• Title/Summary/Keyword: 인터넷 환경

Search Result 7,161, Processing Time 0.036 seconds

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

Fast Handover Mechanism for Multi-Interface MIPv6 Environments and Performance Evaluation (다중 인터페이스 MIPv6 환경에서의 Fast Handover 방안 및 성능 분석)

  • Park, Man-Kyu;Hwang, An-Kyu;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.12
    • /
    • pp.34-43
    • /
    • 2007
  • Recently, in addition to the sharp increase of mobile nodes, various kinds of wireless technologies are available for mobile nodes. If IPv6 technology is applied to the network, multi-homing terminals which have several public IP addresses on one interface will be common. Accordingly, there are many research activities on mobility management for multi-interface, multi-homming nodes. In this paper we propose an extended fast handover mechanism for multi-interface MIPv6 environments that uses multi-interface FBU (MFBU) message instead of the existing FBU message. The MFBU message has the "tunnel destination" mobility option that points a specific tunnel destination other than NAR, and "T" flag that indicates the existence of tunnel destination option. The proposed mechanism can improve the TCP performance by mitigating packet reordering during FMIPv6 handover that can cause unnecessary congestion control due to 3 duplicate ACKs. In this paper, we implemented a multi-Interface MIPv6 simulator by extending a single-interface MIPv6 simulator in NS-2, and showed that the performance of TCP traffic is improved by using the proposed multi-interface fast MIPv6.

Study for the Status and Effectiveness of Science Prior Learning (과학 선행학습의 실태와 그 효과에 대한 연구)

  • Jo, Chang Won;Koo, Min Joo;Park, Jong Keun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.483-492
    • /
    • 2020
  • Considering the fact that many students and parents spend a considerable amount of time and economic power on prior learning and that the environments of internet-based society change rapidly, it is worth examining the status and effectiveness of prior learning. In response, the study surveyed 186 first-year students of A high school in Changwon on the basic status of science prior learning. By the analysis results for the status, 39.8% of the students surveyed said they had experience in prior learning in science. Among the students experienced, 56 students who started science prior learning after the start of winter vacation in the third grade of middle school were analyzed the specific status of science prior learning and the impact of science prior learning on science achievements. The semi-subject form of pre-learning in science showed the highest response rate with 50.0 percent, and the motivation for pre-learning in science was the highest with 33.9 percent improvement in test scores. The confidence and learning intention were positive when conducting prior learning in a semi-subject form, and interest and value were positive when conducting prior learning in a self-directed form. As a result of the survey on the effect of science prior learning, 71.4% of the students who experienced science prior learning showed positive scientific achievement.

A Study on Package Design of Intellectual Property Protection Programs -a focus on trademark and registration of design- (패키지디자인의 법적보호에 관한 연구 -의장 및 상표등록을 중심으로-)

  • Yang, Cho-San
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.27-36
    • /
    • 2004
  • The protection of intellectual property right in international conventions are worldwide or regional areas already exists a century. Therefore, our country is positive affiliated with international conventions. After that time, such as a violation of international convention and an example of imitations are continually that we prognosticate the international trade market activities was difficult not only became an issue of country credit risk. At this point, the major purpose of this study make an analysis of both paralleled with the case study follow an example and the comprehension with concerned about recognition of intellectual property right. In additionally, it stands a plan of package design protections under the WTO systems. This study have carried out a theoretical and practical analysis of intellectual property right and statistical analysis through the inside and outside of the country packaging design study and a case study of troubles with intellectual property. Besides, it is accomplish the purpose of the study that established exploratory study survey about inside and outside of the country packaging design infringement case study and relative package design industry employees with consumptions real research. I hoped that this study will be a foundation on which packaging, design industry protections to intellectual property right.

  • PDF

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

Meaning Structure of Green Infrastructure - A Literature Review about Definitions - (그린인프라스트럭처의 의미구조 - 기존문헌의 정의문 분석을 중심으로 -)

  • Lee, Eun-Sek;Noh, Cho-Won;Sung, Jong-Sang
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.2
    • /
    • pp.65-76
    • /
    • 2014
  • Green Infrastructure(GI) is suggested to recover urban water circulation system as a newly conceptual alternative methodology by Korean landscape field in recent years. In this context, the study considers the essential meaning of GI. The methodology of this study is literature review with 47 published papers which were peer-reviewed in international journals in the recent 5 years. These papers were collected from online database and academic archives. The main analysis targets are definition sentences about GI. The each sentences were interpreted by semantic structure between verbs and objects in the definition sentences. As the results, it figured out 5 aims('Provide', 'Improve', 'Produce', 'Conserve', 'Reduce'), 4 objects('Humanistic', 'Environmental', 'Ecological', 'Hydrological') and 3 spaces('Object space', 'Technically available spaces', 'Object or technically available spaces'). The '5 aims' connected with the elements of '4 objects' based on the '3 spaces'. The elements was connected to the '5 aims' via single form or 2~3 forms of the essential meaning networks of GI. The study provides 83 meaning networks to use landscape architecture planning and urban planning.

