• Title/Summary/Keyword: C&C Server

Search Result 587, Processing Time 0.018 seconds

Authentication and Session Management based on Ajax (Ajax를 기반으로 한 인증 및 세션 관리)

  • Nam Sang-On;Daguil Rolyn C;Kim Gi-Weon;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.157-174
    • /
    • 2006
  • Ajax interaction model changes the posture of web application to become a stateful over HTTP. Ajax applications are long-lived inthe browser. XMLHTTPRequest (XHR) is used to facilitate the data exchange. Using HTTPS over this interaction is not viable because of the frequency of data exchange. Moreover, switching of protocols form HTTP to HTTPS for sensitive information is prohibited because of server-of-origin policy. The longevity, constraint, and asynchronous features of Ajax application need to hove a different authentication and session fondling mechanism that invoke re-authentication. This paper presents an authentication and session management scheme using Ajax. The scheme is design lo invoke periodic and event based re-authentication in the background using digest authentication with auto-generated password similar to OTP (One Time Password). The authentication and session management are wrapped into a framework called AWASec (Ajax Web Application Security) for coupling to avoid broken authentication and session management.

  • PDF

Design and Implementation of an MPEG-2 AAC Format-based Audio Streaming System (MPEG-2 AAC 포맷 기반의 오디오 스트리밍 시스템 설계 및 구현)

  • 이승재;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1251-1264
    • /
    • 2002
  • Currently, audio streaming services such as on-demand service and live service support only a limited number of clients. They also suffer from a lack of stability and degradation of service quality due to their inefficient use of network resources. Futhermore, since the streaming services usually do not consider dynamic services, they are very inconvenience to use. In order to resolve these drawbacks, we propose a novel audio streaming system based on MPEG-2 AAC file format which are facilitated with the network bandwidths efficiently. The proposed system supports QoS for audio streaming as well as guarantees a stability while streaming service is undergoing. Moreover, the system provides a dynamic interface which enables us to use the streaming service more easily and to manage streaming servers with convenient manner. On the contrary, most of the current available static interface streaming services are mainly depending only on a single fixed web page between client and server, which in consequence lead us to use unflexible static service environment. Our implementation results show the proposed system improves the performance compared to those of the currently existing systems that use MP3 file format. It also provides some benefits such as a stability of service and a easy to management of streaming servers.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Design of An Fair Non-Repudiation Protocol Using Digital Signature Recorder (전자서명 기록기를 이용한 공정한 부인방지 프로토콜의 설계)

  • Lee, Yong-Joon;Oh, Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1345-1351
    • /
    • 2004
  • Due to the overwhelming importance the Internet gained nowadays, more and more sophisticated security services are requested. However many applications such as Internet Banking, Home Trading System, Electronic Medical Recede, electronic commerce, etc. are related to non-repudiation. Non-repudiation services are one of these new security requirements. ill comparison to other security issues, such as privacy or authenticity of communications, non-repudiation has not been studied intensively. Informally, we say that a protocol is fair if at the end of the protocol execution either originator receives a non-repudiation of receipt evidence and recipient receives a non-repudiation of origin evidence or none of them receives any valid evidence. The most non-repudiation protocols rely on a trusted third party(TIP) that has to intervene during each protocols run. the TIP may create a communication bottleneck. ill this paper, we suggest the digital signature recorder that guarantees fairness logically and supplies minimal network bottleneck to be composed verification server physically.

Object Wrapping Model and Application for Integration of Security Interface (보안 인터페이스의 통합을 위한 객체 포장 모델 및 응용)

  • 김영수;최흥식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.333-341
    • /
    • 2004
  • Along with the innovative enhancement of Internet technology and the emergency of distributed systems extended from client-server computing, it becomes indispensible and necessary to integrate and interconnect old legacy systems. Since building a distributed system requires consistency of integration, the proper reuse of incumbent systems is critical to successful integration of current systems to distributed ones. CORBA(Common Object Request Broker Architecture) and object wrapping technique can provide middleware solutions that extend the applications of a legacy system with little modification to the application level while keeping client consistency of standard interface. By using these techniques for system integration it is easier and faster to extend services on application development to distributed environments. We propose a model on object wrapping system that can manage, integrate, and separate the functions delivered from CORBA. We apply the object wrapping model specifically to integration of security system interfaces and also perform a test to verify the usability and the efficiency of our model.

A Study on Development of Industrial Engine Monitoring System Using Smart Phone Application (스마트폰 앱을 이용한 산업용 엔진의 모니터링 시스템 개발에 관한 연구)

  • Jeong, C.S.;Kim, Y.S.;Jeong, Y.M.;Kho, J.H.;Jeong, K.S.;Lee, H.S.;Yang, S.Y.
    • Journal of Drive and Control
    • /
    • v.10 no.2
    • /
    • pp.7-12
    • /
    • 2013
  • In this study, a wire/wireless communication system transmitting the operation data of engine from the ER (Engine Room) to the engine controller of ECR(Engine Control Room) has been developed through the communication of ISM(Industrial Science Medical) Band for the test operation environment improvement of medium speed engine. This wire/wireless communication system is composed of the RTU (Remote Terminal Unit) gathering and transmitting engine data as well as the MCU (Master Control Unit) receiving engine status information from the RTU to be sent to the engine controller (PLC). Through this study, a trial product of RTU and MCU has been manufactured. A test bench that has made temperature, pressure and pick-up sensor into a module for the local test of prototype was produced a test bench. In addition, at the same time save the data to a Web server and the smart phone real-time monitoring system has been developed using Wi-Fi communications. The ultimate objective of this study is to develop a wireless smart phone monitoring system of engine for the operator of engine to be able to monitor and control engine status even from the outside of engine room and control room based on this study.

Active Security Management on Active Networks (능동 네트워크 기반의 능동 보안 관리 시스템)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.559-569
    • /
    • 2004
  • It has become more difficult to correspond an cyber attack quickly as a pattern of attack becomes various and complex. And, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture make possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service) using active packet technology including a mobile sensor on active network. Active Security Management System based on proposed security architecture consists of active security node and active security server in a security zone, and is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of Active Security Management System. The experimentation results are analyzed.

Enhanced Mobile Agent Scheme for RFID Privacy Protection (RFID 프라이버시 보호를 위한 향상된 모바일 에이전트 기법)

  • Kim, Soo-Cheol;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2C
    • /
    • pp.208-218
    • /
    • 2008
  • We are sure that RFID system should be a widely used automatic identification system because of its various advantages and applications. However, many people know that invasions of privacy in RFID system is still critical problem that makes it difficult to be used. Many works for solving this problem have focused on light-weight cryptographic functioning in the RFID tag. An agent scheme is another approach that an agent device controls communications between the tag and the reader for protecting privacy. Generally an agent device has strong security modules and enough capability to process high-level cryptographic protocols and can guarantees consumer privacy. In this paper, we present an enhanced mobile agent for RFID privacy protection. In enhanced MARP, we modified some phases of the original MARP to reduce the probability of successful eavesdropping and to reduce the number of tag's protocol participation. And back-end server can authenticate mobile agents more easily using public key cryptography in this scheme. It guarantees not only privacy protection but also preventing forgery.

A Study on the Development of RSS Reader Module Based on Ajax for Web 2.0 (웹 2.0을 위한 Ajax기반 RSS리더 모듈 개발에 관한 연구)

  • Kwon, Young-Jae;Kim, Cha-Jong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.7
    • /
    • pp.1263-1270
    • /
    • 2008
  • Recently, it is increasing the interest in previous web and web 2.0 which mean differentiation. The previous system is typical Static web based on client and server model, while web 2.0 mean next generation web which web change and evolve fundamentally. In this paper, I suggest that the module on RSS reader available under web 2.0 standards. A currently used RSS feed do correct the part distortion which ran be possible resolve the encoding problem of Hanguel and third-world language. The suggested module is implemented using Ajax. I developed the module for the use of effective contents on web 2.0 through the DragBox module based on the programming on mobility of Ajax and the design and implementation of automatic update module of RSS feed.

Cutaneous Patches to Monitor Myoelectric Activity of the Gastrointestinal Tract in Postoperative Pediatric Patients

  • Taylor, Jordan S.;Ruijter, Vivian de;Brewster, Ryan;Navalgund, Anand;Axelrod, Lindsay;Axelrod, Steve;Dunn, James C.Y.;Wall, James K.
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.22 no.6
    • /
    • pp.518-526
    • /
    • 2019
  • Purpose: Limited means exist to assess gastrointestinal activity in pediatric patients postoperatively. Recently, myoelectric gastrointestinal activity recorded by cutaneous patches has been shown in adult patients to be predictive of clinical return of gastrointestinal function postoperatively. The aim of this case series is to demonstrate the feasibility of this system in pediatric patients and to correlate myoelectric signals with return of bowel function clinically. Methods: Pediatric patients undergoing abdominal surgery were recruited to have wireless patches placed on the abdomen within two hours postoperatively. Myoelectric data were transmitted wirelessly to a mobile device with a user-interface and forwarded to a cloud server where processing algorithms identified episodes of motor activity, quantified their parameters and nominally assigned them to specific gastrointestinal organs based on their frequencies. Results: Three patients (ages 5 months, 4 year, 16 year) were recruited for this study. Multiple patches were placed on the older subjects, while the youngest had a single patch due to space limitations. Rhythmic signals of the stomach, small intestine, and colon could be identified in all three subjects. Patients showed gradual increase in myoelectric intestinal and colonic activity leading up to the first recorded bowel movement. Conclusion: Measuring myoelectric intestinal activity continuously using a wireless patch system is feasible in a wide age range of pediatric patients. The increase in activity over time correlated well with the patients' return of bowel function. More studies are planned to determine if this technology can predict return of bowel function or differentiate between physiologic ileus and pathologic conditions.