• Title/Summary/Keyword: 분석 영역 가상화

Search Result 68, Processing Time 0.025 seconds

Trends Analysis on Network Virtualization with SDN (네트워크 가상화 동향분석)

  • Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.3
    • /
    • pp.115-124
    • /
    • 2013
  • 모빌리티 수요의 증가, 클라우드 서비스의 급증, 트래픽 패턴의 변화, 새로운 네트워크 아키텍처에 대한 수요는 네트워크 가상화와 SDN(Software Defined Network)에 많은 관심을 불러 일으키고 있다. 네트워크 가상화란 가용 대역폭을 채널로 종합하는 하나 이상의 논리적 네트워크로 물리적인 네트워크를 세분화하는 것을 말한다. 사업자들이 직면한 많은 문제 해결의 솔루션으로 네트워크 가상화가 대두되면서 폭발적인 성장세를 보이고 있으며 산업 생태계에 많은 변화를 예고하고 있다. 사업자들은 서로의 영역을 존중하던 기조에서 벗어나 영역을 침범하기 시작하고 치열한 경쟁이 예상된다. 본 연구를 통해 네트워크 가상화의 등장 배경과 트렌드를 조망하고, 네트워크 가상화 및 SDN으로 인한 산업동향을 분석함으로써 향후 발전방향 및 대응전략을 살펴보고 시사점을 도출하고자 하였다.

  • PDF

Analysis of Virtualization Obfuscated Executable Files and Implementation of Automatic Analysis Tool (가상화 난독화 기법이 적용된 실행 파일 분석 및 자동화 분석 도구 구현)

  • Suk, Jae Hyuk;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.709-720
    • /
    • 2013
  • Virtualization obfuscation makes hard to analyze the code by applying virtualization to code section. Protected code by common used virtualization obfuscation technique has become known that it doesn't have restored point and also it is hard to analyze. However, it is abused to protect malware recently. So, It is been hard to analyze and take action for malware. Therefore, this paper's purpose is analyze and take action for protected malware by virtualization obfuscation technique through implement tool which can extract virtualization structure automatically and trace execution process. Hence, basic structure and operation process of virtualization obfuscation technique will be handled and analysis result of protected malware by virtualization obfuscation utilized Equation Reasoning System, one kind of program analysis. Also, we implement automatic analysis tool, extract virtualization structure from protected executable file by virtualization obfuscation technique and deduct program's execution sequence.

An Analysis Region Virtualization Scheme for Built-in Redundancy Analysis Considering Faulty Spares (불량 예비셀을 고려한 자체 내장 수리연산을 위한 분석 영역 가상화 방법)

  • Jeong, Woo-Sik;Kang, Woo-Heon;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.12
    • /
    • pp.24-30
    • /
    • 2010
  • In recent memories, repair is an unavoidable method to maintain its yield and quality. The probability of defect occurence on spare lines has been increased through the growth of the density of recent memories with 2 dimensional spare architecture. In this paper, a new analysis region virtualization scheme is proposed. the analysis region virtualization scheme can be applied with any BIRA (built-in redundancy analysis) algorithms without the loss of their repair rates. The analysis region virtualization scheme can be a viable solution for BIRA considering the faulty spare lines of the future high density memories.

클라우드 컴퓨팅 환경의 가상화 기술 취약점 분석연구

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Myung-Joo
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.72-77
    • /
    • 2009
  • 가상화 기술은 클라우드 컴퓨팅의 핵심 기술로서 서버 및 스토리지, 하드웨어 등을 분리된 시스템이 아닌 하나의 자원 영역으로 간주하여 자원을 필요에 따라 할당할 수 있다. 클라우드 컴퓨팅 환경에서는 가상화 기술을 통해 자원을 통합하여 활용을 극대화하고, 운영비용 절감 및 공간절약의 효과를 얻을 수 있다. 그러나 가상화 가술을 제공하는 가상화 소프트웨어의 경우, 소프트웨어 자체에서 발생할 수 있는 보안 취약점이 존재하게 되고, 이를 이용한 보안 위협 요소는 가상화 환경 기반의 클라우드 컴퓨팅 서비스의 신뢰도를 저하시킬 수 있다. 본 논문에서는 가상머신(VM : Virtual Machine)이 갖는 취약점 분석을 통하여 가상화 환경에서 발생 가능한 보안 위협을 정의하고, 분석 결과를 기반으로 클라우드 컴퓨팅의 가상화 환경에서 고려해야할 보안 문제 및 대응 방안을 기술한다.