A Study on Implementation of SVG for ENC Applications (전자해도 활용을 위한 SVG 변환 연구)

  • Oh, Se-Woong;Park, Jong-Min;Suh, Sang-Hyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.133-138
    • /
    • 2006
  • Electronic Navigational Charts(ENCs) are official nautical charts which are equivalent to paper charts with supplementary information. Although their main purpose is to be used for the safe navigation of ships, they also contain much information on coasts and seas which may be interesting to ordinary people. However, there is no easy way to access them because of therir specialized data format, access method and visualization. This paper proposes on implementation of SVG for the access and services of ENCs. SVG(Scalable Vector Graphic) makes it possible to make use of Vector graphics for servicing maps in basic internet browsing environment. Implement of SVG for ENC applications by this research is free of special server side GIS mapping system and client side extra technology. The implementation of SVG for ENC Applications can be summarized as follows: Firstly, SVG provides spatial information to possess searching engine to embody SVG map. Secondly, SVG can provide high-quality vector map graphics and interactive facility without special Internet GIS system. It makes it possible to use services with very low cost. Thirdly, SVG information service targeting on maritime transportation can be used as template, so it can be used dynamically any other purpose such as traffic management and vessel monitoring. Many good characteristics of SVG in mapping at computer screen and reusability of SVG document provide new era of visualization of marine geographic information.

  • PDF

Round Robin(RR) ONE-IP: Efficient Connection Scheduling Technique for Hosting Internet Services on a Cluster of Servers (서버 클러스터에서의 인터넷 서비스를 위한 효율적인 연결 스케줄링 기법)

  • 최재웅;김성천
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.736-738
    • /
    • 2001
  • 웹을 사용하는 사용자들의 급속도로 증가하는 서비스 요청을 신속하고 저렴한 비용으로 처리하기 위한 대응책으로, LAN 환경의 웹 서버 클러스터 구조가 각광을 받고 있다. 높은 가용성 및 확장성을 보장하는 웹 서비스를 제공하기 위해 많은 부하의 서비스 요구를 여러 서버에게 효과적으로 나누어 처리할 수 있어야 하며, 따라서 서비스 요청 패킷을 고르게 분배할 수 있는 합리적인 스케줄링 기법을 필요로 한다. ONE-IP 스케줄링 기법은 이더넷의 브로드케스트 메시지에 의해 스케줄링이 분산되도록 하는 전략을 사용함으로써, 클러스터에 유입되는 패킷의 집중화로 인해 발생할 수 있는 병목 현상(bottleneck)과 치명적인 오류(Single-point of Failure) 문제를 효과적으로 해결하였다. 그러나, 서비스를 요청하는 패킷의 발신지 주소만을 이용하는 단순한 패킷 스케줄링을 사용하기 때문에 클러스터를 구성하는 서버들 간의 부하 불균형을 가중시키며, 결과적으로 클러스터의 효율성을 저하시키는 문제점을 가지고 있다. 본 논문에서는 이러한 문제점을 해결하기 위하여 RR ONE-IP 기법을 제안하였다. 제안한 기법은 서버에 할당되는 부하간에 불균형이 발생하는 문제점을 해결하기 위해 TCP 연결 단위의 스케줄링 전략을 사용하였으며, 서버의 부하 정보를 이용하지 않는 RR 스케줄링 기법을 도입함으로써, ONE-IP 기법의 장점을 그대로 유지하면서 보다 나은 부하의 균등한 분배로 시스템의 처리 능력을 향상시키도록 하였다. 또한, 실험을 수행한 결과 제안한 기법이 기존의 기법에 비해 평균 3.84%의 시스템의 성능 향상을 보였으며, 과부하 발생율에서는 평균 23.5%의 감소를 가져왔음을 보였다.우 단어 인식률이 43.21%인 반면 표제어간 음운변화 현상을 반영한 1-Best 사전의 경우 48.99%, Multi 사전의 경우 50.19%로 인식률이 5~6%정도 향상되었음을 볼 수 있었고, 수작업에 의한 표준발음사전의 단어 인식률 45.90% 보다도 약 3~4% 좋은 성능을 보였다.으로서 hemicellulose구조가 polyuronic acid의 형태인 것으로 사료된다. 추출획분의 구성단당은 여러 곡물연구의 보고와 유사하게 glucose, arabinose, xylose 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아이에서 그 주산기사망률(周産基死亡率)

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Construction of Pointer-based Model for Main Memory Database Systems (주기억장치 데이터베이스를 위한 포인터 기반 모델의 구축)

  • Bae, Myung-Nam;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4B
    • /
    • pp.323-338
    • /
    • 2003
  • The main memory database systems (MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. Recently, it has been increased needs that have the fast data processing as well as the efficient modeling of application requiring for a complicated structure, and conformity to applications that need the strict dta consistency. In MMDBMS, because all the data is located in the main memory, it can support the usable expression methods of data satisfying their needs without performance overhead. The method has the operation to manipulate the data and the constraint such as referential integrity in more detail. The data model consists of this methods is an essential component to decide the expression power of DBMS. In this paper, we discuss about various requests to provide the communication services and propose the data model that support it. The mainly discussed issues are 1) definition of the relationship between tables using the pointer, 2) navigation of the data using the relationship, 3) support of the referential integrity for pointer, 4) support of the uniform processing time for the join, 5) support of the object-oriented concepts, and 6) sharing of an index on multi-tables. We discuss the pointer-based data model that designed to include these issues to efficiently support complication environments.