• Title/Summary/Keyword: 자원공유 시스템

Search Result 664, Processing Time 0.028 seconds

A Design of Audit Retrieval and Trail System For Distributed Linux (리눅스 분산 시스템 로그 검색 및 추적 시스템 설계)

  • 박준형;송춘환;김민수;노봉남
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.646-648
    • /
    • 2001
  • 최근의 침입이나 공격들은 광범위한 망의 이용과 긴 시간을 두고 공격을 행하는 추세로 발전하고 있다. 이러한 공격들에 대한 탐지 및 대응을 위하여 침입탐지 시스템들은 시스템에 걸쳐 있는 정보의 공유, 침입이나 공격에 적극 대응하기 위한 자원의 이용 등의 상호협력이 요구되고 있다. 본 논문에서는 시스템에서 기록하는 많은 종류의 로그 정보를 침입 탐지에 이용할 수 있는 정보만을 추출하고 분석하여 저장함으로써, 침입 탐지 시스템이 이용할 수 있게 하고, 다른 시스템에서 정보를 필요로 할 때 제공할 수 있으며, 또한 침입이라 간주되어지는 행위에 대하여 대응하기 위한 추적 및 정보 수집 그리고 접속 거부 등을 행하는 Agent 시스템의 설계 및 개발을 목적으로 한다. 이를 위해 리눅스 시스템 기반 하에서 로그를 기록하는 SYSLOG, 발생한 시스템 콜 정보를 기록하는 LSM, 망에서 시스템으로 들어오는 패킷을 분석하는 Pcap Library를 이용한 로그 등을 통합하는 과정을 설명하고, 침입탐지 시스템에 의해서 침입이라 판단되었을 경우, DART Agent가 그 경로를 역추적하고 여러 시스템에 걸쳐 있는 정보들을 수집하는 과정, 고리고 공격에 대한 대응을 하는 과정을 설명한다.

  • PDF

A Study on Applying the Sharing Economy to Libraries (공유경제의 도서관 적용에 관한 연구)

  • Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.75-98
    • /
    • 2016
  • The sharing economy has been evaluated as a sustainable system dominating the next 10 years and one of the 10 ideas which can change the world. The purpose of this study is to reveal whether there is any relevance between the sharing economy and libraries, if the library can be the core model of the sharing economy, and to propose how libraries could contribute to a sharing economy. To this end, literature related to the sharing economy and the actual cases of its implementation were analyzed. The results are as follows: First, the library was evaluated as a successful model of the sharing economy because it has shared information and tools for centuries. Therefore, it was concluded that the library could be an institution that can lead to a sharing economy. Second, it was analyzed that the library could foster the sharing economy through offering its space, and functioning as the infinite imagination room and smart work center, sharing goods through Little Free Libraries, as well as various other resources of library, and sharing various types of knowledge including reference services. Third, it can be said that the possibility of realizing a shared economy in libraries is inexhaustible, and librarians can play an active role and will positively influence the success or failure in terms of realizing the sharing economy. In the future, there needs to be a study to measure the practices and the performance of the sharing economy of libraries.

Joint Buying P2P System for User Convenient Social Network (사용자 편의적 소셜 네트워크 공동구매 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.915-920
    • /
    • 2011
  • P2P technology is the concept to share resources efficiently in distributed environments that a lot of research is underway. a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences to choice time for users that were connected with the information of joint-buying based on social network. Social networks based on co-purchasing information and price alerts using the P2P system is provided by the peer, this relay information is provided by the P2P server.

Supporting Effective Collaborative Works Based on WebDAV (웹데브 기반의 효과적인 협업 작업 지원)

  • Kim, Dong-Ho;Park, Jin-Ho;Shin, Won-Joon;Lee, Myung-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.566-570
    • /
    • 2006
  • 웹데브(WebDAV)는 웹상의 분산 저작활동을 지원하기 위한 IETF의 표준 프로토콜이며 최근 발표된 웹데브 접근 제어 프로토콜은 웹데브 서버에 의하여 관리되는 자원과 이들의 속성에 대한 접근을 제어할 수 있는 기능을 제공한다. 이를 이용하여 협업 시스템을 구성하면 높은 수준의 그룹작업을 할 수 있을 것이다. 본 논문에서는 웹데브 접근 제어 프로토콜을 기반으로 협업작업을 하는 사용자들 간의 자료 교환이나 공유를 체계적으로 지원하는 협업 시스템인 CoSlide의 개발에 대하여 기술하다. 협업에 필요한 자원을 효과적이면서도 안전하게 관리하기 위하여 CoSlide 협업시스템에서 지원하는 작업장의 종류는 다음과 같다. 개인이 작업한 자료를 등록하고 관리할 수 있는 공개작업장, 협업시스템 서버에 소속되지 않은 사용자들이 협업에 참가하여 공동의 작업을 수행할 수 있는 공개작업장 그리고 공동의 과제를 수행하는 작업그룹을 위한 작업공간인 그룹작업장이 있다. 이러한 협업작업의 지원을 위하여 웹데브 접근 제어 프로토콜을 지원하는 웹데브 서버인 Jakarta Slide를 이용하여 CoSlide 협업시스템 서버를 구축하였으며,.Net 프레임워크 기반의 협업시스템 전용 클라이언트인 CoSlide 클라이언트를 개발하였다.

