• Title/Summary/Keyword: File Access

Search Result 406, Processing Time 0.031 seconds

Forgetting based File Cache Management Scheme for Non-Volatile Memory (데이터 망각을 활용한 비휘발성 메모리 기반 파일 캐시 관리 기법)

  • Kang, Dongwoo;Choi, Jongmoo
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.972-978
    • /
    • 2015
  • Non-volatile memory (NVM) supports both byte addressability and non-volatility. These characteristics make it feasible for NVM to be employed at any layer of the memory hierarchy such as cache, memory and disk. An interesting characteristic of NVM is that, even though it supports non-volatility, its retention capability is limited. Furthermore NVM has tradeoff between its retention capability and write latency. In this paper, we propose a novel NVM-based file cache management scheme that makes use of the limited retention capability to improve the cache performance. Experimental results with real-workloads show that our scheme can reduce access latency by up to 31% (24.4% average) compared with the conventional LRU based cache management scheme.

Study on defense countermeasures against Webshell attacks of the Industrial Information System (산업정보시스템의 웹쉘공격에 대한 방어 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.4
    • /
    • pp.47-52
    • /
    • 2018
  • WebShell is a web script file created by a hacker to remotely commands to a web server. The hacker can bypass the security system using the web shell, access the system, control the system such as file modification, copying and deletion, install malicious code in the web source code, attack the user's PC, And so on. There are many types of WebShell attack, but we study about attacks on PHP and JSP based web server which are used as representative ones. And we propose the method of web page management, method of development, and several other methods. By using these countermeasures, it is possible to effectively prevent damage caused by WebShell attacks.

Gen-Z memory pool system implementation and performance measurement

  • Kwon, Won-ok;Sok, Song-Woo;Park, Chan-ho;Oh, Myeong-Hoon;Hong, Seokbin
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.450-461
    • /
    • 2022
  • The Gen-Z protocol is a memory semantic protocol between the memory and CPU used in computer architectures with large memory pools. This study presents the implementation of the Gen-Z hardware system configured using Gen-Z specification 1.0 and reports its performance. A hardware prototype of a DDR4 Gen-Z memory pool with an optimized character, a block device driver, and a file system for the Gen-Z hardware was designed. The Gen-Z IP was targeted to the FPGA, and a 512 GB Gen-Z memory pool was configured on an ×86 server. In the experiments, the latency and throughput of the Gen-Z memory were measured and compared with those of the local memory, SATA SSD, and NVMe using character or block device interfaces. The Gen-Z hardware exhibited superior throughput and latency performance compared with SATA SSD and NVMe at block sizes under 4 kB. The MySQL and File IO benchmark of Gen-Z showed good write performance in all block sizes and threads. Besides, it showed low latency in RocksDB's fillseq dbbench using the ext4 direct access filesystem.

Hardware Crypto-Core Based Authentication System (하드웨어 암호코어 기반 인증 시스템)

  • Yoo, Sang-Guun;Park, Keun-Young;Kim, Tae-Jun;Kim, Ju-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.121-132
    • /
    • 2009
  • Default password protection used in operating systems have had many advances, but when the attacker has physical access to the server or gets root(administrator) privileges, the attacker can steal the password information(e.g. shadow file in Unix-like systems or SAM file in Windows), and using brute force and dictionary attacks can manage to obtain users' passwords. It is really difficult to obligate users to use complex passwords, so it is really common to find weak accounts to exploit. In this paper, we present a secure authentication scheme based on digital signatures and secure key storage that solves this problem, and explain the possible implementations using Trusted Platform Module(TPM). We also make a performance analysis of hardware and software TPMs inside implementations.

EAST: An Efficient and Advanced Space-management Technique for Flash Memory using Reallocation Blocks (재할당 블록을 이용한 플래시 메모리를 위한 효율적인 공간 관리 기법)

  • Kwon, Se-Jin;Chung, Tae-Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.476-487
    • /
    • 2007
  • Flash memory offers attractive features, such as non-volatile, shock resistance, fast access, and low power consumption for data storage. However, it has one main drawback of requiring an erase before updating the contents. Furthermore, flash memory can only be erased limited number of times. To overcome limitations, flash memory needs a software layer called flash translation layer (FTL). The basic function of FTL is to translate the logical address from the file system like file allocation table (FAT) to the physical address in flash memory. In this paper, a new FTL algorithm called an efficient and advanced space-management technique (EAST) is proposed. EAST improves the performance by optimizing the number of log blocks, by applying the state transition, and by using reallocation blocks. The results of experiments show that EAST outperforms FAST, which is an enhanced log block scheme, particularly when the usage of flash memory is not full.

