• Title/Summary/Keyword: Internal Network Information

Search Result 504, Processing Time 0.025 seconds

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

C-Engineering Based Industry 4.0 Innovation Networks Sustainable Development

  • Omelyanenko, Vitaliy;Braslavska, Oksana;Biloshkurska, Nataliia;Biloshkurskyi, Mykola;Kliasen, Natalia;Omelyanenko, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.267-274
    • /
    • 2021
  • The article deals with problems of innovation development on a network basis, which require effective mechanisms of innovation communications. In research the organizational aspects of ICT infrastructure development for innovation networks sustainable development based on cooperative marketing principles is considered. The proposed research idea is based on the idea that ICT implementation is based not only on the operational approach for innovation management as a factor of efficiency of internal communications, but also on knowledge economy and post-industrial economy trends. Therefore, the purpose of study is to develop an ICT model of innovation infrastructure to improve its effectiveness (strategic character) and efficiency (operative character) through increasing the efficiency of network communication interactions. Creation of information space and communication tools to support innovation network sustainable development and cooperation activities in research is proposed to be solved with the help of specialized ICT platform. It is shown, that ICT platform of innovation cooperation innovation network is important tool for common work of participants. ICT platform is considered as an integrated information system designed to automate business processes related to the sustainable development of innovation network, segment management and integration with HEI information systems and industrial cooperation. The main factors that determine the need to use a special ICT platform for innovation network cooperation were considered. The main issues of concurrent engineering (C-technology) application in high-technology industries and innovation cooperation for integrated product development were studied.

Configuration of Mail Delivery System Based on Reinforcement Learning

  • Morishita, Soichiro;Hiraoka, Kazuyuki;Kobayashi, Hidetsune;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.830-833
    • /
    • 2002
  • To solve the internal security problem such as human error and bad faith, the automation of computer system management is significant. For this purpose, we focus attention in the automation of Mail Delivery Service. Today, requirement for reliable mail delivery system becomes larger and larger. However, existing systems are too strict about their configuration. Hence, we propose the method based on Reinforcement Learning (RL) to achieve proper MX record ordering. A measure on validity of the design of system, such as network topology number of servers and so on, is also obtained as side benefit. In order to verify the usability of the presented method, we did on a small model of mail delivery system. As a result, we show that RL is available for determination of the proper MX record ordering. Additionally, we suggest that it is also available for comparing validity of setting of MTA and the network design.

  • PDF

Electronic Proceedings in Modern Legal Conditions

  • Veselovska, Nataliia;Slipeniuk, Vasyl;Yasynok, Dmytro;Zhukevych, Ihor;Gorbenko, Arina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.224-228
    • /
    • 2021
  • The article is devoted to the problems and prospects of integration of informational technologies in the administration of justice as a necessary component of the development of the informational society in Ukraine. In general, informational technologies make it possible to create new forms of organization and interaction of bodies of public authorities with society, to introduce innovative solutions for legal regulation and organization of public relations. More and more services for citizens are moving to electronic format. Judicial reform is aimed at ensuring more comfortable and convenient interaction with the courts. The need for the usage of informational technology in the proceedings is preconditioned by the global informatization of modern society, the development of new forms of interaction in the civil sphere with the usage of electronic means of communication: the global Internet, mobile, and satellite communication systems and more. "Electronic justice" involves the use of information and communication technologies in the implementation of procedural law.

Visualization of Social Networks Service based on Virtualization (가상화 기반의 SNS 시각화)

  • Park, Sun;Kim, Chul Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.637-638
    • /
    • 2014
  • This paper proposes a new visualization method based on Vitualization technique which uses internal relationship of user correlation and external information of social network to visualize user relationship hierarchy. The proposed method use hadoop on virtual machine of OpenStack for distribution and parallel processing which the result of calculation visualizes hierarchy graph to analyze link nodes of Social Network Services for users.

  • PDF

Design of ONU for EPON Based Access Network (EPON 액세스 망 기반의 ONU 설계)

  • 김용태;신동범;이형섭
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.633-636
    • /
    • 2003
  • An Ethernet passive optical network(EPON) is a point-to-multipoint optical network. EPONs leverage the low cost, high performance curve of Ethernet systems to provide reliable data, voice and video to end user at bandwidths far exceeding current access technologies. In this paper, we propose the economical and flexible structure of optical network unit(ONU) converting optical format traffic to the customer's desired format(Ethernet, VDSL, T1, IP multicast, etc.). A unique feature of EPONs is that in addition to terminating and converting the optical signal the ONU provide Layer 2-3 switching functionality, which allows internal routing of enterprise traffic at the ONU.

  • PDF

Applied Research of Active Network to IDS Attack (액티브 네트워크 기반의 분산 서비스 공격 대응 방안)

  • 이성현;이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.291-295
    • /
    • 2004
  • Recently, distributing information on the Internet is common in our daily li(e. Also, data exchange on Internet has rapidly changed the way we connect with other people. But current firewall and IDS(Intrusion Detection System) of the network level suffers from many vulnerabilities in internal computing informations and resources. In this paper, we analyzes Traceback System that based on active network and design of Traceback System that based on active network for efficiently traceback.

  • PDF

The Structural Relationships Among Factors Affecting the Usage of Social Network Service:Focusing on the Technology Acceptance Model(TAM) and the Flow (소셜 네트워크 서비스(SNS) 이용요인간 구조적 관계 : 기술수용모델(TAM)과 플로우(Flow)를 중심으로)

  • Park, Yoon-Seo;Kim, Yong-Sik
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.247-272
    • /
    • 2012
  • Social Network Service(SNS) is a kind of advanced Internet service that acts as personal media. This study was intended to find out the structural relationships among factors affecting the usage of social network services by extending the Technology Acceptance Model(TAM). For this purpose, the variable 'Flow' was first integrated into the TAM in order to understand the internal motivations of users. And then the external factors of SNS usage were derived from the perspective of users, contents, and media side of SNS, and finally the dependent variable was set with the intention of sustainable use. Then these factors were carefully integrated into a structural model. We expect the findings of this study will be very helpful for the internet marketing professionals, SNS developers, and the others.

A P2P Based Tactical Information Sharing System for Mobile Nodes (P2P 기반의 모바일 노드간의 전술 정보 공유 시스템)

  • Lee, Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.501-509
    • /
    • 2014
  • In NCW(Network Centric Warfare) environment, mobile nodes communicate through wireless link. But wireless link provides limited networking performance due to signal interferences or mobility of nodes. So it is quite challenge to acquire enough networking resources and use the resources efficiently. In this paper, we have proposed a P2P based tactical information sharing system which provides satisfactory visual information playout for mobile nodes(i.e., military personnel, vehicle,..) in NCW environment. Our proposed system consists of two components. One is caching-enabled switch which stores tactical information segments at its internal storage and then transports them to mobile nodes when require. Another is centralized scheduling algorithm which exploits networking resources more efficiently. To validate performance of proposed system, we performed series of experiments in wireless network testbed. Results show improved performance in terms of segment-missing ratio, networking resources usage, sharing time, and number of simultaneous playout mobile nodes with acceptable playout continuity(i.e., over 95%).