• Title/Summary/Keyword: C&C Server

Search Result 587, Processing Time 0.025 seconds

An Approach to Composite Techniques and Application of EJB Component using Adapter Pattern (Adapter패턴을 이용한 EJB 컴포넌트 조립 기법 및 응용)

  • Jeong Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.67-74
    • /
    • 2003
  • According to change of software development technique as design pattern, component based development etc.., web server development part is applied activity to fit in various user requirement. Especially, EJB as sewer side component model much researches and introduce by easy and various development support. Also, component composing techniques is receiving many interests by easy and efficient application way that architecture based C2 style architecture with message handling. But, in case of EJB component that can not cail thread, C2 framework modification is unavoidable for component composition by C2 style architeccture. For this, we propose techniques to use Adapter pattern to be one of structure pattern among pattern. That is, did so that component composition by C2 style architecture may can consist changing to be able to call thread function in EJB by Adapter pattern.

  • PDF

Efficient Key Agreement Protocols using Proxy Server (Proxy 서버를 이용하는 효율적인 키 분배 프로토콜)

  • Yang Hyung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.29-36
    • /
    • 2005
  • A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is in rapid progress. Several efficient and secure key agreement protocols have been proposed so far since Diffie-Hellman proposed a public key agreement system in 1976. But, since Diffie-Hellman based key agreement protocols need a lot of computation to establish the session key, they are not suitable for wireless Internet environment. In this paper, we propose the efficient key agreement protocol using Proxy server. The Proposed Protocol gives the security equivalent to that the Diffie-Hellman based Protocol and the computation work of mobile user can be decreased using proxy server.

A Performance Evaluation of EAP-TLS Authentication Model in the AAAv6 (AAAv6에서의 EAP-TLS 인증모델 성능평가)

  • Jeong, Yun-Su;Kim, Hyung-Do;Lee, Hae-Dong;Kim, Hyun-Gon;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.309-318
    • /
    • 2004
  • AAAv6-based Diameter method is using in the user authentication to satisfy the users' increasing user authentication demand and to supply a safe communication between mobile node and server in the Mobile IP. therefore, In this paper, We design a model of server capacity based on EAP-TLS that in one of AAAv6 models with mobility among domains to get the optimized capacity index of the server for user authentication accomplishment. We elicitat the authentication capacity index for each server of which is accomplishing in user authentication using DSA/RSA algorithm and purpose the optimized condition for the AAAv6 capacity by the index.

Design and Implementation of P2P-Based Data Service System to Reduce Server Load (서버 부하 감소를 위한 P2P 기반 데이터 서비스 시스템의 설계 및 구현)

  • Lee, Kwang-Hyon;Jeon, Hyung-Su;Yoo, Cheol-Jung;Chang, Ok-Bae
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.615-626
    • /
    • 2002
  • Recently, as interest in Home networking is increased, research about multimedia clip service is gone. Because of the limit to bandwidth of home network, the problem of server traffic is increased by transferring many multimedia data through Client-Sewer Way for long. The data share network system applied is designed and implemented to solve this problem. P2P is connected directly between clients and exchanges data without going through a sewer. We implemented platform-independent System using Java and applied P2P skill to reduce server traffic.

Development of Geophysical Data Management System (물리탐사자료 데이터베이스 시스템 구축 연구)

  • Lee, Tai-Sup;Hwang, Hak-Soo;Sun, Hee-Duck;Koo, Sung-Bon;Song, Yaung-Soo
    • Geophysics and Geophysical Exploration
    • /
    • v.3 no.1
    • /
    • pp.25-32
    • /
    • 2000
  • The geophysical data management system was developed to meet both the increasing demands of geophysical data in the practical application of civil engineering, underground water survey, and environmental problems and needs for digital archive and quality control of geophysical data. The system for a data manager is developed under Client/Server (C/S) environment. This manager system is characterized by a relational geophysical database system using MS SQL-server, standardization of geophysical data format, the development of C/S interface program for Windows environment, and the development of transfer program module for the searched data. The system developed for a general user under the internet environment is characterized by Web service (URL:http//geophy.kigam.re.kr) and the development of plug-in module to visualize geophysical image data.

  • PDF

Development of Embedded Web Server System Using a Real-Time OS (실시간 운영체제를 이용한 내장형 웹서버 시스템 개발)

  • 정명용;문승빈;송상훈
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.223-223
    • /
    • 2000
  • Embedded system area has brought an innovation and has been spread rapidly by the growth of the Internet, wireless telephony and multimedia recently. Many embedded systems are required to be real-time systems in that it needs multi-tasking and priority based scheduling. This paper introduces a real-time system that was developed with web server ability for control and monitoring system employing a real-time operating system. It discusses the design model, structure, and applications of web server system. We used SNDS100 board which has a 32-bit RISC microcontroller of ARM7TDMI core as a hardware platform. MicroC/OS kernel was used as Real-time operating system that supports a preemptive and multitasking functions. We developed a hierarhchical control and monitoring system that not only reduced system and management costs, but also enhanced reusability and portability.

  • PDF

Power and Heat Load of IT Equipment Projections for New Data Center's HVAC System Design (데이터센터의 공조시스템 계획을 위한 IT장비의 전력 및 발열량 예측에 대한 연구)

  • Cho, Jin-Kyun;Shin, Seung-Ho
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.24 no.3
    • /
    • pp.212-217
    • /
    • 2012
  • The cooling of data centers has emerged as a significant challenge as the density of IT equipment increased. With the rapid increasing of heat load and cooling system, predictions for electronics power trends have been closely watched. A data center power density projection is needed so that IT organizations can develop data centers with adequate cooling for reasonable lifetimes. This paper will discuss the need for something more than processor and equipment power trend projections which have overestimated the required infrastructure for customers. This projection will use data from a survey of actual enterprise data centers and the ASHRAE projections to formulate a data center server heat load trend projection.

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.

A Study of Command & Control Server through Analysis - DNS query log (명령제어서버 탐색 방법 - DNS 분석 중심으로)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1849-1856
    • /
    • 2013
  • DOS attack, the short of Denial of Service attack is an internet intrusion technique which harasses service availability of legitimate users. To respond the DDoS attack, a lot of methods focusing attack source, target and intermediate network, have been proposed, but there have not been a clear solution. In this paper, we purpose the prevention of malicious activity and early detection of DDoS attack by detecting and removing the activity of botnets, or other malicious codes. For the purpose, the proposed method monitors the network traffic, especially DSN traffic, which is originated from botnets or malicious codes.

Concurrency Control for Client Transactions in Broadcast Disk Environments (방송 디스크 환경에서 클라이언트 트랜잭션을 위한 동시성 제어)

  • Cho, Haeng-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.99-107
    • /
    • 2002
  • Broadcast disks are suited for disseminating information to a large number of clients in mobile computing environments. In broadcast disks, the server continuously and repeatedly broadcasts all data items in the database to clients without specific requests. The clients monitor the broadcast channel and retrieve data items as they arrive on the broadcast channel. The broadcast channel then becomes a disk from which clients can retrieve data items. In this paper, we propose a cache conscious concurrency control ($C^4$) scheme to preserve the consistency of client transactions, when the values of broadcast data items are updated at the server. $C^4$ scheme is novel in the sense that it can reduce the response time of client transactions with minimal control information to be broadcast from the server. This is achieved by the judicious caching strategy of the clients.