• Title/Summary/Keyword: C&C Server

Search Result 587, Processing Time 0.031 seconds

Simulated Dynamic C&C Server Based Activated Evidence Aggregation of Evasive Server-Side Polymorphic Mobile Malware on Android

  • Lee, Han Seong;Lee, Hyung-Woo
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Diverse types of malicious code such as evasive Server-side Polymorphic are developed and distributed in third party open markets. The suspicious new type of polymorphic malware has the ability to actively change and morph its internal data dynamically. As a result, it is very hard to detect this type of suspicious transaction as an evidence of Server-side polymorphic mobile malware because its C&C server was shut downed or an IP address of remote controlling C&C server was changed irregularly. Therefore, we implemented Simulated C&C Server to aggregate activated events perfectly from various Server-side polymorphic mobile malware. Using proposed Simulated C&C Server, we can proof completely and classify veiled server-side polymorphic malicious code more clearly.

Middleware on Hanuri/C as a Multimedia Client-Server Application Development Tool (멀티미디어 클라이언트-서버 응용 개발 도구인 한우리/C의 미들웨어)

  • Im, Chae-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.797-806
    • /
    • 1995
  • The Client-Server model is a computing technique that efficiently uses distributed resources via networks. But, generating an application using Client- Server model requires many different expertises to developers in comparison to that of using the centralized computing method. That is, and application developer must be familiar with network programming and GUI(Graphical User Interface) techniques in addition to conventional programming skills. Accordingly, the time and man power have been issued for building a Client-Server system. To alleviate these problem, the Client-Server applications development tools are needed To meet such a need, we developed a GUI based tool, called Hanuri/C, for generating Client-Server application programs. In comparison to existing Client-Server tools, Hanuri/C is reinforced Multimedia facilities, Hanuri/C is reinforced Multimedia facilities. Hanuri/C is considered as a front-end part of distributed system software. That is, Hanuri/C is a Client-Server tool similar to Forth Generation Language(4GL) supporting multimedia application on top of the Distributed Computing environment(DCE). In this paper, we present the design and implementation method of the middleware part of Hanuri/c.

  • PDF

Method for NoC Bottleneck Relaxation Using Proxy (프록시를 이용한 NoC의 병목현상 해소 방법)

  • Kim, Kyu-Chull;Kwon, Tai-Hwan
    • The KIPS Transactions:PartA
    • /
    • v.18A no.1
    • /
    • pp.25-32
    • /
    • 2011
  • NoC is actively being studied recently in order to overcome the limitations of shared-bus architecture. We proposed an NoC architecture which employs a buffer that plays a similar role of a proxy server in a computer network to enhance the communication efficiency of NoC architecture. In the proposed NoC architecture, whenever the master has a difficulty in communicating with the slave directly, the master communicates with the proxy server which is able to communicate with the slave on behalf of the master. With the proposed scheme in NoC, we can increase the speed and the bandwidth of communication channel. The experimental results showed that overall communication efficiency was significantly improved by sending the packets to the proxy server rather than holding them in the switch buffer.

An Architecture Model on Artificial Intelligence for Ground Tactical Echelons (지상 전술 제대 인공지능 아키텍처 모델)

  • Kim, Jun Sung;Park, Sang Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.513-521
    • /
    • 2022
  • This study deals with an AI architecture model for collecting battlefield data using the tactical C4I system. Based on this model, the artificial staff can be utilized in tactical echelon. In the current structure of the Army's tactical C4I system, Servers are operated by brigade level and above and divided into an active and a standby server. In this C4I system structure, the AI server must also be installed in each unit and must be switched when the C4I server is switched. The tactical C4I system operates a server(DB) for each unit, so data matching is partially delayed or some data is not matched in the inter-working process between servers. To solve these issues, this study presents an operation concept so that all of alternate server can be integrated based on virtualization technology, which is used as an source data for AI Meta DB. In doing so, this study can provide criteria for the AI architectural model of the ground tactical echelon.

DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram (N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지)

  • Kim, Donghyeon;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1141-1151
    • /
    • 2018
  • In an APT attack, the communication stage between infected hosts and C&C(Command and Control) server is the key stage for intrusion into the attack target. Attackers can control multiple infected hosts by the C&C Server and direct intrusion and exploitation. If the C&C Server is exposed at this stage, the attack will fail. Therefore, in recent years, the Domain Generation Algorithm (DGA) has replaced DNS in C&C Server with a short time interval for making detection difficult. In particular, it is very difficult to verify and detect all the newly registered DNS more than 5 million times a day. To solve these problems, this paper proposes a model to judge DGA-DNS detection by the morphological similarity analysis of normal DNS and DGA-DNS, and to determine the sign of APT attack through it, then we verify its validity.

