• Title/Summary/Keyword: HTTP/S

Search Result 361, Processing Time 0.091 seconds

Web-based Research Assistant Tools for Analysis of Microbial Diversity (미생물 다양성 분석을 위한 웹기반의 생물정보도구 개발)

  • Kang, Byeong-Chul;Kim, Hyun-Jin;Park, Jun-Hyung;Park, Hee-Kyung;Kim, Cheol-Min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.5
    • /
    • pp.545-550
    • /
    • 2004
  • The study of available genotypes (biodiversity analysis) in bacterial communities is of growing importance in several fields such as ecology, environmental technology, clinical diagnostics, etc. These culture-independent genotyping techniques, especially amplifying 16S rRNA genes, attempt to overcome some shortcomings of conventional cultivation method. Biodiversity analysis based on molecular technique were laborious for base-calling chromatogram, trimming primer sites, correcting strand directions, electing representative operation taxonomic units (OTU), etc. Also, biologists wanted intuitively to confirm results of the above processes. For making up these demands, we developed the web application based on Folder-Process-Filter (FPF) modeling with correspondence to classical Model-View-Controller model. The model of web application leads to keep virtues of simplicity and directness for development and management of the stepwise web interfaces. The web application was developed in Perl and CGI on Linux workstation. It can be freely accessed from http://home.pusan.ac.kr/~genome/tools/rat.htm.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

In-Memory File System Backed by Cloud Storage Services as Permanent Storages (클라우드 스토리지를 최종 저장 장치로 사용하는 인메모리 파일 시스템)

  • Lee, Kyungjun;Kim, Jiwon;Ryu, Sungtae;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.841-847
    • /
    • 2016
  • As network technology advances, a larger number of devices are connected through the Internet. Recently, cloud storage services are gaining popularity, as they are convenient to access anytime and anywhere. Among cloud storage services, object storage is the representative one due to their characteristics of low cost, high availability, and high durability. One limitation of object storage services is that they can access data on the cloud only through the HTTP-based RESTful APIs. In our work, we resolve this limitation with the in-memory file system which provides a POSIX interface to the file system users and communicates with cloud object storages with RESTful APIs. In particular, our flush mechanism is compatible with existing file systems, as it is based on the swap mechanism of the Linux kernel. Our in-memory file system backed by cloud storage reduces the performance overheads and shows a better performance than S3QL by 57% in write operations. It also shows a comparable performance to tmpfs in read operations.

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.

세계 비다이오드 레이저 시장, 1천만 달러 규모에서 2006년 4% 증가 전망

  • Korea Optical Industry Association
    • The Optical Journal
    • /
    • s.105
    • /
    • pp.21-23
    • /
    • 2006
  • 미국 달러의 강세로 인해 유럽 및 아시아는 다시금 경제적인 안정과 성장을 달성하고 있는 가운데 중국은 저가 마킹 장비의 주도로 두자리수의 성장을 지속하고 일본 또한 2005년에 는 2% 성장을 이루는 등 아시아 시장의 성장이 눈에 띈다. 반면 유럽은 공작기계분야에서 2005년 3% 성장을 기록하는데 그친 것으로 나타났다. 본 고는 세계 레이저 시장중 다이오드 분야를 제외한 시장에 대해 언급하고 있다. <출처:LaserFocusWorld- LASER MARKETPLACE 2006: Market's messagrs are mixed(http://lfw.pennnet.com)>

  • PDF

DDS Binding of oneM2M Messages using OCEAN Platform (OCEAN 플랫폼을 활용한 oneM2M 메시지의 DDS 연동)

  • Jung, Jun-Kwon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.852-854
    • /
    • 2016
  • oneM2M 표준은 다양한 플랫폼을 지원하기 위해 다양한 통신 프로토콜과의 바인딩을 지원한다. 이 통신 프로토콜들은 HTTP, MQTT, COAP, WebSocket 등 경량화 혹은 단일 대상에 적합한 통신 프로토콜이며, 데이터 형식이 고정되어 있다. 본 논문에서는 자유로운 데이터 형식을 지원하며, 대규모/실시간 통신에 적합한 DDS를 oneM2M 표준에 따르는 OCEAN 플랫폼에 적용하는 방법을 제안한다.

