• Title/Summary/Keyword: 인터넷 서비스 분류

Search Result 409, Processing Time 0.023 seconds

Study on Implementation of an MPLS Switch Supporting Diffserv with VOQ-PHB (Diffserv 지원 VOQ-PHB방식의 MPLS 스위치의 구현에 관한 연구)

  • 이태원;김영철
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.5
    • /
    • pp.133-142
    • /
    • 2004
  • Recently, the growth of Internet and a variety of multimedia services through Internet increasingly demands high-speed packet transmission, the new routing function, and QoS guarantee on conventional routers. Thus, a new switching mechanical called the MPLS(Multi-Protocol Label Switching), was proposed by IETF(Internet Engineering Task Force) as a solution to meet these demands. In addition the deployment of MPLS network supporting Differentiated Services is required. In this paper, we propose the architecture of the MPLS switch supporting Differentiated Services in the MPLS-based network. The traffic conditioner consists of a classifier, a meter, and a marker. The VOQ-PHB module, which combines input Queue with each PHB queue, is implemented to utilize the resources efficiently. It employs the Priority-iSLIP scheduling algorithm to support high-speed switching. We have designed and verified the new and fast hardware architecture of VOQ-PHB and the traffic conditioner for QoS and high-speed switching using NS-2 simulator. In addition, the proposed architecture is modeled in VHDL, synthesized and verified by the VSS analyzer from SYNOPSYS. Finally, to justify the validity of the hardware architecture, the proposed architecture is placed and routed using Apollo tool.

High-Speed Search Mechanism based on B-Tree Index Vector for Huge Web Log Mining and Web Attack Detection (대용량 웹 로그 마이닝 및 공격탐지를 위한 B-트리 인덱스 벡터 기반 고속 검색 기법)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1601-1614
    • /
    • 2008
  • The number of web service users has been increased rapidly as existing services are changed into the web-based internet applications. Therefore, it is necessary for us to use web log pre-processing technique to detect attacks on diverse web service transactions and it is also possible to extract web mining information. However, existing mechanisms did not provide efficient pre-processing procedures for a huge volume of web log data. In this paper, we proposed both a field based parsing and a high-speed log indexing mechanism based on the suggested B-tree Index Vector structure for performance enhancement. In experiments, the proposed mechanism provides an efficient web log pre-processing and search functions with a session classification. Therefore it is useful to enhance web attack detection function.

  • PDF

A Survey of the Self-Adaptive IoT Systems and a Compare and Analyze of IoT Using Self-Adaptive Concept (자가적응형 IoT 시스템 개발 동향과 자가적응형 개념을 활용한 IoT 비교분석)

  • Hwang, Seyoung;Seo, Jangill;Park, Sungjun;Park, Sangwon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.1
    • /
    • pp.17-26
    • /
    • 2016
  • IoT means things space networks that form the intelligent relationship such as sensing, networking, information processing about human being, things and service without explicit mutual cooperation of human being. Lately many IoT groups such as AllSeen Alliance, OIC launched a platform for IoT. Self-adaptive is aimed at implementation without the need for decisions of human being during the operation, so that the machine can respond to changes in its own determination. There is a need to apply the concept of self-adaptive to existing IoT and IoT platform. So In this paper, We look for trends of existing IoT, IoT platform and comparisons by applying a self-adaptive concept to IoT, IoT platform. In addition as an example of this paper, we suggest lacking self-adaptive elements to OIC.

Digital Rights Management and Rights Language (디지털 저작권관리와 Rights Language)

  • 박정희;성평식;이기동
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.2
    • /
    • pp.7-13
    • /
    • 2003
  • The Internet presents a unique platform for disseminating digital content such as music, video, games, software, text, business and proprietary corporate information. It promises ubiquitous access, while at the same time fundamentally challenging the traditional rules of ownership and distribution of content. In such environment, safe protection and proper delivery of digital content would be a crucial requirement toward a new e-business model. Research on the Digital Rights Management (DRM) focuses on filling this functional vacancy of the market transition by providing a more viable business model based. XrML(eXtensible Rights Markup Language) provides a universal tool for specification of rights, fees, and issuing conditions(licenses) associated with the use and protection of digital content. ContentGuard has developed XrML to unify the Digital Rights Management(DRM) specifications and encourage interoperability. It seems that all working groups of DRM agree to use XrMl for their right description language.

