• Title/Summary/Keyword: 분산 에이전트 시스템

Search Result 377, Processing Time 0.024 seconds

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Electronic Settlement System Model Using an Indirect Authentication Method by Interrelationship (상호 관계성을 가진 간접 인증 방법을 이용한 전자 결제 시스템)

  • Park, Young-Ho;Lee, Keum-Suk
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.93-99
    • /
    • 1998
  • There is only authentication of end-to-end in electronic commerce technique. But in a distributed system, an authentication that is ensured users and computers has a big threats which an identify of those is unbelievable because it can be occurred an fabrication or a false personation. Authentication for other elements included customers and vendors is required in the case that there is many a broker connecting customers with vendors as well. In authentication like above, many elements playing different role participated, were performed by the known techniques, processing was more complicated. In this paper, the Mutual Indirect Authentication technique is used to solve and avoid that condition and the generalized electronic commerce using a mobile agent is accomplished with this technique.

  • PDF

A Study on the Sharing Architecture of FMS for Small and Medium Enterprises on Distributed Heterogeneous Environments (분산이질환경에서 중소기업형 FMS공유구조에 대한 연구)

  • PARK JE-WOONG;KIM WON-JUNG
    • Journal of Ocean Engineering and Technology
    • /
    • v.17 no.5 s.54
    • /
    • pp.82-87
    • /
    • 2003
  • A practical method to investigate the sharing architecture of FMS, for small and medium enterprises, on distributed heterogeneous environmental conditions is investigated. Because the industrial FMS model requires a reasonable size for actual work-site flexible operation, the initial facility expense is very heavy. The support for flexible cooperation of FMS, with some external different FMS, can reduce expenditures and provide greater functionality. While most FMS provide their operation process using an adequate mechanism, when used in isolation, such as island of automation, there is increasing demand for FMS that can cooperate. By exchanging intermediate products and information with other external FMS, products can be produced that cannot be produced alone, such as those that require various processes. This study first considers the sharing architecture of FMS for small and medium enterprises, and investigates the effects of the general sharing architecture of FMS on distributed heterogeneous environments, by using transducer approach to agentification. In this study, set-up station or in-out station takes charge of the gateway of intermediate products, and routes them among distributed heterogeneous FMS plants. The transducer approach is applied to web agent and set-up agent established interfaces, with system controller and setup controller. In this study, the FMS-established sharing architecture is able to obtain not only the internal flexibility, but also the external flexibility.

Design and Implementation of a Location-Based Push-Service Platform (위치기반 푸쉬서비스 플랫폼 설계 및 구현)

  • Shim, Jae-Min;Lee, Eung-Jae;Ju, Yang-Wan;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.4
    • /
    • pp.47-55
    • /
    • 2009
  • As the wireless internet technology such as mobile phone, WIBRO, HSDPA develops, customized location-based services for traffic, tourism, shopping, and emergency relief has lately attracted attention. For giving customized services. we should consider dynamic characteristics of moving object which continuously change their location. In this paper, we define the context trigger type of moving object and design triggering method for processing context generated by moving object. Also we propose location-based push service platform including context trigger of moving object for supporting location-based information to user. The proposed system gathers moving object stream from the terminal based on MS-assisted or Stand-alone positioning mode of embedded GPS in terminal extract user context by user device agent, and send context information to server.

  • PDF

A Study on Selection Process of Web Services Based on the Multi-Attributes Decision Making (다중 속성 의사결정에 의한 웹 서비스 선정 프로세스에 관한 연구)

  • Seo Young-Jun;Song Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.603-612
    • /
    • 2006
  • Recently the web service area is rapidly growing as the next generation IT paradigm because of increase of concern about SOA(Services-Oriented Architecture) and growth of B2B market. Since a service discovery through UDDI(Universal Description, Discovery and Integration) is limited to a functional requirement, it is not considered an effect on frequency of service using and reliability of mutual relation. That is, a quality as nonfunctional aspect of web service is regarded as important factor for a success between consumer and provider. Therefore, the web service selection method with considering the quality is necessary. This paper suggests the agent-based quality broker architecture and selection process which helps to find a service providing the optimum quality that the consumer needs in a position of service consumer. A theory of agent is accepted widely and suitable for proposed system architecture in the circumstance of distributed and heterogeneous environment like web service. In this paper, we considered the QoS and CoS in the evaluation process to solve the problem of existing researches related to the web service selection and used PROMETHEE(Preference Ranking Organization MeTHod for Enrichment Evaluations) as an evaluation method which is most suitable for the web service selection among MCDM approaches. PROMETHEE has advantages that solve the problem that a pair-wise comparison should be performed again when comparative services are added or deleted. This paper suggested a case study with the service composition scenario in order to verify the selection process. In this case study, the decision making problem was described on the basis of evaluated values for qualities from a consumer's point of view and the defined service level.

Load Balancing in Seamless Game with MigAgent (MigAgent를 이용한 Seamless 게임에서의 부하 분산)

  • Kim, Beob-Kyun;Jang, Hang-Jin;You, Kang-Soo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.51-62
    • /
    • 2006
  • The load of this kind of gores, which is heavier than that of any other precedent, and on enormous seamless virtual world characterize the MMORPG(Massively Multiplayer Online Role-Playing Game) genres. In this seamless environment, gamers can usually accept a set of independent spaces, which is being held by independent game servers, os a single big virtual world. Despite the efforts of some developers, gamers are suffered from huge message traffic which comes from the interaction between client and server and the interaction between fold sowers. In this paper, new gore server architecture using MigAgent is proposed which tries to reduce message traffic. Usually, message traffic reaches the climax when a PC(Player Character) is moving to other field server. MigAgent, designed in this thesis, tries to manage this kind of PCs and to ploy o role of user's agent to prepare for the unexpected situation. Improvement of this system is shown by the analysis of the effect of the size ratio of AOI (Area of Interest) and AC (Adjacent Cell).

  • PDF

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF