• Title/Summary/Keyword: Client-side

Search Result 232, Processing Time 0.022 seconds

Development of RAD Tool for JDBC Application Development (JDBC 응용 개발을 위한 RAD TOOL 개발)

  • Son, Seung-Woo;Kim, Soon-Yong;Kim, Chang-Kap;Lee, Sang-Duck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.150-160
    • /
    • 2000
  • The currently and most widely used client/server architecture is composed of database servers and clients that include both application and presentation logic. To date, due to the rapid growth in WWW, these client/server applications are implemented using Java language, especially in GUI design at client sides and client/server applications development using JDBC. To develop the applications using JDBC, developers should design database schema, code source code for JDBC connection, design report forms to display selected columns from server-side database. In this paper, we propose a development environment based on JavaBeans component for client/server applications development using JDBC. The proposed environment minimizes manual coding and enables developers to develop client/server applications easily with the designed JavaBeans components and their custom property editor.

  • PDF

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF

Implementation of WAP Gateway Agents for Wireless Communication Efficiency Improvement (무선통신 효율 향상을 위한 WAP 게이트웨이 에이전트)

  • Park, Kee-Hyun;Kang, Dong-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.45-54
    • /
    • 2005
  • Recently, researches on various base technologies for wireless Internet services have been conducted. In the WAP (Wireless Application Protocol) Forum, a WAP gateway which does mutual conversion between existent wired Internet protocols and WAP protocols was proposed. In this paper, CSA(Client Side Agent) and SSA(Server Side Agent) for WAP gateway environments are designed and implemented, as a way of improving communication efficiency in such restrictive environments as wireless communications. Located on mobile WAP devices(CSA) and a WAP Gateway(SSA), the agents perform communication efficiency improvement activities such as a packet header reduction mechanism and a data reduction mechanism using data differencing analysis in order to reduce the size of data transmission in wireless communication environments. The Internet phone emulator of Phone.com is used in order to make sure that the implemented agents work correctly, Experimental results show that the implemented agents reduce the size of data transmission significantly.

  • PDF

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

A Study on DRM System using Puzzle Authentication Protocol (퍼즐 인증 프로토콜을 이용한 DRM 시스템에 관한 연구)

  • Jung, Young-Hoon;Lee, Kwang-Hyoung;Yeon, Min-So;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.05a
    • /
    • pp.199-202
    • /
    • 2007
  • In this paper, I suggest that as follow. First, it is the algorithm to transmit the encryption key which use ${\ast}$ N Puzzle method more safe than the existing One-path XOR method. Second, it does provide the high quality of security than the existing system because it does not save the generated puzzle to the setter side. Third, it does support the client decryption system which can decrypt the puzzle with OPT in decryption with client side. Fourth, it does adopt more of the safe tansmission method with the compound of ${\ast}$ N Puzzle method and OPT.

  • PDF

A Study on Encrypted Matrix Puzzle for Digital Contents Protection (디지털 컨텐츠 보호를 위한 메트릭스 퍼즐 암호화방법에 대한 연구)

  • Min, So-Yeon;Kim, Jung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.936-944
    • /
    • 2008
  • DRM system is a technology that protects and manages copyright holder's privilege by using a copyright protection technology. This paper contributes to improvement of the secret key transmission and encryption/decryption processing time base on DRM system. In this paper, we will suggest that as follow: First, we will propose the algorithm to transmit the encryption key which use Multidimensional Method more safe than the existing One-path XOR method. Second, we will provide the high quality algorithm of security than the existing system because the Multidimensional which generated from the algorithm does not saved to the server side. Third, we will support the client decryption system which can decrypt the Multidimensional with OPT in decryption with client side. Fourth, we will adopt the more safr method of transmission with the compound of Multidimensional Method and OPT.

Design and Implementation of Web-based Virtual Makeup Simulation System (웹 상에서의 가상 메이크업 시뮬레이션 시스템 설계 및 구현)

  • Shon, Hyung-Do;Lee, Jae-Hyub
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.167-173
    • /
    • 2002
  • The VMSS(Virtual Makeup Simulation System) is a virtual simulation system which can apply makeup, hair style, accessory to user's own face image through internee connection. The simulation result can be stored to server side DB and also can be printed out on client side printer. It is implemented using Java so, clients don't need any other client program to run the VMSS except Web browser and Java Plug-in installed on browser. IIS (Internet Information Server) Web server of Window 2000 and MS-SQL 7 are used to develop the overall system. Commercial JDBC Driver Type 4 is used to connect the applet and DB. It suggests a new direction of Web-based contents service development and can be applied to many other areas.

A Design and Implementation of Web Based Remote Control System for Three-Dimensional Stereo Camera (웹 기반의 삼차원 스테레오 카메라 원격제어 시스템의 설계 및 구현)

  • Kim, Sam-Ryong;Lim, In-Taek;Lee, Young-Ran;Lee, Jeong-Bae
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.337-342
    • /
    • 2003
  • In this paper, a web based remote control system located at too dangerous field to access for the worker. The system was designed and implemented for three-dimensional stereo camera connected to web server which can be controlled easily by client side person working in the safe monitoring room. The user in the client side can control the vergence/focus control and zoom-in/out and pan/tilt functions through an user interface. The user interface for remote control environment was designed and implemented with Java applet mechanism, and was tested the operation result of the system.

An Efficient Log Data Processing Architecture for Internet Cloud Environments

  • Kim, Julie;Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.33-41
    • /
    • 2016
  • Big data management is becoming an increasingly important issue in both industry and academia of information science community today. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used to improve system reliability. In this paper, we propose a novel big data management architecture specialized for log data. The proposed architecture provides a scalable log management system that consists of client and server side modules for efficient handling of log data. To support large and simultaneous log data from multiple clients, we adopt the Hadoop infrastructure in the server-side file system for storing and managing log data efficiently. We implement the proposed architecture to support various client environments and validate the efficiency through measurement studies. The results show that the proposed architecture performs better than the existing logging architecture by 42.8% on average. All components of the proposed architecture are implemented based on open source software and the developed prototypes are now publicly available.

Efficient Data Transmission Using Map Generalization On Cilent-side Web GIS

  • Liang, Chen;Lee, Chung-Ho;Wei, Zu-Kuan;Bae, Hae-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.71-73
    • /
    • 2000
  • Recently researches have been made on the client-side Web GIS, which can lessen the load of a server and provide users with intheractive geographic information. Howwever, the initial delay is the main drawback because of a high volume of geographic data and becausr the server does not associate spatial features with the map scale. Even when a complex spatial object is too small to be distinguished from a point by the naked eyes, it's complete data will be transmitted. This paper proposes a new effcient schema to reduce the response time and increase transmission effciency. Briefly speaking, "Transmit what can be seen" is the main idea. By exploiting the generalization algorithm, the proposed method allows the server to extract readable features from objects according to the display scale. Meanwhile, increasingly detailed map will be cached on the client. Therefore this method will contribute to the transmission efficiency of Web GISs.

  • PDF