  • PDF

P2P System for Simultaneous Support of Menu and Social Network Joint Buying Information (메뉴와 소셜 네트워크 공동구매 정보 동시제공 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.3
    • /
    • pp.445-449
    • /
    • 2011
  • A P2P technique is the concept to share sources efficiently in distributed environment that is studying a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences for users that were connected with the information of joint-buying based on social network. The joint-buying information based on social network is supported by peers using a p2p system and these information to intermediate are supported by a P2P server.

Study on Education Content Delivery System in Hybrid P2P based Computing Environment (혼합형 P2P 기반 컴퓨팅환경에서의 교육 컨텐츠 전송 시스템에 대한 연구)

  • Kim, Jin-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.658-661
    • /
    • 2005
  • Internet-based client/server architecture of Contents Delivery System suffers from frequent disconnections and security treats caused by dependency of the server or overload. But, We reached the limit to the increase of the server because a contents quality enhance and Internet user explosively increase. Therefore, a P2P based computing methods are used for sloving these issues. In this paper, We implement and design the Education Content Delivery System for cyber education system using idle Computing Power in P2P computing to share computing resources. We implement not only Internet infrastructure but also satellite infrastructure system, and designed to transfer real-time or non real-time contents.

  • PDF

Security Policy Management using Role-Based Access Control in CORBA Environment (CORBA 환경에서 역할-기반 접근제어 기법을 이용한 보안정책 관리)

  • 조은정;이금석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.175-177
    • /
    • 1998
  • 분산 컴퓨팅 환경에서 응용 프로그램들은 다른 응용 프로그램들과 자원을 공유하고 통신하면서 보다 효율적으로 작업을 수행하게 된다. 이러한 과정에서 침입자들에 의한 자원 손실을 막고 정보 무결성을 유지하는 것은 중요한 문제가 된다. 따라서 분산 환경에서는 분산된 자원 사용에 대한 인증(Authentication) 및 인가(Authorization)과정 등의 중요성이 증대되었다. 이질적인 시스템간의 분산 환경을 구축할 수 있는 미들웨어(Middleware)중 가장 활발히 연구되고 이는 CORBA 에서는 보안 서비스를 제공해 주기 위해 COSS (Common Object Service Specification)3에서 보안 서비스를 정의했다. 하지만 COSS3에서 정의한 객체 접근제어 기법만으로는 효율적인 보안 정책 관리가 어렵다. 따라서 본 논문에서는 CORBA 보안 서비스 중 객체 접근제어를 위해 역할-기반 접근제어 (RBAC : Role - Based Access Control)기법을 이용한 효율적이고 융통성 있는 보안정책 관리에 대해 논한다.

  • PDF

A Priority Allocation Scheme Considering Virtual Machine Scheduling Delays in Xen Environments (Xen 환경에서 스케줄링 지연을 고려한 가상머신 우선순위 할당 기법)

  • Yang, Eun-Ji;Choi, Hyun-Sik;Han, Sae-Young;Park, Sung-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.246-255
    • /
    • 2010
  • There exist virtual machine scheduling delays in virtualized environment in which virtual machines share physical resources. Many resource management systems have been proposed to provide better application QoS through monitoring and analyzing application performance and resource utilization of virtual machines. However, those management systems don't consider virtual machine scheduling delays, result in incorrect application performance evaluation and QoS violations In this paper, we propose an application behavior analysis considering the scheduling delays, and a virtual machine priority allocation scheme based on the analysis to improve the application response time by minimizing the overall virtual machine scheduling delays.

Resource Management Scheme in Proxy-Based Mobile Grid (프록시기반 모바일 그리드에서 자원관리 기법)

  • Cho, InSeock;Lee, DaeWon;Lee, HwaMin;Gil, JoonMin;Yu, HeonChang
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.5
    • /
    • pp.67-76
    • /
    • 2008
  • Grid computing has a large scale virtual computing environment that enables a collaborative processing through sharing resources of geographically distributed organizations. In recent year, the development of wireless networks and mobile devices enables mobile devices to consider as a resource of the grids. However, there are some problems such as low performance of processors, small capacity of storages, limited capacity of battery, and low bandwidth. In this paper, to overcome these limitations occurred in mobile grid environments, we proposed a proxy-based mobile grid system. Our proposed system enables mobile devices to play roles as a resource consumer and a resource provider and to collaborate with wired grids through a mobile router. Also, we propose an adaptive job scheduling scheme to cope with context changes of mobile devices and compare our scheduling scheme with other scheduling schemes using a simulation tool, SimGrid, to verify the validity of our job scheduling scheme.

  • PDF

A Verification of Replicated Operation In P2P Computing (P2P 컴퓨팅에서 중복 수행 결과의 정확성 검증 기법)

  • Park, Chan Yeol
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.3
    • /
    • pp.35-43
    • /
    • 2004
  • Internet-based P2P computing with independent machines suffers from frequent disconnections and security threats caused by leaving, failure, network diversity, or anonymity of participated machines. Replication schemes of shared resources are used for solving these issues in many studies and implementations. We propose an operational replication scheme in P2P computing to share computing resources, and the scheme verifies the correctness of operation against faults and security threats. This verifications are carried out periodically on replicated and dependent working units without global message exchanges over the whole system. The verified working units are treated as checkpoints, and thus they could be put to practical use for fault-tolerance with rollback recovery.

  • PDF