A Study on Traffic Analysis System of Virtual Network Environment (가상화 네트워크 환경에서의 트래픽 분석 시스템에 관한 연구)

  • Shin, Tae-Gil;Kim, Young-Gon;Kim, Sung-Soo;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.726-729
    • /
    • 2012
  • 최근 클라우드 컴퓨팅 서비스가 활발히 이루어지면서, 가상화 기술에 대한 보안이슈가 급부상하고 있다. 클라우드 서비스는 가상화 기술을 사용하는데 복수의 가상 운영체제가 구동되는 환경을 제공하는 하이퍼바이저 역할이 중요하다. 특히, 여러 Guest OS의 사용으로 인해 서버의 자원을 공유하는 측면에서 보안 위협이 발생 가능하다. 본 논문에서는 외적인 보안위협이 아닌 가상화의 내적 영역에서 발생 가능한 위협에 대해 대응할 수 있는 시스템을 제안한다. 제안하는 시스템은 내부에서 발생하는 트래픽에 대한 로그 수집과 분석을 통해 이상트래픽을 판별하여 기존의 시스템이 탐지하지 못하는 가상화 내부트래픽에 대한 보안위협을 해결한다.

A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm (머신러닝 알고리즘이 적용된 가상화 내부 환경의 보안 인증벡터 생성에 대한 연구)

  • Choi, Do-Hyeon;Park, Jung Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.33-42
    • /
    • 2016
  • Recently, the investment and study competition regarding machine running is accelerating mainly with Google, Amazon, Microsoft and other leading companies in the field of artificial intelligence. The security weakness of virtualization technology security structure have been a serious issue continuously. Also, in most cases, the internal data security depend on the virtualization security technology of platform provider. This is because the existing software, hardware security technology is hard to access to the field of virtualization and the efficiency of data analysis and processing in security function is relatively low. This thesis have applied user significant information to machine learning algorithm, created security authentication vector able to learn to provide with a method which the security authentication can be conducted in the field of virtualization. As the result of performance analysis, the interior transmission efficiency of authentication vector in virtualization environment, high efficiency of operation method, and safety regarding the major formation parameter were demonstrated.

Performance Evaluation and Analysis on Single and Multi-Network Virtualization Systems with Virtio and SR-IOV (가상화 시스템에서 Virtio와 SR-IOV 적용에 대한 단일 및 다중 네트워크 성능 평가 및 분석)

  • Jaehak Lee;Jongbeom Lim;Heonchang Yu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.48-59
    • /
    • 2024
  • As functions that support virtualization on their own in hardware are developed, user applications having various workloads are operating efficiently in the virtualization system. SR-IOV is a virtualization support function that takes direct access to PCI devices, thus giving a high I/O performance by minimizing the need for hypervisor or operating system interventions. With SR-IOV, network I/O acceleration can be realized in virtualization systems that have relatively long I/O paths compared to bare-metal systems and frequent context switches between the user area and kernel area. To take performance advantages of SR-IOV, network resource management policies that can derive optimal network performance when SR-IOV is applied to an instance such as a virtual machine(VM) or container are being actively studied.This paper evaluates and analyzes the network performance of SR-IOV implementing I/O acceleration is compared with Virtio in terms of 1) network delay, 2) network throughput, 3) network fairness, 4) performance interference, and 5) multi-network. The contributions of this paper are as follows. First, the network I/O process of Virtio and SR-IOV was clearly explained in the virtualization system, and second, the evaluation results of the network performance of Virtio and SR-IOV were analyzed based on various performance metrics. Third, the system overhead and the possibility of optimization for the SR-IOV network in a virtualization system with high VM density were experimentally confirmed. The experimental results and analysis of the paper are expected to be referenced in the network resource management policy for virtualization systems that operate network-intensive services such as smart factories, connected cars, deep learning inference models, and crowdsourcing.

A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services (융합서비스를 위한 클라우드 컴퓨팅 환경에서 가상화 보안에 관한 연구)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.93-99
    • /
    • 2014
  • Cloud computing refers to borrow IT resources as needed by leveraging Internet technology and pay as much as you used by supporting real-time scalability depending on the service load. Virtualization which is the main technology of cloud computing is a technology that server, storage and hardware are regarded as not separate system but one system area and are allocated as needed. However, the security mechanisms provided by virtualized environments are difficult to cope with the traditional security mechanisms, having basic levels of visibility, control and audit function, on which the server is designed to monitor the traffic between the servers. In this paper, the security vulnerabilities of virtualization are analysed in the cloud computing environment and cloud virtualization security recommendations are proposed.

Development of Virtual Makeup Tool based on Mobile Augmented Reality

  • Song, Mi-Young;Kim, Young-Sun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.127-133
    • /
    • 2021
  • In this study, an augmented reality-based make-up tool was built to analyze the user's face shape based on face-type reference model data and to provide virtual makeup by providing face-type makeup. To analyze the face shape, first recognize the face from the image captured by the camera, then extract the features of the face contour area and use them as analysis properties. Next, the feature points of the extracted face contour area are normalized to compare with the contour area characteristics of each face reference model data. Face shape is predicted and analyzed using the distance difference between the feature points of the normalized contour area and the feature points of the each face-type reference model data. In augmented reality-based virtual makeup, in the image input from the camera, the face is recognized in real time to extract the features of each area of the face. Through the face-type analysis process, you can check the results of virtual makeup by providing makeup that matches the analyzed face shape. Through the proposed system, We expect cosmetics consumers to check the makeup design that suits them and have a convenient and impact on their decision to purchase cosmetics. It will also help you create an attractive self-image by applying facial makeup to your virtual self.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.