• Title/Summary/Keyword: 프락시서버

Search Result 73, Processing Time 0.027 seconds

Web Proxy Cache Replacement Algorithms using Object Type Partition (개체 타입별 분할공간을 이용한 웹 프락시 캐시의 대체 알고리즘)

  • Soo-haeng, Lee;Sang-bang, Choi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.5C
    • /
    • pp.399-410
    • /
    • 2002
  • Web cache, which is functionally another word of proxy server, is located between client and server. Web cache has a limited storage area although it has broad bandwidth between client and proxy server, which are usually connected through LAN. Because of limited storage capacity, existing objects in web cache can be deleted for new objects by some rules called replacement algorithm. Hit rate and byte-hit rate are general metrics to evaluate replacement algorithms. Most of the replacement algorithms do satisfy only one metric, or sometimes none of them. In this paper, we propose two replacement algorithms to achieve both high hit rate and byte-hit rate with great satisfaction. In the first algorithm, the cache is appropriately partitioned according to file types as a basic model. In the second algorithm, the cache is composed of two levels; the upper level cache is managed by the basic algorithm, but the lower level is collectively used for all types of files as a shared area. To show the performance of the proposed algorithms, we evaluate hit rate and byte-hit rate of the proposed replacement algorithms using the trace driven simulation.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF

P2P Cooperative Cache Replacement Policy for Web Caching (웹 캐싱을 위한 P2P 협력적인 캐시 교체 정책)

  • Kim, Sang-Hoon;Ryu, Young-Suk;Yang, Sung-Bong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.253-255
    • /
    • 2005
  • P2P 웹 캐싱 기술은 자신의 로컬 캐시에서 원하는 웹 객체를 찾지 못한 경우, 중앙 서버나 프락시 서버로부터 웹 객체를 받기 전에 P2P 네트워크에 참여하는 이웃으로부터 웹 객체를 받음으로써 기존의 서버-클라이언트 방식을 탈피하여 중앙 서버의 고장에 영향을 적게 받고, 중앙 서버로의 과도한 부하를 막아준다. 기존의 많은 P2P 웹 캐싱 시스템은 피어의 로컬 캐시 교체 정책으로 LRU기법을 사용한다. 하지만 이는 P2P 환경을 고려하지 않는 단순한 정책이다. 따라서 본 논문에서는 P2P 환경을 고려한 디렉토리 기반의 웹 캐싱 시스템을 통해서 P2P 협력적인 캐시 교체 정책을 제시하고 실제 웹 로그 트레이스로 시뮬레이션을 하여, 제안하는 교체 정책이 효과가 있음을 기술한다.

  • PDF

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 구조)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.643-650
    • /
    • 2008
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

Design and Implementation for the Remote sharing of the OSGi services (OSGi 서비스의 원격 공유를 위한 기술 설계 및 구현)

  • Baek, Kyoung-Yun;Yun, Ki-Hyun;Kim, Eun-Hoe;Choi, Jae-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.15-18
    • /
    • 2011
  • 현재 컴퓨팅 환경은 분산, 이동, 유비쿼터스 컴퓨팅 환경으로 진화되고 있다. OSGi는 유비쿼터스 환경에서 디지털 이동 전화, 차량, 임베디드 가전, 가정용 게이트웨이, 데스크탑 컴퓨터, 고성능 서버에 이르기까지 그 적용범위가 확대되고 있다. 따라서 서로 다른 장비에 탑재된 OSGi 프레임워크의 서비스들을 서로 연동하여 원격 OSGi 서비스들을 공유하여 상호 운용할 수 있는 기술이 필요하게 되었다. 본 논문에서는 분산 OSGi 프레임워크에서 원격 서비스의 상호운용을 지원하기 위하여 분산 미들웨어 기술인 RMI 패러다임을 적용한 원격 OSGi 서비스 상호운영 방안을 제안한다. 제안하는 원격 OSGi 서비스 상호운용 방안은 OSGi 표준 기술을 활용 및 확장하여 OSGi 아키텍처에 부합하는 원격서비스의 등록 및 발견, 접근 방법을 제공한다. 또한 동적으로 프락시 번들 및 프락시 서비스를 생성함으로써 원격 OSGi 서비스의 위치 투명성을 지원하는 특징을 가진다.

  • PDF

Quantity-based Proxy Caching Policy for Continuous Media Streams Using User′s Access Pattern (사용자 접근 패턴을 반영한 연속미디어의 재생량에 따른 proxy caching 기법)

  • 홍현옥;장신애;정기동
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.595-597
    • /
    • 2001
  • 연속미디어 데이터에 적합한 프락시 캐슁 기법을 연구하기 위하여 인터넷 상어서 서비스 되고 있는 비디오 데이터에 대한 사용자 액세스 패턴을 분석하였다. 비디오 특성에 따른 인기도의 변화와 life cycle 을 분석하여 효율적인 프락시 캐슁 기법을 제안한다. 연속미디어 객체의 인기도에 비례하여 전체 또는 앞부분을 캐슁함으로써 를라이언트에 대한 초기지연시간을 감소시키고, 캐쉬 공간을 효율적으로 사용하면서 캐슁의 효과를 극대화 하고자 한다. 비디오의 aging을 고려하여 재생량에 기반한 인기도를 계산할 수 있는 지수분포 모형을 제시하고 주기 적으로 인기 가 낮은 오브젝트를 인기가 높은 오브젝트로 대체해 나가는 방법을 계시한다. 제안하는 기법의 성능을 평가하기 위하여 인터넷 방송국 VOD서버의 로그 데이터를 이용한 트레이스 기반 실험을 수령하였다. 그 결과, 제안하는 기법이 BHR, DSR, 재배치외 측면에서 기존의 캐슁 기법들에 비하여 전반적으로 우수한 성능을 보여주었다.

  • PDF