Implementation and Design of EJB Based on Seat Reservation System for Effective E-Business (효율적인 E-Business구축을 위한 EJB기반의 좌석예약 시스템 설계 및 구현)

  • Jeong, Hwa-Young
    • Journal of Korea Game Society
    • /
    • v.2 no.2
    • /
    • pp.113-119
    • /
    • 2002
  • With development of internet technology, digital economy that advance rapidly formed much leagues of B2B, B2C, A2B etc, according to the application part. Also, electronic commerce system implementation technology is introduced by Component based on development method in object oriented technique base depending on customer's requirement, and development environment changes by 3- Tiers, Web-Based architecture etc. in existent C/S (Client/Server) environment and is introduced. Thus, In this research, I implemented seat reservation and confirmation system that can be used in electronic commerce in multi-server environment. This, for improve efficiency in distribute environment, relevant importance logic used server component model EJB, and implemented through JSP and Java that use Servlet of Resin Server environment for Main Server. Therefore, through independence component using EJB, I did so that can improved independence between electronic commerce system logic, and reduce server's overhead calling relevant method through discrete EJB server, and manage each logic resources efficiently.

  • PDF

Feature Selection with PCA based on DNS Query for Malicious Domain Classification (비정상도메인 분류를 위한 DNS 쿼리 기반의 주성분 분석을 이용한 성분추출)

  • Lim, Sun-Hee;Cho, Jaeik;Kim, Jong-Hyun;Lee, Byung Gil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.55-60
    • /
    • 2012
  • Recent botnets are widely using the DNS services at the connection of C&C server in order to evade botnet's detection. It is necessary to study on DNS analysis in order to counteract anomaly-based technique using the DNS. This paper studies collection of DNS traffic for experimental data and supervised learning for DNS traffic-based malicious domain classification such as query of domain name corresponding to C&C server from zombies. Especially, this paper would aim to determine significant features of DNS-based classification system for malicious domain extraction by the Principal Component Analysis(PCA).

The Use of System for Design Verification of PCI Express Endpoint RTL Core

  • Kim Sun-Wook;Kim Young-Woo;Park Kyoung
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.285-288
    • /
    • 2004
  • In this paper, we present a design and experiment of PCI Express core verification model. The model targeting Endpoint core based on Verilog HDL is designed by newly-emerging SystemC, which is a new C++ class library based system design approach. In the verification model, we designed and implemented a SystemC host system model which acted as Root Complex and device driver dedicated to the PCI Express Endpoint RTL core. The verification process is scheduled by scenarios which are implemented in host model. We show that the model is useful especially for verifying the RTL model which has dependencies on system software.

  • PDF

A Study of the Benchmarks for OLTP Server's Performance Measurement and Sizing (OLTP서버 성능측정 및 규모산정을 위한 벤치마크 기준에 대한 고찰)

  • Ra, Jong-Hei;Choi, Kwang-Don
    • Journal of Digital Convergence
    • /
    • v.7 no.3
    • /
    • pp.25-33
    • /
    • 2009
  • Historically, performance prediction and sizing of server systems have been the key purchasing argument for customer. To accurate server's sizing and performance prediction, it is necessary to correctness guideline for sizing and performance prediction. But existing guidelines have many errors. So, we examine the benchmarks of performance organization such as SPEC and TPC. And then we consider to TPC-C and TPC-E benchmarks for OLTP server's sizing and performance prediction that is a basic concept of guidelines. Eventually, we propose improvement of errors in guidelines.

  • PDF

The Implementation and Performance Measurement for Hadoop-Based Android Mobile TPC-C Application (모바일 TPC-C: 하둡 기반 안드로이드 모바일 TPC-C 어플리케이션 구현 및 성능 측정)

  • Jang, Han-Uer;No, Jaechun;Kim, Byung-Moon;Lee, Ji-Eun;Park, Sung-Soon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.203-211
    • /
    • 2013
  • Due to the rapid growth of mobile devices and applications, mobile cloud computing is becoming an important platform in the development of cloud services. However, the mobile cloud computing is facing many challenges in terms of the computing resources and communications. One of them is the performance issue between mobile devices and cloud server. In the paper, we implemented a hadoop-based android mobile application, called mobile TPC-C, and used it for evaluating the performance aspect between mobile devices and cloud server. The mobile TPC-C was implemented based on the existing TPC-C, to make it possible to execute on top of android mobile devices. The performance measurement using mobile TPC-C was executed on various transactions while changing the number of mobile clients. By comparing it to the evaluation on the personal PC, we tried to point out the important aspects affecting the performance improvement between mobile clients and cloud server.