• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.034 seconds

Risk analysis and assessment Methodology Research for network based Real-time Risk Management (네트워크 기반의 실시간 위험관리를 위한 위험분석 및 평가 방법연구)

  • Kim, Sung-Won;Kim, Hui-Young;Kwon, Young-Chan;Yun, Ho-Sang;Kim, Chul-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.29-34
    • /
    • 2007
  • 본 논문은 다양한 시스템이 존재하는 컴퓨터 네트워크 상의 위험을 분석 평가하기 위한 방법을 소개한다. 실시간으로 위험을 구성하는 요소들의 상태가 변화하는 상황에서 자산의 강도 평가, 위협 가능성 분석, 취약성에 대한 기존 통제 분석이 필요하다. 기존 통제 구성은 네트워크 토폴로지를 이용한 네트워크 베이스, 응용 어플리케이션에 기반한 호스트 베이스 통제가 있으며, 이들은 컴퓨터 네트워크상의 실질적인 취약성을 효과적으로 식별하는데 도움을 준다. 또한 가능성 분석은 위험평가 과정에서 불필요한 위협 정보를 효과적으로 제거하여 줄 수 있을 것이다.

  • PDF

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Development of a Command and Control System Based on Network Emulator (네트워크 에뮬레이터기반 지휘통제시스템의 개발)

  • Kim, Donghyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.125-130
    • /
    • 2015
  • In this paper, a command and control (C2) system development using a network emulator is treated. Due to the development of information and communication technologies enabling reinforcement of information exchange and computational capability, an operational concept network centric warfare (NCW) was introduced. In here, it summarizes a developmental test environment build based on dummynet, one of the software based network emulator, and an operational concept of target command and control system. Moreover, I explain command and control system developmental test cases and results, and suggest an operational concept to overcome limitations of target communication system. I expect this concept will reduce data traffic of proposed C2 system especially plot messages which is distributed same data with short interval.

Tactical and Operational Control Platform based on OpenStack Cloud and Data Distribution Service (오픈스택 클라우드 및 데이터 분산 서비스 기반 전술작전통제 플랫폼)

  • Jun, Tae Joon;Yoo, Myong Hwan;Cho, Kyu Tae;Lee, Seung Young;Yeun, Kyuoke;Kim, Daeyoung
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.199-201
    • /
    • 2015
  • 국방 분야에서 전술작전센터를 구성하는 전술작전통제 플랫폼은 다양한 내/외부 체계 시험 장치를 연동하여 교전/작전 통제를 수행하는 플랫폼이다. 기존의 전술작전통제 플랫폼은 서로 다른 환경에서 개발된 시험 장치 소프트웨어를 통합 구축하는데 어려움이 있으며, 플랫폼을 구성하는 서버 자원의 탄력적 분배가 불가능하다. 본 연구는 전술작전센터를 구성하는 전술작전통제 플랫폼을 오픈스택 클라우드 및 KVM 하이퍼바이저를 기반으로 구축하여 내/외부 체계 시험 장치 소프트웨어의 실행 환경을 가상 머신으로 제공하였으며, 가상 머신 간 고속 데이터 통신을 위해 데이터 분산 서비스 및 10Gbps 이더넷, QDR 인피니밴드 네트워크를 활용하였다. 또한 오픈스택 클라우드 기반 전술작전통제 플랫폼의 네트워크를 구성하는 10Gbps 이더넷 및 QDR 인피니밴드 네트워크상에서 데이터 분산 서비스의 성능 평가를 수행하였다.

Design of Network control and Spontaneous Agent based Software Lisence Control Systems (네트워크 통제와 능동형 에이전트 기반의 소프트웨어 라이센스 제어 시스템 설계)

  • Park Jung-Jin;Jung Hoi-Young;Hong Chul-Ui;Park Jin-Sub;Shin Young-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.385-387
    • /
    • 2006
  • 최근 인터넷 사용의 증가라 네트워크 통신 속도의 향상으로 인하여, 인터넷을 통한 대용량의 데이터의 전송이 활발하게 이용되고 있다. 이로 인하여 공공기판 및 교육기관, 기업 등에서 사용되고 있는 소프트웨어 중 정식적인 라이센스를 구입하지 않고 사용자들이 개인적으로 인터넷을 통해 불법적으로 다운받아 설치하여 사용하는 사례가 급속하게 증가하고 있다. 본 논문에서는 조직에서 효과적으로 소프트웨어 사용량을 파악하고 사용을 통제함으로써 불법소프트웨어의 사용을 줄일 수 있는 방법으로 지능형 에이전트와 네트워크 통제 방식을 연동한 라이센스 통제 기법을 제안한다.

