• Title/Summary/Keyword: 차단 시스템

Search Result 1,390, Processing Time 0.039 seconds

A Study on Design and Implementation of Filtering System on Hurtfulness Site (유해 사이트 필터링에 관한 연구)

  • 장혜숙;강일고;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.636-639
    • /
    • 2002
  • This article is focused on the research for the system design that isolate noxious data from internet for juveniles Normally, by motivating this software which was designed to isolate noxious data, harmful data was deleted or graded But these normal process contains a lot of complexity, for example, essential continual upgrade, grading mistake, etc. So, to solve these fallacy, word-weighting process, where several harmful words which can be optained in internet site are discriminance and weighted, is utilized by using AC machine. At the result, the isolation rate of harmful site rose up to 90%, which means this process is greatly efficient.

  • PDF

Linux Based Real Time Network Intrusion Detection, Protection, Management and Fault Tolerance Security System (리눅스 기반 실시간 네트워크 칩입탐지대응관리 및 감내시스템)

  • Lee, Mike Myung-Ok;Lee, Eun-Mi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2113-2116
    • /
    • 2003
  • 이 논문에서는 리눅스 기반VDPM(Virus Detection Protection Management)시스템을 제안하고 개발한 응용SW로 감지, 차단 및 관리 방법을 제시한다. 제안된 LVPM시스템은 첫째특정탐색 및 전체탐색 알고리듬에 의하여 개발된 VDPM시스템은 신종 바이러스까지 탐지하는 모든 종류의 바이러스 탐지(VDPM_hawkeye) 모듈, Virus첵크하는 감시 및 Virus첵크후 친정, 제거하는 방지(VDPM_medic)모듈, DB를 update하는 기능을 가지는 관리(VDPM_manager)모듈과 원격 DB관리 및 Virus결과 보고 기능 (VDPM_reporter) 모듈로 되어 있으며 지능적인 Virus방지 시스템, 둘째 네트워크 패킷을 분석하여 네트워크를 통한 침 바이러스 탐지 및 대응 시스템과 셋째 네트워크 패킷을 분석하여 네트워치를 통한 네트워크형 악성 소프트웨어 대응 시스템을 포함한 바이러스 보호 통합 시스템을 구현하였다. 더불어 호스트와 네트웍기반의 통합적인 IDS가 방화벽(Firewall)시스템과 연동하여 IDS 단독 차단이 불가능한 공격을 차단하는 소프트웨어 시스템을 개발하는 것이며 관리자가 사용하기 쉬운 GUI환경으로 구현하였고 대규모 분산 네트워크 환경에서 효율적인 리눅스기반 침입탐지방지관리 솔루션을 제시한다.

  • PDF

A Development of the SMBC platform for supporting advanced performance of blocking spam-mails (향상된 차단 성능 지원을 위한 SMBC 플랫폼 개발)

  • Sso, Sang-Jin;Jin, Hyun-Joon;Park, Noh-Kyung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.2
    • /
    • pp.89-94
    • /
    • 2007
  • Even though lots of research have been doing about spam mail blocking technologies and their systems, the emergence of spam mails of new types causes the spam mail filtering rate to decrease and the occurrences of false-positive mails to increase. Therefore, existing spam mail filtering algorithms suffer from increasing load to be processed and decreasing reliability in spam mail blocking systems due to the shortage of newly developed algorithms and their research. This paper presents the Fit-FA Finder which is able to select appropriate algorithms to be applied and their procedures, and the development of the SMBC platform. The Fit-FA Finder is developed and implemented in the SMBC platform in which recovering process based on privacy information is employed for false-positive mails

  • PDF

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.

