• Title/Summary/Keyword: Internal Network Information

Search Result 504, Processing Time 0.028 seconds

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.

Integrated Stochastic Admission Control Policy in Clustered Continuous Media Storage Server (클리스터 기반 연속 미디어 저장 서버에서의 통합형 통계적 승인 제어 기법)

  • Kim, Yeong-Ju;No, Yeong-Uk
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.217-226
    • /
    • 2001
  • In this paper, for continuous media access operations performed by Clustered Continuous Media Storage Server (CCMSS) system, we present the analytical model based on the open queueing network, which considers simultaneously two critical delay factors, the disk I/O and the internal network, in the CCMSS system. And we derive by using the analytical model the stochastic model for the total service delay time in the system. Next, we propose the integrated stochastic admission control model for the CCMSS system, which estimate the maximum number of admittable service requests at the allowable service failure rate by using the derived stochastic model and apply the derived number of requests in the admission control operation. For the performance evaluation of the proposed model, we evaluated the deadline miss rates by means of the previous stochastic model considering only the disk I/O and the propose stochastic model considering the disk I/O and the internal network, and compared the values with the results obtained from the simulation under the real cluster-based distributed media server environment. The evaluation showed that the proposed admission control policy reflects more precisely the delay factors in the CCMSS system.

  • PDF

Input Port re-allocation technique for the elimination of the internal blocking in banyan ATM switches (반얀망 ATM 스위치에서의 내부충돌 제거를 위한 입력 포트 재할당 기법)

  • 이주영;정준모;고광철;정재일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1124-1131
    • /
    • 2002
  • The banyan network is a popular and basic structure of the multi-stage ATM switches. This paper presents a novel approach to resolve the internal blocking of the banyan network by using a Non-Blocking Permutation Generator (NBPG). The NBPG performs two functions, i.e., the first is to extract the conflict cells from the incoming cells and Ole second is to re-assign new input port addresses to the conflict cells. As a result, NBPG generates non-blocking I/O permutations. To estimate the performance of the NBPG, we provide the results of several simulations.

A Study on Building an Integration Security System Applying Virtual Clustering (Virtual Clustering 기법을 적용한 Integration Security System 구축에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.101-110
    • /
    • 2011
  • Recently, an attack to an application incapacitates the intrusion detection rule, the defense policy for a network and database and induces intrusion incidents. Thus, it is necessary to study integration security to ensure the security of an internal network and database from that attack. This article is about building an integration security system to prevent an attack to an application set with intrusion detection rules. It responds to network-based attack through detection, disperses attack with the internal integration security system through virtual clustering and load balancing, and sets up defense policy for attacking destination packets, analyzes and records attack packets, and updates rules through monitoring and analysis. Moreover, this study establishes defense policy according to attacking types to settle access traffic through virtual machine partition policy and suggests an integration security system applied to prevent attack and tests its defense. The result of this study is expected to provide practical data for integration security defense for hacking attack from outside.

Zero Trust-Based Security System Building Process (제로 트러스트 기반 보안체계 구축 프로세스)

  • Ko, Min-Hyuck;Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1898-1903
    • /
    • 2021
  • Recently, the need to be wary of internal access such as internal access as well as external attackers' access to work has increased due to network expansion, cloud infrastructure expansion, and changes in working patterns due to COVID-19 situations. For this reason, a new network security model called Zero Trust is drawing attention. Zero Trust has a key principle that a trusted network does not exist, and in order to be allowed access, it must be authenticated first, and data resources can only be accessed by authenticated users and authenticated devices. In this paper, we will explain these zero trust and zero trust architectures and examine new security application strategies applicable to various companies using zero trust and the process of building a new security system based on the zero trust architecture model.