  • PDF

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Legal Issues of Electronic Commerce Chapters of the Korea·US FTA and Tasks of the Digital Contents Industry (한·미 FTA 전자상거래 협정문의 주요쟁점과 디지털콘텐츠 산업의 활성화 과제)

  • Kwon, Soon-Koog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.21-29
    • /
    • 2015
  • The emergence of the internet causes the electronic trade of movies, music, software and other digital content products to be an eminent share of international commerce. The purpose of this study is to examine legal issues of electronic commerce chapters of the Korea US FTA and tasks of the digital contents industry. Results of the study show that several implications based on the industry are offered. The Korean government needs to do the following: settle of classification issue in digital contents, settle of customs issue in digital contents, settle of issue of non-discrimination principle in digital contents, settle of exclusion issue in audiovisual services, improve of global competitiveness, unify of export support system, establish of overseas expansion strategy in genre and regional contents, train of global experts and protect of intellectual property in digital contents.

A Study of Domestic B2B e-Marketplace (국내 B2B e-Marketplace에 관한 연구)

  • 이헌성;강민철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.2
    • /
    • pp.23-30
    • /
    • 2001
  • The advent of the Internet and development of information technologies have changed the environment of doing business. Accordingly, they expect that the relative importance of electronic commerce in the business becomes growing more and more. Among the areas of electronic commerce, B2B marketplaces that play the roles of linking buyers and suppliers take the important place. This study examines requirements for activating domestic B2B marketplaces by analyzing the literature and the status of the marketplaces. For the analysis, evaluation factors that belong to one of the four categories (i.e., Information step, Agreement step, Settlement step, and the rest) are selected. Results of the study suggest the following activation requirements for domestic B2B marketplaces : 1. Enforcement of services for the Agreement and Settlement steps. 2. Supporting multinational languages. 3. Diversification of income sources. 4. Standardization. 5. Integrating main systems. 6. Satisfying the necessities of buyers and suppliers.

  • PDF

A Research on how to turn informationization Database of construction materials to practical use (건설 자재정보 DataBase의 실용화 방안 연구)

  • Kwon, Oh-Yong;Han, Chung-Han;Lee, Hwa-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.747-750
    • /
    • 2007
  • Information of construction material is served through internet to user but it is poor to use information of construction material because of lack of information which is accumulated and insufficience of standardization. So informationization of civil materials are closely connected with works and then it is promoted to be used through works like design, construction etc. Informationization for management of information of construction material which reflects questionnaires about opinion of workers presents promotion by stage considering first, continuous renewal of information of construction material and increase in quantity, second classification system and standardization of terms in order to share and connect information of construction material third, developing inquiry method of material information needed in construction stage fourth, connecting material information DB and application through design and construction.

  • PDF

Recommender System using Association Rule and Collaborative Filtering (연관 규칙과 협력적 여과 방식을 이용한 추천 시스템)

  • 이기현;고병진;조근식
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.91-103
    • /
    • 2002
  • A collaborative filtering which supports personalized services of users has been common use in existing web sites for increasing the satisfaction of users. A collaborative filtering is demanded that items are estimated more than specified number. Besides, it tends to ignore information of other users as recommending them on the basis of information of partial users who have similar inclination. However, there are valuable hidden information into other users' one. In this paper, we use Association Rule, which is common wide use in Data Mining, with collaborative filtering for the purpose of discovering those information. In addition, this paper proved that Association Rule applied to Recommender System has a effects to recommend users by the relation between groups. In other words, Association Rule based on the history of all users is derived from. and the efficiency of Recommender System is improved by using Association Rule with collaborative filtering.

  • PDF

Privacy Preserving Techniques for Deep Learning in Multi-Party System (멀티 파티 시스템에서 딥러닝을 위한 프라이버시 보존 기술)

  • Hye-Kyeong Ko
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.647-654
    • /
    • 2023
  • Deep Learning is a useful method for classifying and recognizing complex data such as images and text, and the accuracy of the deep learning method is the basis for making artificial intelligence-based services on the Internet useful. However, the vast amount of user da vita used for training in deep learning has led to privacy violation problems, and it is worried that companies that have collected personal and sensitive data of users, such as photographs and voices, own the data indefinitely. Users cannot delete their data and cannot limit the purpose of use. For example, data owners such as medical institutions that want to apply deep learning technology to patients' medical records cannot share patient data because of privacy and confidentiality issues, making it difficult to benefit from deep learning technology. In this paper, we have designed a privacy preservation technique-applied deep learning technique that allows multiple workers to use a neural network model jointly, without sharing input datasets, in multi-party system. We proposed a method that can selectively share small subsets using an optimization algorithm based on modified stochastic gradient descent, confirming that it could facilitate training with increased learning accuracy while protecting private information.