• Title/Summary/Keyword: Intelligent DNS

Search Result 5, Processing Time 0.018 seconds

A Real-time Multibody Vehicle Dynamics and Control Model for a Virtual Reality Intelligent Vehicle Simulator (가상현실 지능형 차량 시뮬레이터를 위한 실시간 다물체 차량 동역학 및 제어모델)

  • 김성수;손병석;송금정;정상윤
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.11 no.4
    • /
    • pp.173-179
    • /
    • 2003
  • In this paper, a real-time multibody vehicle dynamics and control model has been developed for a virtual reality intelligent vehicle simulator. The simulator consists of low PCs for a virtual reality visualization system, vehicle dynamics and control analysis system a control loading system, and a network monitoring system. Virtual environment is created by 3D Studio Max graphic tool and OpenGVS real-time rendering library. A real-time vehicle dynamics and control model consists of a control module based on the sliding mode control for adaptive cruise control and a real-time multibody vehicle dynamics module based on the subsystem synthesis method. To verify the real-time capability of the model, cut-in, cut-out simulations have been carried out.

Implementation of Intelligent Web Service Access Management for Supporting High Ava ilability and Business Continuity (고 가용성과 업무의 연속성 보장을 위한 지능적 웹 서비스 접속관리의 구현 방안에 관한 연구)

  • Joong Kang-Itrun;Lee Kwang-Eooung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.151-160
    • /
    • 2005
  • High availability and business continuity in the mission critical enterprise environment have been a matter of primary concern. It is desirable to implement replicated servers, duplicated devices and disaster recovery sites so that these issues are accomplished. When that happens, web browser's users may be accessed web server through a specific Uniform Resource Locator. A critical issue arises if web browser's users recklessly change the URL and access into other site. In this case, data integrity between duplicated sites may not be guaranteed. In this paper, we introduce the method of integrating the technologies of user authentication, certificate authority and business continuity and Propose the design and implementation of intelligent service access management.

  • PDF

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

A Case Study on Effective SCM Establishment of C Corporation under e-Business Environment (e-비즈니스 환경에서의 C기업의 효과적인 SCM 구현에 관한 사례 연구)

  • 이영민;주상호
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.213-221
    • /
    • 2002
  • e-비지니스환경에서의 SCM의 성공적인 추진을 위해서는 우선 e-business 전략과 Supply Chain 관리 전략의 상하 연계, 조직측면에 있어서의 경영자의 변화에 대한 혁신 능력과 리더쉽, 조직 구성원들과의 비전 공유, 저보기술(IT)을 활용한 보다 차별화된 서비스가 제공되어야 한다. 본 연구는 C기업의 사례로 통해, 기존의 SCM 기법에서 정보기술(IT)의 급속한 발달과 인터넷의 급속한 보급, 그리고 e-비지니스의 등장으로 인하여 경영환경의 변화라는 새로운 패러다임 하에서 다수의 경쟁기업, 정보 네트워크시스템 기반에서 보다 효과적으로 기업과 고객에게 대응하기 위한 기업의 구체적이고 실무적인 전략 측면에서 다루어 보았다는 데 그 의의가 있다. 소비재, 생활용품에 있어서 보다 빠른 납기, 보다 전문적이고 다양화되고 있는 고객의 욕구를 충족시키기 위해 제조기업 측면에서 어떻게 기존의 조직구조 및 업무 프로세스를 혁신 할 것인가를 실제 사례를 통하여 연구함으로써 동종 산업체나 또는 기업의 실무자들에게 있어 큰 도움이 될 것이다.

  • PDF

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.