• Title/Summary/Keyword: Information Network System

Search Result 12,227, Processing Time 0.044 seconds

Improvement of Security Management Model for a High Speed Information Network (초고속 정보망의 보안관리모델 개선방안)

  • Seo Jeong-Eun;Kim Yoon-Ho;Choi Se-Ha
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.4
    • /
    • pp.71-77
    • /
    • 2003
  • Security system in internet as well as the performance in information network became more important as the internet environment is getting popular and complicate. In this study, the security system (Firewall and IDS) was installed in high speed information network and analyzed for a change in the speed of data transfer and the possibility of invasion. The selection of appropriate system, efficient detection and protection and surveillance method were suggested and analyzed In order to do experiments, an experimental model was com prized to analyze the parameters that was affected by the detection and protection system in network. This will give a standard how much we can pull up the security system maintaining the network speed.

  • PDF

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

Design of Hiding Secret Information System on Home Network Devices (홈 디바이스 기밀정보 은폐시스템 설계)

  • Kim, Do-Woo;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.841-844
    • /
    • 2007
  • Security services required by a home network depend on the definition of a home. That depends on which of home network technologies is included. Various devices in home network environments connected with access network. These home devices can be attacked. So essential parts is needed to protect secret information stored in home network devices. In this paper we design the system that protects secret information in home network devices to offer secure home network services.

  • PDF

Preconfigured Multicast Delivery Tree in Mobile IP (Mobile IP에서 기설정된 전달 트리를 이용한 멀티캐스팅 방안)

  • C.B. Chun;C.H. Kang;Lee, J.H.;Kwon, K.H.;Kim, B.S.;Hong, J.P.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.76-78
    • /
    • 2002
  • Multicasting over mobile IP network becomes more important with the increasing needs of supporting multimedia services in mobile network. The IETF has suggested two approaches which are remote subscription and bidirectional tunneling for supporting mobility management in multicasting over mobile IP. But these protocols have problems - the frequent reconstruction of multicast delivery tree, packet less during handoff, convergence problem, and so on. In this paper, we propose to use preconfiguration of multicast delivery tree when mobile host enters the foreign network. It will decrease the frequency of multicast delivery tree reconstruction, and reduce the packet loss during handoff, Also the multicast delivery tree maintained by Keep Alive messages makes the signaling overload of networks diminished.

  • PDF

Object Recognition Using Neuro-Fuzzy Inference System (뉴로-퍼지 추론 시스템을 이용한 물체인식)

  • 김형근;최갑석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.5
    • /
    • pp.482-494
    • /
    • 1992
  • In this paper, the neuro-fuzzy inferene system for the effective object recognition is studied. The proposed neuro-fuzzy inference system combines learning capability of neural network with inference process of fuzzy theory, and the system executes the fuzzy inference by neural network automatically. The proposed system consists of the antecedence neural network, the consequent neural network, and the fuzzy operational part, For dissolving the ambiguity of recognition due to input variance in the neuro-fuzzy inference system, the antecedence’s fuzzy proposition of the inference rules are automatically produced by error back propagation learining rule. Therefore, when the fuzzy inference is made, the shape of membership functions os adaptively modified according to the variation. The antecedence neural netwerk constructs a separated MNN(Model Classification Neural Network)and LNN(Line segment Classification Neural Networks)for dissolving the degradation of recognition rate. The antecedence neural network can overcome the limitation of boundary decisoion characteristics of nrural network due to the similarity of extracted features. The increased recognition rate is gained by the consequent neural network which is designed to learn inference rules for the effective system output.

  • PDF

A Study on Network detection technique using Human Immune System (인간 면역 체계를 이용한 네트워크 탐지기술 연구)

  • ;Peter Brently
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.307-313
    • /
    • 1999
  • This paper reviews and assesses the analogy between the human immune system and network intrusion detection systems. The promising results from a growing number of proposed computer immune models for intrusion detection motivate this work. The paper begins by briefly introducing existing intrusion detection systems (IDS's). A set of general requirements for network-based IDS's and the design goals to satisfy these requirements are identified by a careful examination of the literature. An overview of the human immune system is presented and its salient features that can contribute to the design of competent network-based IDS's are analysed. The analysis shows that the coordinated actions of several sophisticated mechanisms of the human immune system satisfy all the identified design goals. Consequently, the paper concludes that the design of a network-based IDS based on the human immune system is promising for future network-based IDS's

  • PDF

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

A Study on Improvement for Local Telecommunication Network -A case of Pusan & Kyungnam Province- (지역정보통신망의 개선방안에 관한 연구 -부산.경남지역을 중심으로-)

  • 박민수;김광현;김기문
    • Journal of the Korean Institute of Navigation
    • /
    • v.20 no.4
    • /
    • pp.111-128
    • /
    • 1996
  • This paper is focused on the desirable improvement schemes of the local network of information and telecommunication network. In this study, we examined whether polices of information and telecommunication of government have been carried out a desirable programme to meet the public interest, found out several problems in the these policies. Such problems as follows : (1) a system of local information & telecommunication is developing by a Model of Top-Down. In the present management system, an interest of the public of local society about the local telecommunication network is a much lower level, (2) there is no general controlling roll of the local information & telecommunication, (3) there is no service controlling system of local telecommuni-cation, and (4) there is no organic coordinating system of inter-departments in the central government level. In order to resolve these problems, this study suggests a few desirable sxhemes for the local telecommunication : (1) an establishment of middle-long range planning for the integrated future network of info-telecommunication, (2) an organizing of telecommunication network being suitable for the local characteristics toward B-ISDN.

  • PDF

A Design and Implementation of Web-based Traffic Monitoring System for Management of Small-scale PC-room (소규모 실습실 관리를 위한 웹기반 트래픽 모니터링 시스템의 설계 및 구현)

  • Lee Kang-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.127-131
    • /
    • 2004
  • In this paper, I propose the web-based network traffic monitoring system to monitor computers running MS Windows in the small-scale PC-room. The system can support network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The whole system consists of two parts: analysis server for collection and analysis of the network information. and supports real-time monitoring of network traffic, and the web-based interface system. a client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using java and contributes to enhance the effectiveness of network administrator's management activities in PC-room by controlling and monitoring.

  • PDF

Network topology automatic configuration and remote fault diagnosis system (네트워크 토폴로지 자동 구성 및 원격 장애진단 시스템)

  • Shim, Kyou-Chul;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.548-556
    • /
    • 2018
  • NMS (Network Management System) is a system that is used for a small or large networks management. As the size of network becomes larger and the configuration information become complicated, it becomes more difficult to grasp the network status and it takes much time to diagnose the failure of the network equipment. In this paper, to alleviate the problems of NMS we implement web-based network topology automatically using JavaScript, Python, HTML5 based TWaver. The detailed implementation of the system include the automatic collection of the connection information based on the equipment information registered in the NMS system, the implementation of the web-based network topology and the remote fault diagnosis. In the network topology, we can expect to improve the quality of the NMS system through structured data management by adding the configuration management, fault management and performance management functions in a comprehensive manner.