• Title/Summary/Keyword: 주소 설정

Search Result 179, Processing Time 0.04 seconds

An Implementation of Mondriaan Memory Protection (몬드리안 메모리 프로텍션의 구현)

  • Kam, Keun-Jin;Lee, In-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.276-280
    • /
    • 2006
  • 몬드리안 메모리 프로텍션(Mondriaan Memory Protection)은 워드 단위까지 접근 권한 설정을 제공하는 메모리 보호 개념으로, 프로세서에서 요청하는 주소에 대하여 올바른 접근 권한을 가지고 있는지 검사한다. 기존 프로세서의 명령어 셋에 대한 추가 또는 변경과 프로그램 소스의 변경이 필요 없으면서도, 프로그래머 또는 사용자에 의해서 생길 수 있는 잘못된 메모리 접근을 원천적인 방법으로 방지할 수 있다. 본 논문에서는 몬드리안 메모리 프로텍션을 마이크로프로세서를 이용한 실제 하드웨어로 구현 하면서 발생 되는 고려 사항과 문제점에 대하여 짚어보고, 그 해결책을 제시하였다.

  • PDF

MPLS Traffic Engineering of standard skill (MPLS Traffic Engineering의 표준 기술)

  • Kim, Kang;Jeon, Jong-Sik;Kim, Ha-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.68-73
    • /
    • 2001
  • MPLS(Multi protocol Label Switching) is standard skill for added to speed and control the Network Traffic. MPLS concerned the routing protocol to relative Pack line, Each Pack composed label and node, saved the time to seek the address of node. MPLS worked IP, ATM and Network protocol of flame rely. MPLS is Network OSI suport model, 2Layer send to most of Packinsted of 3Layer Switching. MPLS is added speed Traffic of QoS and effective controled the Network.

  • PDF

Design of a Static ARP Table Management xApp for an E2 Interface Security in Open RAN (Open RAN에서의 E2 인터페이스 보호를 위한 정적 ARP 테이블 관리 xApp 설계)

  • Jihye Kim;Jaehyoung Park;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.381-382
    • /
    • 2024
  • Open RAN(Radio Access Network)을 선도적으로 연구하고 있는 O-RAN Alliance에서는 Open RAN의 E2 인터페이스에서 발생 가능한 보안 위협 중 하나로 MitM(Man-in-the-Middle) 공격을 명시하였다. 그러나 이에 대응하기 위한 보안 요구사항으로는 3계층 보안 프로토콜인 IPsec 사용을 명시하고 있으며, 2계층 공격인 ARP(Address Resolution Protocol) 스푸핑에 대한 요구사항은 명시하고 있지 않다. 따라서 본 논문에서는 MitM 공격 중 하나인 ARP 스푸핑으로부터 E2 인터페이스를 보호하기 위해, Near-RT RIC의 ARP 테이블에서 E2 인터페이스로 연결되는 장비에 대한 MAC 주소를 정적으로 설정할 수 있는 xApp을 제안한다.

Pathless Multihop Packet Forwarding Protocol for Inter-vehicular Communication (차량간 통신을 위한 비경로형 멀티 홉 패킷 포워딩 프로토콜)

  • Lee, Woo-Sin;Lee, Hyuk-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.328-339
    • /
    • 2007
  • Conventional topology-based routing protocols are not suitable for inter-vehicular communication, where frequent route updates are necessary due to continuous and abrupt changes in network topology Position-based routing protocols are widely accepted to better serve their purpose in such a scenario as they do not require path discovery or maintenance. However they have to deal with the overhead of the location service and inaccurate position information. This paper proposes the MMFP (Multi-hop MAC Forwarding Protocol) for inter-vehicle communication that relies on reachability information collected from received packets in making a forwarding decision without path discovery. The MMFP is designed as an extension to the IEEE 802.11 MAC layer to ensure accuracy in its time-critical operations. This paper also presents some simulation results that demonstrate the superior performance of the MMFP over AODV in a realistic inter-vehicular communication.

The Conceptual Management Framework for Sustainable Fisheries Development (지속적 어업발전을 위한 자원관리 개념의 틀)

