• Title/Summary/Keyword: 우회정보

Search Result 449, Processing Time 0.027 seconds

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.

Design and Implementation of Routing Algorithms for Energy Efficiency in Sensor Network (센서네트워크의 에너지 효율성을 고려한 라우팅 알고리즘 설계 및 구현)

  • Jeong, Dae-In;Chea, Byong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.619-629
    • /
    • 2005
  • In this paper, we propose energy-aware routing schemes which are simple enough to be applicable to the wireless sensor networks. The one hop upstream no de in direction of the base-station is determined in four different ways based on the energy information of neighboring nodes, which are obtainable via the process of self-organization of the network. The fair distribution of the energy consumption over all the possible routes to the base-station is one of the design objectives. Also, an alternate route search mechanism is proposed to cope with the situation in which no routing information is available due to lack of remaining energy of the neighboring nodes. The mechanism turns out to be a supplementary scheme to improve the energy efficiency. Lots of simulations are performed to examine the performance metrics such as the energy efficiency, throughput, network lifetime, and the transmission latency of the proposed schemes. Simulation results show the feasibility of the simple routing schemes for the sensor networks.

A High-Performance Fault-Tolerant Switching Network and Its Fault Diagnosis (고성능 결함감내 스위칭 망과 결함 진단법)

  • 박재현
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.335-346
    • /
    • 2004
  • In this paper, we present a high-performance fault-tolerant switching networks using a deflection self-routing scheme, and present fault-diagnosis method for the network. We use the facts: 1) Each stage of the Banyan network is arrayed as the sequences of a Cyclic group of SEs. 2) There is the homomorphism between adjacent stages from a view of self-routing, so that all of each Cyclic group is the subgroup of the Cyclic group in the next stage, and there are factor groups due to such subgroup and homomorphism. We provide high-performance fault-tolerant switching networks of which the all links including augmented links are used as the alternate links detouring faulty links. We also present the fault diagnosis scheme for the proposed switching network that provide multiple paths for each input-output pair.

The Safety Improvement of National Highways through Small Towns with Positive Guidance (Positive Guidance를 활용한 국도 마을통과구간 안전성 향상 방법론)

  • Sim, Gwan-Bo;Lee, Su-Beom;Jang, Seok-Min
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.2 s.95
    • /
    • pp.51-61
    • /
    • 2007
  • Increasing traffic volumes and excessively high speeds on national highways through small towns often increases the frequency of accidents. Extensive paved areas, narrow sidewalks, median barriers and little greenery have resulted in a dangerous and destructive living environment for residents. The reason for this problem is that throughways were expanded without considering the harmony between the throughways and the small towns. Construction of bypasses and reclassification of highway functions would solve the problem by reducing vehicle speeds in small towns, but this method is too costly and time consuming. Therefore, this study analyzes national highways through small towns as a case studies using positive guidance in order to improve safety and develop alternatives. As a result of the case study, the biggest problem was observed to be the excessively high vehicle speeds, This study also identified places were information should be given or posted but is currently absent. Therefore, this study concludes that notional highways through small towns need installation of speed reduction facilities and additional information provision to drivers.

A Study of the Intelligent Connection of Intrusion prevention System against Hacker Attack (해커의 공격에 대한 지능적 연계 침입방지시스템의 연구)

  • Park Dea-Woo;Lim Seung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.351-360
    • /
    • 2006
  • Proposed security system attacks it, and detect it, and a filter generation, a business to be prompt of interception filtering dates at attack information public information. inner IPS to attack detour setting and a traffic band security, different connection security system, and be attack packet interceptions and service and port interception setting. Exchange new security rule and packet filtering for switch type implementation through dynamic reset memory by real time, and deal with a packet. The attack detection about DDoS, SQL Stammer, Bug bear, Opeserv worm etc. of the 2.5 Gbs which was an attack of a hacker consisted in network performance experiment by real time. Packet by attacks of a hacker was cut off, and ensured the normal inside and external network resources besides the packets which were normal by the results of active renewal.

