 대한 이견 및 분쟁을 해소하고, 한정된 수자원과 다양한 수요 간의 효율적이고 합리적인 분배 및 시설물 운영문제를 해결하기 위한 의사결정도구로써 활용할 수 있을 것으로 기대된다.

  • PDF

A Study on the Characteristics and Policy Demand of the Unmanned Vehicle Industry in Gyeonggi-do (경기도 무인이동체 산업 특성과 정책수요)

  • Kim, Myung Jin
    • Journal of the Economic Geographical Society of Korea
    • /
    • 제24권3호
    • /
    • pp.283-299
    • /
    • 2021
  • As the intelligent revolution triggered by digital technology, unmanned vehicles such as self-driving cars, robots, and drones appeared, which brought about innovative changes in the industry. Gyeonggi Local government has established both an ordinance and a basic plan regarding unmanned vehicles. It is time to prepare a data-based policy by understanding the current state of the unmanned vehicle industry in the province. As a result of the survey, the unmanned vehicle industry in Gyeonggi Province is 25% of the nationwide, and more than 88% is concentrated in the southern part of Gyeonggi Province. The land sector such as the robot and autonomous vehicles are focused on 71.4% and the aviation sector such as drones are 26.7%. However, unmanned vehicle companies in Gyeonggi-do are mostly small-sized businesses with less than 10 years of experience and are in the stage of introduction and growth level. They have a plan to improve technology through continuous R&D by hiring human resources. Therefore, Gyeonggi-do needs to consider policy support for sustainable growth of start-up and small enterprises and for fostering professional manpower and technical skills as well as for establishing an unmanned vehicle industry network to create, share, and spread knowledge.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제29권2호
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

A study on user experience of Instagram IGTV -Focus on fashion·beauty contents service (인스타그램 IGTV의 사용자 경험 연구 -패션·뷰티 콘텐츠 서비스를 중심으로-)

  • Woo, Soo-Hee;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • 제17권3호
    • /
    • pp.405-411
    • /
    • 2019
  • The purpose of the study is to investigate a usability of using fashion and beauty service and suggest better user experience on Instagram's newly released mobile video platform, IGTV. The study expects to be a resource of improving the usability on fashion and beauty contents on IGTV and encourage further research for suggesting better guidelines. As a research method, it will experiment current mobile video service first with literature review. Afterwards, the research conducted tasks and in-depth interview with eight Instagram users to evaluate a usability of using fashion and beauty service on IGTV. As a result, it is able to derive two plans that needed improvement. Firstly, IGTV is required to have high accessibility for user's to use service longer and intuitive user experience. Secondly, unlike previous service that Instagram have offered, IGTV need to differentiate to share and get information of fashion and beauty trends.

Component Grid: A Developer-centric Environment for Defense Software Reuse (컴포넌트 그리드: 개발자 친화적인 국방 소프트웨어 재사용 지원 환경)

  • Ko, In-Young;Koo, Hyung-Min
    • Journal of Software Engineering Society
    • /
    • 제23권4호
    • /
    • pp.151-163
    • /
    • 2010
  • In the defense software domain where large-scale software products in various application areas need to be built, reusing software is regarded as one of the important practices to build software products efficiently and economically. There have been many efforts to apply various methods to support software reuse in the defense software domain. However, developers in the defense software domain still experience many difficulties and face obstacles in reusing software assets. In this paper, we analyze practical problems of software reuse in the defense software domain, and define core requirements to solve those problems. To meet these requirements, we are currently developing the Component Grid system, a reuse-support system that provides a developer-centric software reuse environment. We have designed an architecture of Component Grid, and defined essential elements of the architecture. We have also developed the core approaches for developing the Component Grid system: a semantic-tagging-based requirement tracing method, a reuse-knowledge representation model, a social-network-based asset search method, a web-based asset management environment, and a wiki-based collaborative and participative knowledge construction and refinement method. We expect that the Component Grid system will contribute to increase the reusability of software assets in the defense software domain by providing the environment that supports transparent and efficient sharing and reuse of software assets.

  • PDF

A Visualization Technique of Inter-Device Packet Exchanges to Test DLNA Device Interoperability (DLNA 기기의 상호운용성 시험을 위한 패킷교환정보 시각화 방법)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.531-534
    • /
    • 2014
  • DLNA is an established industry standard which supports contents sharing among smart devices in home wired- and wireless-network environment and is well known in Korea as Allshare or Smartshare. The DLNA standard is implemented as built-in services in most of Android smart phones and tablets. In addition to the handheld devices, DLNA service can also be employed in speakers, printers, and so on. However, users have reported many interoperability issues between DLNA devices. Developers typically identify causes by analyzing the packet exchange information between devices. However, this approach costs them to put additional effort to filter relevant packets, to reconstruct packet exchange history and the protocol flow. Consequently, it ends up with increased development time. In this paper, we demonstrate a technique to automatically analyze and visualize the packet exchange history. We modified a router firmware to capture and store packets exchanged between DLNA devices, and then analyze and visualize the stored packet exchange history for developers. We believe that visualized packet exchange history can help developers to test the interoperability between DLNA devices with less effort, and ultimately to improve the productivity of developers.

  • PDF