  • Mu, Yong-Tong;Choe, Jung-Yoon
    • The Journal of Fisheries Business Administration
    • /
    • v.31 no.1
    • /
    • pp.135-151
    • /
    • 2000
  • 최근에 지속적 발전(sustainable development)은 환경정책 분석뿐만 아니라 현대 환경, 생태 경제학에 있어서 중요한 개념이 되어왔으며, 이 개념은 어업에 있어서 특히 중요한 국제적 이슈(issue)가 되고 있다. 어업은 갱생자연 자원에 입각한 산업으로서 지속적 발전의 길로 가야만 한다. 이것은 1982년 UN해양법 협약(UNCLOS), 1995년 UN경계왕래성 어족과 고도회유성 어족에 관한 집행협약 (UNIA), FAO의 책임있는 어업(the Code of Conduct fer Responsible Fisheries)을 위 한 국제규범과 일련의 기술지침서에서 구체적으로 표현함으로써 국제적 합의가 이루어 지게 되었다. 지속적 발전의 개념에 대한 심층적인 이해는 어업 관리자가 어업정책의 수립과 평가에 대한 새로운 요소와 기준을 설정함에 있어서 중요한 의미를 부여한다. 이것은 특히, 어업관리자(정부와 단체 그리고 어업자)가 어업관리 목표 어종 및 비관리목표 어종과 어종의 생태, 그리고 환경을 포함한 어업 자원의 직접 사용 가치와 비사용 가치(즉, 내재 가치 )등에 관련된 제문제를 다루는 것을 그 내용으로 한다. 따라서, 이 논문은 국제사회에서 지속적 발전과 관련된 지식의 현 주소와 어업관리에 있어서 갖는 함축적 의미와 주로 관계된다. 이 논문은 지속적 발진에 대한 개념의 기원과 형성과정, 개념 구조를 상세히 고찰함으로써 어업의 지속적 발전을 위한 어업관리정책 수립을 위한 방향설정에 기여하게 될 것이다. 또 이 논문에서는 지속적 발전의 개념하에서 어업의 지속성과 지속적 발전이 어업관리에 어떠한 의미를 갖는지 고찰한다. 그 하나로 이 논문에서는 FAO에서 최근에 제시한 해양어업의 지속적 발전지표를 어떻게 설정하는지에 대한 가이드라인을 분석 고찰 하였다. 이 FAO의 지속적발전지표는 지속적 발전의 평가체계의 구성요소와 어업에 대한 지속적 평가체계[sustainable development reference system(SDRS)]를 수립하는데 있어서 필요한 관련 절차에 관해 특별한 의미를 부여해 줄 것으로 생각한다. 마지막으로 본 논문에서 는 SDRS가 지역어업 협력체계 구축에 있어 서 어떠한 역할을 할 것인가를 강조함으로써 결론을 내리고 있다.

  • PDF

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

Implementation and Design of Port Scan Detecting System Detecting Abnormal Connection Attempts (비정상 연결시도를 탐지한 포트 스캔 탐지 시스템의 설계 및 구현)

  • Ra, Yong-Hwan;Cheon, Eun-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.63-75
    • /
    • 2007
  • Most of computer systems to be connected to network have been exposed to some network attacks and became to targets of system attack. System managers have established the IDS to prevent the system attacks over network. The previous IDS have decided intrusions detecting the requested connection packets more than critical values in order to detect attacks. This techniques have False Positive possibilities and have difficulties to detect the slow scan increasing the time between sending scan probes and the coordinated scan originating from multiple hosts. We propose the port scan detection rules detecting the RST/ACK flag packets to request some abnormal connections and design the data structures capturing some of packets. This proposed system is decreased a False Positive possibility and can detect the slow scan, because a few data can be maintained for long times. This system can also detect the coordinated scan effectively detecting the RST/ACK flag packets to be occurred the target system.

  • PDF

Design and Performance Evaluation of IP VPNs based MPLS (MPLS 망 기반 IP VPN의 설계 및 성능 평가)

  • 박석천
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.148-156
    • /
    • 2000
  • This paper proposed that an MPLS-based VPN using next-generation If switches and appropriate set of traffic engineering algorithms is the best way to implement QoS-capable IP VPNs. While ATM-based solution would not rely scalable the number of connections becomes too large, MPLS-based VPNs’ efficiency could be confirmed network delay time through performance evaluation. And we evaluated the performance about the If VPN based on proposed MPLS, at the result of evaluation. We figured out that delay increased more slowly in case of VPN based on MPLS comparing with the VPN based on ATM which has rapid delay increasement. Therefore we confirm that the VPN based on MPLS has high speed of packet processing and high degree of network efficiency through the performance evaluation.

  • PDF

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Full mouth rehabilitation with vertical dimension increase in patient with loss of anterior guidance due to maxillary anterior teeth wear: A case report (상악 전치부 마모로 전방 유도가 상실된 환자에서 수직고경 거상을 동반한 전악구강회복 증례)

  • Kim, Woong-Gi;Yeom, Kyeong-Yeon;Lee, Yong-Sang
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.55 no.2
    • /
    • pp.171-179
    • /
    • 2017
  • Severely worn dentition is frequently multifactorial. It is crucial that the etiology of excessive wear be determined, but accurately diagnosing the factors responsible for tooth wear is often confusing. Before initiating the treatment of these cases, meticulous examination and determining vertical dimension are essential. A 69-year-old male patient had the chief complaint that he has worn dentition and functional and esthetic discomfort. Based on model analysis and diagnostic wax up, new vertical dimension had been determined. Provisional restorations were cemented and after 5 months permanent prostheses were fabricated. This case reports a satisfactory functional and esthetic clinical outcome achieved by restoring the vertical dimension.