  • PDF

Control Networks for Information Systems Development : Organizational and Agency Theory Perspectives (조직 이론과 대리 이론 관점에서 본 정보시스템 개발의 통제 네트워크에 관한 연구)

  • Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.71-90
    • /
    • 2012
  • Although it has been studied for a long time in various disciplines, most of control theories remain being developed by analyzing relatively simple tasks. Even recent research on control of information systems development explains only a small part of control phenomena observed in the real world projects. This research focuses on identifying and analyzing the concepts and structures in order to make them useful for understanding and explaining control of information systems development comprehensively This investigation utilizes the complementary relationship between views on control from organizational and economic perspectives. A conceptual framework developed by integrating previous research on control allows us to analyze the development of information systems for control purposes. The results of discussion about control mechanisms and network can be used as guidelines for designing control systems in real projects. Analysis of control networks shows that control of development projects requires quite complex networks intertwining a variety of controllers and controlees. The results of this research are expected to contribute to correcting the unbalanced status of IS research which has emphasized too heavily on planning and implementation, and deepening and widening our understanding about controlling development projects. Practitioners can use the results as guidelines for designing control mechanisms and networks, and get alerted by them about the agency risks inherent in outsourced developments.

New Techology Trends on Indexing for Moving Objects (SOA 플랫폼 분석과 시장전망)

  • Paik, Jong-Hyun;Kim, Hyeoung-Seok;Kim, Yeong-Ho;Han, Sang-In
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.25 no.1 s.212
    • /
    • pp.40-46
    • /
    • 2007
  • SOA 플랫폼은 비즈니스의 신속한 변화와 지속적인 최적화를 지원할 수 있도록 SOA 철학을 반영한 기본소프트웨어 인프라이다. SOA 플랫폼은 서비스를 생성하고 관리하는 서비스 라이프사이클 환경, 사용자에게 서비스의 전달을 담당하는 서비스 전달 네트워크, 서비스 수행과 서비스 제공 수준을 통제하는 서비스 통제 플랫폼 그리고 비즈니스 어플리케이션을 토대로 서비스 생성에 기반이 되는 기저 어플리케이션 플랫폼으로 구성된다. 현재 시장에서는 서비스 라이프사이클 환경과 기저 어플리케이션 플랫폼이 주로 적용되고 있으며, 향후에는 서비스 전달 네트워크와 서비스 통제 플랫폼의 적용이 점진적으로 증가될 것으로 예상된다.

Network Group Access Control system using piggy-backing prevention technique based on Infrared-Ray (적외선 기반 피기백킹 방지 기법을 적용한 네트워크 그룹 접근통제 시스템)

  • Kim, JongMin;Choi, KyongHo;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.109-114
    • /
    • 2012
  • Information society in recent times, lots of important information have been stored in information systems. In this situation, unauthorized person can obtains important information by piggy-backing and shoulder surfing in specific area of organization. Therefore, in this study, we proposed network group access control system by combining RFID and infrared-ray for blocking information leakage due to unauthorized access by internal threats and enhancing personnel security. So it can provides a more secure internal network environment.

The Effect of Perceived Information Control on the Knowledge Sharing Intention of the Social Network Service Users (인지된 정보 통제가 소셜 네트워크 이용자의 정보 제공 의도에 미치는 영향)

  • Lee, Un-Kon;Kim, Kyong Kyu;Song, Ho Hyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.107-127
    • /
    • 2013
  • The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced the information control mechanisms from the prior studies in data management to the SNS area and empirically validated the effect of these mechanisms in this research. Three information control mechanisms had been elected as access control, reference control and diffusion control. We had conducted a survey to the Facebook users which is the most famous SNS site. 459 data had been gathered and analyzed by PLS algorism. As the results, reference control and diffusion control has significantly increased the trust on SNS providers and decrease the privacy concern. This change could significantly affect on the satisfaction with the SNS site and knowledge sharing intention of SNS users. This study could introduce the new perspective about privacy protection issues in SNS area. Also, the information control mechanisms suggested in this study could contribute to make more robust privacy protection mechanisms in SNS site in practice.

Analysis of Network Influence Factor considering Social Network Analysis and C2 Time (소셜 네트워크 분석과 지휘통제시간을 고려한 네트워크 영향력 요소 분석)

  • Jeon, Jin-Tae;Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.257-266
    • /
    • 2011
  • Over the society the trial for several systems to be connected with Network has been continued to share information and to make it various. In accordance with such a change, the concept of military warfare conduction has been changing form platform centric warfare in separate combat system based on network centric warfare in network based. We have continuously made an effort that we try to get the goal with efficient system which is linked up with network, but such a study on that one in military system analysis is still slower than the study out of military until now. So this study is searching network influence factor by using military network with application of social network analysis method which is used broadly in the society and the science as well. At this time we search co-relationships between social network and the thing that we can analyse C2 time by effectiveness measurement means. By this study it has value of network influence factor identification for the growing network composition.