Refinement of the Global Ocean Tidal Charts (전구해양 조석도의 개선)

  • Park, Byung-Ho;Kexiu Liu;Ji Wang
    • Proceedings of the Korean Society of Coastal and Ocean Engineers Conference
    • /
    • 2000.09a
    • /
    • pp.176-181
    • /
    • 2000
  • This paper briefly outline the approach we are now setting for improving the existing global ocean tidal charts in next few years. There has been notable progress in predicting global ocean tide in mid 90s to improve correction procedures for tidal signals in altimetry with more accurate tidal models (http://podaac.jpl.nasa.gov/) than existing ones. (omitted)

  • PDF

MCC 연구 개발 추진현황

  • Park, Myeong-Ho;Kim, Seung-Hyeon;Lee, Seung-Hyeon;Gang, Dong-U
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.11a
    • /
    • pp.379-381
    • /
    • 2018
  • MCC(Maritime Cloud Connector)는 한국형 e-Navigation 시스템에서 MCP(Maritime Cloud Platform)와 육상서비스 간 데이터를 전달하고 메시지를 변환하는 중요한 역할을 한다. 이 연구에서는 MCC 연구개발에 있어 메시지처리 고도화 개발 및 IDL Catalogue Converting Rule을 적용한 메시지 변환에 대한 연구를 진행하였다.

  • PDF

The Improvement of RS3 System for Drug Substructure Searching (약물 부분 구조 검색을 위한 RS3 시스템의 개선)

  • 이환구;차재혁
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.751-753
    • /
    • 2003
  • 약물의 화학구조와 약리작용간의 관계는 'Medicinal Chemistry'에서 활발히 연구된다. 이에 도움이 되는 분야로 수많은 약물들에서 사용자가 지정한 구조를 부분구조로 가지는 약물들을 자동으로 빠르게 찾아내는 부분구조검색(Substructure Searching)이 있다. 1950년대부터 연구된 앞의 문제는 NP-Complete이나 미리 인덱스를 두어 성능을 높인 RS3 시스템(http://www.acelrys.com/rs3)이 미국 특허를 받았다. 이 시스템은 화학구조에 대한 설명을 대용량으로 기술하여 이를 RDBMS에 저장하고 검색하는 시스템이다. 하지만 이 시스템은 재현율(Recall)과 정도(Precision)가 매우 낮으므로, 본 논문에서는 새로운 인덱스를 개발하여 재현율과 정도를 향상시킨 기법을 제시한다.

  • PDF

Implementation of End­to­End Secure SIP Signaling using S/MIME (S/MIME을 사용한 양단간 보안기능 제공하는 SIP 시그널링 기법 구현)

  • Hyun, Wook;Park, Sun-Ok;Huh, Mi-Young;Kang, Shin-Gak
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.181-183
    • /
    • 2003
  • RFC3261에 정의된 SIP 프로토콜에는 보안 및 인증과정을 위한 동작 메커니즘을 정의하고 있다. 서비스 제공을 위한 인증이나 권한 점검을 위해서는 HTTP Digest방식이 가장 일반적이고 검증된 방식이긴 하나, 보안의 측면을 보았을 때 안전하지는 않으며, 서버와 단말 또는 단말간의 인증에만 사용되므로 완벽한 형태의 보안을 제공한다고 볼 수 없다. 이러한 보안상의 무결성, 안정성에 있어서의 기능을 충족시키기 위해 RFC3261의 후반부에서는 TLS와 S/MIME의 지원을 권장하고 있으며 현재 IETF에서 진행중인 draft나 각종 RFC에서도 보안 문제를 해결하기 위해 S/MIME과 TLS를 필요한 사항으로 정의하고 있다. 본 고에서는 S/MIME기능을 SIP프로토콜에 적용하기 위해 필요한 사항 등을 구현관점에서 바라볼 것이며, 이를 위해 해당 기능의 구현을 위해 사용된 구현구조 및 관련 API의 설명을 통해 접근하고자 한다.

  • PDF