Analysis of Contact System in 460[V]/400[A]/85[kA] Molded Case Circuit Breakers (460[V]/400[A]/85[kA] 한류형 배선용 차단기 소호부 해석)

  • Lee, Seung-Su;Her, June;Yoon, Jae-Hun;Kang, Seong-Hwa;Lim, Kee-Joe
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.364-365
    • /
    • 2008
  • 배선용 차단기(MCCB)는 신속한 고장전류 차단과 전원시스템의 안정성을 확보하기 위해 배선시스템에 폭넓게 사용되고 있다. 배선용 차단기(MCCB)는 과부하 및 단로 등의 이상 상태시 전류를 차단하는 기구로, 오작동 시에는 중대한 사고를 초래한다. 따라서 배선용 차단기에 대한 보호성능의 항상, 신뢰성의 향상의 시장요구에 부응하기 위해 본 논문에서는 소호부 형상에 따른 차단성능을 파악하고 이를 통하여 성능향상을 이루고자 3차원 유한요소 프로그램(MAX-WELL)을 이용한 자계해석을 통해 차단성능 평가를 하였다. 이를 통하여 배선용 차단기의 소호부 설계시 차단성능 검증과 제품의 소형화 및 고성능화를 이끌고자 한다.

  • PDF

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

An Agent System for Searching of Host Computer and Blocking Network Access in IPv6 Environment (IPv6 환경에서 호스트 탐색 및 네트워크 접속 차단 에이전트 시스템)

  • Chung, Youn-Ky;Moon, Hae-Eun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.144-152
    • /
    • 2011
  • As IPv4 addresses are exhausting, the use of IPv6 addresses is increasing. IPv6 environment provides address auto-configuration function. If addresses are allocated to each host automatically, network management system has difficulty in inspecting every IP of all devices and keeping the relevant informations. Also, as IP addresses are configured automatically, problems such as malicious users accessing network devices with no restriction can occur. To solve these problems, managing and blocking of malicious user is necessary. In this paper, we suggest agent system for searching of host computer and blocking network access which manages and protects the major network resources efficiently by searching host and blocking unauthorized host access to network in IPv6 environment. According to the test results of function of this agent system in IPv6 environment, we have checked that this system performs searching and blocking function normally.

A Study on the Evaluation of Watertightness Properties for Rain-Block System in the Sliding-Roof Joint of Large-Span Membrane Structures (개폐식 대공간 막 구조물에서 지붕 맞댐부 우수차단 시스템의 수밀성 평가에 관한 연구)

  • Oh, Sang-Keun;Baek, Ki-Youl;Lee, Sun-Gyu
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.3
    • /
    • pp.129-136
    • /
    • 2010
  • This study is an evaluation of the water-tightness properties of rain-block systems in the sliding-roof joint of large-span membrane structures. In this study, we suggested a method of evaluating the water-tightness performance of the joint part of a sliding door in the roof of a large-span membrane structure (for a pilot project), in an environment of rain and wind. The shape of the rainwater blocking systems of the joint part in a sliding door verifies the defects and the effects of water leakage prevention when there is precipitation with wind conditions. To secure the water-tightness of large span membrane structures, it is necessary to have a guideline on the evaluation of the design for rain-block system of the joint part, and the quality of the membrane material, both of a retractable roof and a closed roof.

A Study on Methodology for Protection of Malicious Traffic in Groupware Network System (그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.69-76
    • /
    • 2007
  • The blocking of malicious traffic in groupware network system is used to prevent the spread and distribution of malicious traffic. The method protecting from malicious traffic in groupware system is designed to handle the malicious traffic of various routes with the internal course of groupware, which leads to lighten the load of security and traffic. It was impossible to block this kind of traffic at the traditional structure. When the protection of the proposed groupware system is performed, there appears to be a great change for the rate of a load factor at the CPU of Backbone Switch which is connected to the internal gateway. The load factor of CPU, which was increased with the traffic, is now remarkably reduced after the internal gateway is set up. This is to show that a lot of malicious traffic pass through the internal network and that network environment is faced to the menace of many malicious traffics. This paper is to show the efficiency of protection of internal gateway proposed in this study, for the rate of CPU of Backbone Switch was about 17% a day, but was dropped up to the 4% after the malicious traffic was removed.

  • PDF