• Title/Summary/Keyword: Customer Network

Search Result 741, Processing Time 0.027 seconds

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Consumer use of social media for food risk information: Survey findings in the United States and implications for the Korean context

  • Shim, Min Sun
    • Korean Journal of Health Education and Promotion
    • /
    • v.33 no.3
    • /
    • pp.83-93
    • /
    • 2016
  • Objectives: This study aimed (1) to share findings from the U.S. on customer use of social media for information seeking and sharing about food recall risks, and (2) to discuss the implications of the findings for the context of food safety and risk communication in Korea. Methods: A cross-sectional survey was conducted with 1,026 social media users aged 18 years or older in the U.S., recruited from the Knowledge Network's nationally representative panel. Results: About 26 percent of respondents used social media either to seek or share food recall information in the past year, with social networking sites being the most popular tool. With respect to social media use for information seeking, being married, perceived risk of getting foodborne diseases, and trust in Internet were significant, positive predictors; being Whites and trust in health professionals were negative predictors. Social media use for information sharing was positively associated with education, being married, foodborne disease history, and perceived risk of foodborne diseases; Whites, income, and trust in health professionals were negative predictors. Conclusions: The study gives theoretical, methodological, and practical implications for the context of food safety and risks in Korea.

A User Authentication Technique for the E-commerce (전자상거래를 위한 사용자 인증 기술)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.29-36
    • /
    • 2005
  • The industrial structure of the Internet is changing from off-line to on-line. E-commerce on the Internet will be formed a big market by developing of network. E-commerce on the Internet is natural. And it will be increase in interest of many people. By the way, it must support to institutional and technical problem. First of all, we need user authentication technique. In this paper, we described about safe Electronic shopping mall construction and operation by three main categories. First is security solution method of E-commerce, Second is analyzing about various threats and vulnerability when is user authentication in Electronic shopping mall. Third is to propose countermeasures of that.

  • PDF

A Study on RFID Application Method in Franchise Business (프랜차이즈산업에서의 RFID 적용 방법에 대한 연구)

  • Rim, Jae-Suk;Choi, Wean-Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2008
  • At present, companies write daily work record or use bar-code in order to collect distribution flow data in real time. However, it needs additional works to check the record or read the bar-code with a scanner. In this case, human error could decrease accuracy of data and it would cause problems in reliability. To solve this problem, RFID (Radio Frequency Identification) is introduced in many automatic recognition sector recently. RFID is a technology that identification data is inserted into micro-mini IC chip and recognize, trace, and manage object, animal, or person using wireless frequency. This is being emerged as the core technology in future ubiquitous environment. This study is intended to suggest RFID application method in franchise business. Traceability and visibility of individual product are supplied based on EPCglobal network. It includes DW system which supplies various assessment data about product in supply chain, financial transaction system which is based on product transaction and position information, and RFID middleware which refines and divides product data from RFID tag. With the suggested application methods, individual product's profile data are supplied in real time and it would boost reliability to customer and make effective cooperation with existing operation systems (SCM, CRM, and e-Business) possible.

A VoIP Transcript System for Call Recording in IP Contact Center (IP 컨택센터에서 통화 녹음을 위한 VoIP 녹취 시스템)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.7-16
    • /
    • 2012
  • In this paper we describe a VoIP transcript system which is able to record call conversation between counselor and customer in an IP contact center based on IP telephony environment. The transcript system, designed and implemented in this paper, uses packet sniffering to capture packets without imposing network overhead on overall system. It can decode H.323 and SIP which are used to setup call sessions in VoIP environment and captures voice data and record without any loss of contents. Implemented transcript system can be integrated with CTI system in that it can manage and record call more effectively. It is designed generically so that it is implemented both on Windows and Linux environment.