Research on establishment of the network system of teaching and learning material for the organizations linking to vocational education (직업교육 유관 기관간 교수·학습자료 공유 시스템 구축에 관한 연구)

  • Kim, Sun-Tae
    • 대한공업교육학회지
    • /
    • v.30 no.1
    • /
    • pp.133-148
    • /
    • 2005
  • This research attempts to establish a strategy through which to secure the introduction of the KEM 2.0 system. Another aim of this research is to eventually establish a service system which can be used to automatically generate and provide the metadata information contained in the Cylearn system. in order to facilitate Korean vocational high school students access to teaching-learning materials. The main research tasks associated with this research were: 1) To establish the components of the file server system while taking into consideration the environment in which each educational organization operates; 2) To utilize the KEM 2.0 in order to optimize the configuration of the Cylearn system and the related software. To do so, the KEM 2.0. should be applied in close coordination with Edunet: The results of this research can be summarized as follows: First, a strategy to introduce the KEM 2.0 was established. To achieve this, the researcher analyzed the characteristics of the sequencing and presentation methods and suggested teaching-learning materials based on the KEM 2.0.s sequencing system. Second, the file server was constructed using the KEM 2.0. The established file server took into account the environmental conditions in which the Edunet system operates so as to facilitate the creation of a network system with Edunet. Third, the Cylearn service system was linked to Edunet. The researcher developed a module using the KEM 2.0. that could be used to transmit the metadata related to teaching-learning materials to Edunet. To achieve this, an input device and a databank which could be used to transfer the generated metadata to Edunet were developed. The input device and databank developed using the KEM 2.0. were used to transfer the metadata to Edunet by linking the Cylearn system to the Edunet system.

Design and Implementation of Sensor based Intrusion Detection System (센서 기반 침입 탐지 시스템의 설계와 구현)

  • Choi, Jong-Moo;Cho, Seong-Je
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.865-874
    • /
    • 2005
  • The information stored in the computer system needs to be protected from unauthorized access, malicious destruction or alteration and accidental inconsistency. In this paper, we propose an intrusion detection system based on sensor concept for defecting and preventing malicious attacks We use software sensor objects which consist of sensor file for each important directory and sensor data for each secret file. Every sensor object is a sort of trap against the attack and it's touch tan be considered as an intrusion. The proposed system is a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. We have implemented the proposed system on the Linux operating system using loadable kernel module technique. The proposed system combines host~based detection approach and network-based one to achieve reasonably complete coverage, which makes it possible to detect unknown interception threats.

Study on Improvement of Student Archivement in Hands-on Computer Education (컴퓨터 실습수업의 학업성취도 향상방안 연구)

  • Yu, Young-Je;Kim, Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.426-430
    • /
    • 2005
  • The computer practicing class advances to reach the ultimate goal of learning through the comprehensive learning of theory. Moreover, the improved function and environment of computer makes it easy for students to access a variety of information. However, students are likely to get into the internet and other things mainly for fun during the computer practicing class, and the multi-tasking may distract the concentration of students and degrade their performance. Computers for practice purpose need to be controlled to minimize such distraction. In this dissertation, we monitor and control computers which are used by students for the purpose of practicing, realize the function of transfer and deletion of file, whole shutdown of computer and screen capture. We also applied the class based on current way and realized program, and assigned the practice work on the basis of what was learned during the class. We intend to understand the relation between the concentration of students and their performance by assigning practice work related to survey after the class, capture file and log file

  • PDF

Comparative evaluation of the effectiveness of ultrasonic tips versus the Terauchi file retrieval kit for the removal of separated endodontic instruments

  • Pruthi, Preeti Jain;Nawal, Ruchika Roongta;Talwar, Sangeeta;Verma, Mahesh
    • Restorative Dentistry and Endodontics
    • /
    • v.45 no.2
    • /
    • pp.14.1-14.7
    • /
    • 2020
  • Objective: The aim of this study was to perform a comparative evaluation of the effectiveness of ultrasonic tips versus the Terauchi file retrieval kit (TFRK) for the removal of broken endodontic instruments. Materials and Methods: A total of 80 extracted human first mandibular molars with moderate root canal curvature were selected. Following access cavity preparation canal patency was established with a size 10/15 K-file in the mesiobuccal canals of all teeth. The teeth were divided into 2 groups of 40 teeth each: the P group (ProUltra tips) and the T group (TFRK). Each group was further subdivided into 2 smaller groups of 20 teeth each according to whether ProTaper F1 rotary instruments were fractured in either the coronal third (C constituting the PC and TC groups) or the middle third (M constituting the PM and TM groups). Instrument retrieval was performed using either ProUltra tips or the TFRK. Results: The overall success rate at removing the separated instrument was 90% in group P and 95% in group T (p > 0.05) The mean time for instrument removal was higher with the ultrasonic tips than with the TFRK (p > 0.05). Conclusion: Both systems are acceptable clinical tools for instrument retrieval but the loop device in the TFRK requires slightly more dexterity than is needed for the ProUltra tips.

Design and Implementation of An MP4 File Streaming System over IP Networks (IP망을 통한 MP4 파일 스트리밍 시스템의 설계 및 구현)

  • 김현철;민승홍;서덕영;김규헌;김진웅
    • Journal of Broadcast Engineering
    • /
    • v.6 no.3
    • /
    • pp.205-214
    • /
    • 2001
  • In this Paper, we present an MP4 file streaming system over IP networks. Using the proposed system a user can access MP4 contents in the servers via H) networks and interact with the contents. The MP4 file format is designed to contain the media information of MPEG-4 and is object-oriented. The presented streaming server system contains GUI, session manager, splitter, SL- packetizer and transmitter. In addition, we knave implemented the client system based on the GUI -2D player, the MPEG-4 reference software. The Presented streaming system is designed use RTF for the media data requiring real-time streaming RTCP for QoS management and TCP for the data such as IOD(Initial Object Descriptor), OD(Object Descriptor) BIFS(Binary Format for Scene), which should be transmitted for the streaming and the data, such as still image and text, which can be entirely transmitted in a packet.

  • PDF