  • PDF

A Load-balancing Routing Protocol in Ad Hoc Networks (애드 흑 네트워크에서 부하 균등을 고려한 라우팅 프로토콜)

  • 안상현;임유진;김경춘
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.252-259
    • /
    • 2003
  • In the case of link congestion, most of the existing ad-hoc routing protocols like AODV and DSR do not try to discover a new route if there is no change in the network topology. Hence, with low mobility, traffic may get concentrated on some specific nodes. Since mobile devices have low battery power and low computing capability, traffic concentration on a specific node is not a desirable phenomenon. Therefore, in this paper, we propose a new protocol called SLAP (Simple Load-balancing Ad-hoc routing Protocol) which resolves the traffic concentration problem by letting each node check its own load situation and give up its role as a packet forwarder gracefully in the case of high traffic load. We compare the performance of SLAP with that of AODV and DSR in terms of the forwarding traffic distribution.

A Study on Tourists Information and Language Transference (관광정보와 언어전환에 관한 연구)

  • Lee, Seung Jae
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.451-458
    • /
    • 2014
  • The purpose of this paper is to examine website information as well as promotional texts comparing source texts of Korean with translated versions of English, and drew characteristics of tourism texts from a discourse and communicative perspective. This study shows that the website or promotional texts is the first source of information in tourism, which is most referred to by the in-bound tourists, and the information given by the official homepage is most trustful content of Korean tourism. With comparison of source text of Korean with the translated English version, this paper shows that Korean source texts have a tendency to prefer the longer explication and more detailed information on the scenic spots and attractions than the English translations. When it is translated into English, the translated version does not follow the literal way of translation, and is segmented for reader's understanding and adapted following the target language's communicative conventions and the target culture. Consequently, this study supports the adaption in tourism promotional English translation, and ensures that the communicative constraints of tourism, that is, politeness and Grician maxims are preserved even in the written form of communication, translation.

The End-to-End Encryption for Enhancing Safety of Electronic Financial Transactions (전자금융거래의 안전성 강화를 위한 종단간 암호화)

  • Seung, Jae-Mo;Lee, Su-Mi;Ahn, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1920-1925
    • /
    • 2009
  • '05. June, the first Internet banking accident occurred by the malignant cord. It discontinued security programs for protecting important financial informations. A computer hacker had made a collation of password, OTP(One Time Password) values etc and illegally withdraw one´s savings from the bank using the financial information. The attackers are continuously attempted with the hacking tool under bypass security programs as the vaccine program or the personal fire-wall. Therefore, an electronic financial system should be composed with the goal which is to protect financial informations from user's terminal to a banking server. In this paper, we make an analysis of menaces in electronic financial transactions and explain considerable security issues to enhance safety in Internet banking, CD/ATM and mobile banking.

Direction-based Geographic Routing for Wireless Sensor Networks (센서 네트워크에서 장애물 극복을 위한 방향기반의 라우팅 기법)

  • Ko, Young-Il;Park, Chang-Sup;Son, In-Keun;Kim, Myoung-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.438-450
    • /
    • 2006
  • Geographic routing protocols are very attractive choice for routing in wireless sensor networks because they have been shown to scale better than other alternatives. Under certain ideal conditions, geographic routing works correctly and efficiently. The most commonly used geographic routing protocols include greedy forwarding coupled with face routing. Existing face routing algorithms use planarization techniques that rely on the unit-graph assumption. In real world, many conditions violate the unit-graph assumption of network connectivity, such as location errors, communication voids and radio irregularity, cause failure in planarization and consequently face routing. In this paper, we propose the direction-based geographic routing, which enables energy efficient routing under realistic conditions without planarization techniques. Our proposed approach is for the case in which many sensors need to collect data and send it to a central node. Simulation results show that the protocol exhibits superior performances in terms of energy consumption, delivery success rate, and outperforms the compared protocols.