• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.028 seconds

Design of a Smart Application for Remote Diagnosis in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 원격진단을 위한 스마트 응용의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.81-87
    • /
    • 2016
  • With the rapid growth of the up-to-date smartphone and wireless network technologies, huge and various types of smart applications using these technologies are actively developed recently. Especially, multiplex types of smart applications using smartphone are developed and diffused with the rapid development of the ubiquitous sensor network technology using various sensors and the mobile computing technology that enables us to get network services at any time in any places. In this paper, we design a smart application that can accurately diagnose and process the current state of the local environment, objects, and persons remotely based on the context information such as local ecology, circumstances, medical or healthcare records and realtime sound or motion pictures using up-to-date samrtphone technology on the USN based mobile computing environment.

Fault/Attack Management Framework for Network Survivability in Next Generation Optical Internet Backbone (차세대 광 인터넷 백본망에서 망생존성을 위한 Fault/Attack Management 프레임워크)

  • 김성운;이준원
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.67-78
    • /
    • 2003
  • As optical network technology advances and high bandwidth Internet is demanded for the exponential growth of internet traffic volumes, the Dense-Wavelength Division Multiplexing (DWDM) networks have been widely accepted as a promising approach to the Next Generation Optical Internet (NGOI) backbone networks for nation wide or global coverage. Important issues in the NGOI based on DWDM networks are the Routing and Wavelength Assignment(RWA) problem and survivability. Especially, fault/attack detection, localization and recovery schemes in All Optical Transport Network(AOTN) is one of the most important issues because a short service disruption in DWDM networks carrying extremely high data rates causes loss of vast traffic volumes. In this paper, we suggest a fault/attack management model for NGOI through analyzing fault/attack vulnerability of various optical backbone network devices and propose fault/attack recovery procedure considering Extended-LMP(Link Management Protocol) and RSVP-TE+(Resource Reservation Protocol-Traffic Engineering) as control protocols in IP/GMPLS over DWDM.

Anomaly Detection Performance Analysis of Neural Networks using Soundex Algorithm and N-gram Techniques based on System Calls (시스템 호출 기반의 사운덱스 알고리즘을 이용한 신경망과 N-gram 기법에 대한 이상 탐지 성능 분석)

  • Park, Bong-Goo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.45-56
    • /
    • 2005
  • The weak foundation of the computing environment caused information leakage and hacking to be uncontrollable, Therefore, dynamic control of security threats and real-time reaction to identical or similar types of accidents after intrusion are considered to be important, h one of the solutions to solve the problem, studies on intrusion detection systems are actively being conducted. To improve the anomaly IDS using system calls, this study focuses on neural networks learning using the soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern, That Is, by changing variable length sequential system call data into a fixed iength behavior pattern using the soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm. The backpropagation neural networks technique is applied for anomaly detection of system calls using Sendmail Data of UNM to demonstrate its performance.

  • PDF

Processing of Sensor Data Stream for OSGi Frameworks (OSGi를 위한 실시간 센서 데이터스트림 처리 방법)

  • Cha, Ji-Yun;Byun, Yung-Cheol;Lee, Dong-Cheal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1014-1021
    • /
    • 2009
  • In an environment of home network where a number of technologies including heterogeneous hardware platforms, networking and protocols, middleware systems, and etc, exist, OSGi provides a platform for deployment and sharing of services managed in hardware and guarantees compatibility among applications. However, only simple control and processing of event data are considered in a home network using OSGi, and the consideration about real time processing of data stream generated by sensors is not enough. Therefore, researches allowing users to effectively develop OSGi applications by using various kinds of sensors generating data streams in the home network environment using OSGi are needed. In this paper, we propose an effective method of processing various types of real time data streams supplied to OSGi applications, including filtering, grouping, and counting, etc.

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

A Seamless Multicast Scheme to Prevent Packet Loss in Proxy Mobile IPv6 Networks (Proxy Mobile IPv6 네트워크에서 패킷 유실을 방지하는 끊김 없는 멀티캐스트 기법)

  • Kim, Jong-Min;Kim, Hwa-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.7-20
    • /
    • 2011
  • Recently, Proxy Mobile IPv6(PMIPv6) networks have been studied as the mobility management protocol to effectively use limited wireless resources. And the multicasting, which is core technology of the Internet broadcast system such as mobile IPTV, has been discussed mainly based on PMIPv6 network. However, multicasting based on PMIPv6 network causes disconnection of services because it does not solve problems of packet loss during binding and group joining procedure. Hence, we propose a seamless multicast scheme which prevents packet loss in PMIPv6 networks. The proposed scheme achieves lower latency than the existing scheme because it combines binding and group joining procedure, a1so it does not cause about packet losses due to performing buffering. We proved the performance using the simulations.

An Exploratory Study of Platform Government in Korea : Topic Modeling and Network Analysis of Public Agency Reports (한국 플랫폼 정부의 방향성 모색 : 공공기관 연구보고서에 대한 토픽 모델링과 네트워크 분석)

  • Nam, Hyun-Dong;Nam, Taewoo
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.139-149
    • /
    • 2020
  • New platform governments will play a role to pull intelligent information technology to drive new ecological government innovation and sustainable development in which the government and people work together. On this, in order to establish the platform of the platform government, we will look at recent research trends and lay the foundation for future policy directions and research bases. using Text Mining method, and went through Topic modeling for the collected text data and network analysis was conducted. According to the result, based on latent topic, the stronger the connection center, the weaker the relationship. Through this study, we hope that discussions will take place in a variety of ways to improve the understanding of the supply and demand approach of Korea's platform government and implement appropriate change management methods such as service public base and service provision in accordance with the value and potential topics of platform government.

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

Performance Improvement of the Statistic Signature based Traffic Identification System (통계 시그니쳐 기반 트래픽 분석 시스템의 성능 향상)

  • Park, Jin-Wan;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.243-250
    • /
    • 2011
  • Nowadays, the traffic type and behavior are extremely diverse due to the appearance of various services on Internet, which makes the need of traffic identification important for efficient operation and management of network. In recent years traffic identification methodology using statistical features of flow has been broadly studied. We also proposed a traffic identification methodology using payload size distribution in our previous work, which has a problem of low completeness. In this paper, we improved the completeness by solving the PSD conflict using IP and port. And we improved the accuracy by changing the distance measurement between flow and statistic signature from vector distance to per-packet distance. The feasibility of our methodology was proved via experimental evaluation on our campus network.