A Study on Integrated Quality Evaluation Model of Information System (정보시스템 종합품질평가 모형 연구)

  • Seo, Jang-Hoon;Lee, Gi-Jun;Park, Myeong-Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.4
    • /
    • pp.151-166
    • /
    • 2006
  • One of The standard issue in riding on the wave of the information system(IS) is records of performance, grow unprecedently fast, and has highly uncertain future. Within the framework of IS Evaluation, The main purpose of this study is to suggest performance quality evaluation system as follows, The Integrated Quality Evaluation Model Design(IQEMD) of Information System helps corporations to improve productivity, customer service and corporate competitive power. To respond flexibly this trend, we have to realize that the information system has to keep the most effective optimal information network at the proper time. The existing evaluation method has been concentrated on the evaluation of a degree of the information system maturity focused on static viewpoints. The evaluation of potential factors to affect the future-oriented performance, that can analyze both unit business being able to apply an information system base was used efficiently well and what performance evaluation item was obtained actually, was insufficient relatively. In this paper, An integrated quality evaluation method will analyze a degree of information system maturity in dynamic evaluation viewpoints rather than in static evaluation viewpoints. finally we estimated the relative degree of importance of each determinant using the AHP methodology The validity of the proposed model was also partially proved using two different methods, holistic and historical approach.

Multi-agent based value net design (멀티에이전트 기반 가치넷 설계)

  • Kim, Taewoon
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.222-229
    • /
    • 2002
  • A value net is a business design that uses digital supply chain concepts to achieve both superior customer satisfaction and company profitability. In order to implement the value net model, information processing and distribution needs to occur in real time. Software agent technology is becoming popular due to the inherent characteristics of autonomy, distributedness and modularity. In this paper, we adopt agent technology to handle all real time decision process, making the value net model a complex multi-agent network of decision makers. For the agents to properly coordinate their respective activities we develop MAVN model, a Web-based multi-agent language grounded in the XML and Java.

  • PDF

The Study on Number Portability for Activating the Competition in Telecommunications (번호이동성과 통신시장의 경쟁활성화에 관한 연구)

  • Park, Wung;Jung, Young-Sic;Min, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.391-394
    • /
    • 2002
  • Number portability facilitates that a customer can keep their phone number when changing from one network operator to another. There are three types of NP, that is the operator portability, the service portability and the location portability. Political regulation is required, because number portability induces the transfer of benefits from suppliers to customers and activate the competition among firms. In this paper, we will examin the domestic trends of number portability and analysis the effort of number portability on the competition among firms.

  • PDF

Development of optical transmission module for VCSEL (수직 공진형 표면 발광 레이저용 광전송 모듈 개발)

  • Cho Kyeng-Jai;Jeong Jun-Ho;Lee Jae-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1576-1580
    • /
    • 2004
  • The recent trend of information communication is to focus on improving communication services in order to satisfy the customer's desire for various information. Optical transducers of Local Area Network use 850nm or 1310nm among wavelength ranges and LD as a light source. However, Vertical Cavity Surface Emitting Laser(VCSEL) which is very excellent to deal with data processing is used at long wavelength or Gbps. In this paper, after basic optical characteristics were introduced a optical transmission module was developed to be operated over GHz and its transmission characteristics were analyzed at 2.5GHz and 3GHz with pulse pattern generator.

Resource Allocation Method for Improving Energy Efficiency and Receiver Fairness in Wireless Networks (무선 네트워크의 전력 효율성과 수신기 공평성 향상을 위한 자원 할당 방안)

  • Lee, Kisong;Cho, Dong-Ho;Chung, Byung Chang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.826-832
    • /
    • 2015
  • In wireless networks, it is important to guarantee the energy efficiency and receiver fairness for satisfying service provider and customer at the same time. In this paper, we propose a resource allocation algorithm which improves energy efficiency as well as receiver fairness based on optimization techniques. In the proposed algorithm, subchannel and power are allocated to receivers iteratively in the consideration of channel state information, amount of dissipated power, and receiver rate, in order to improve energy efficiency and receiver fairness. Through simulation, we show the effectiveness and superiority of the proposed algorithm in terms of energy efficiency and receiver fairness.