전자산업의 서비스부품에 대한 국제로지스틱스 연구

  • 김태현
    • Journal of Distribution Research
    • /
    • v.1 no.2
    • /
    • pp.141-172
    • /
    • 1996
  • This study is to investigate global logistics strategies of Korean electronics companies. in terms of service parts. According to the survey, Korean electronics companies were pursuing multi-level global logistics network such as global, continental, national, regional and service center echelon for improving the efficiency of service parts global logistics. Especially there was a tendency of developing new continental distribution centers. And the companies were exploiting efficiency through inventory control by multi-level echelon, demand forecasting by the product life cycle and supply and service lead time management. But there were some insufficient factors for the efficiency of global logistics operation at the construction of worldwide real time logistics information system and pursuit of the efficiency on the whole network including subcontractors. For the future competitive advantage of the Korean electronics companies, the following are suggested: 1) the establishment of arranged logistics channel adjusting each company's global strategy, 2) the construction of worldwide real time logistics information system, 3) the reengineering of all logistics procedures such as order processing, shipping, inventory control, etc., 4) the enhancement of the ratio of the supply from the external companies and the internal manufacturing subsidiaries at each continent, 5) and the pursuit of operational internalization of external subcontractors.

  • PDF

Development of the High-Reliability PLC-CAN Communication Module for Construction Equipment (건설 중장비용 고신뢰성 PLC-CAN 통신 모듈 개발)

  • Ku, Ja-Yl;Jang, Se-Bong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.228-234
    • /
    • 2014
  • In the case of construction equipment, internal wiring has a very complicated structure such as an electrical wiring and hydraulic equipments. Because of these complex wiring, a lot of time is spent on maintenance and equipment manufacturing. In this paper, we design and implementation of the high-reliability PLC(Power Line Communication) -CAN(Controller Area Network) communication module to reduce electrical wiring of the construction equipment.

Multi-Inernal Division Localization Algorithm by Edge Information for Indoor Wireless Sensor Network (실내 무선 센서 네트워크에서 모서리 정보를 고려한 다중 내분 위치인식 기법)

  • Lee, Ho-Jae;Lee, Sung-Jin;Lee, Sang-Hoon;Kim, Yeon-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.363-364
    • /
    • 2008
  • Localization algorithms are required for indoor sensor network applications. In this paper, we introduce an efficient algorithm for low complexity and high accuracy, termed multi-internal division localization(MID), which emphasizes simple refinement and low system-load for low-cost and low-rate wireless sensors. We inspect MID algorithm through MATLAB simulation.

  • PDF

Investigating Antecedents and Consequences of Enterprise SNS (기업SNS사용의 선행요인 및 결과요인에 관한 연구)

  • Yoon, Jihyun;Kwahk, Kee-Young
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.143-170
    • /
    • 2015
  • In the rapidly changing business environment, companies are introducing information technology to effectively manage internal resources in order to achieve a sustainable competitive advantage. We presented the Enterprise Social Network Service(SNS) as new information technology. Enterprise SNS provided employers with sociable functions like Facebook while supporting general task such as mail, authorization and notice. In this research, we focused on Enterprise SNS and suggested self-disclosure, enjoyment in helping others, perceived organizational support, generativity capacity as antecedent variables of Enterprise SNS usage. In addition, we verified the effect of the mediating role of generativity capacity between Enterprise SNS usage and job performance. For empirically verifying the proposed model, we collected sample data from 225 workers using Enterprise SNS and conducted analysis using a structural equation modeling. We expect that this study provides managers who are interested in introducing enterprise SNS with insights on how to facilitate enterprise SNS usage. Also, this study suggests useful theoretical implications to researchers who are interested in the use of enterprise SNS from the context of knowledge management.

EFFICIENT OPEN SOURCE DISTRIBUTED ERP SYSTEM FOR LARGE SCALE ENTERPRISE

  • ELMASSRY, MOHAMED;AL-AHAMADI, SAAD
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.280-292
    • /
    • 2021
  • Enterprise Resource Planning (ERP) is a software that manages and automate the internal processes of an organization. Process speed and quality can be increased, and cost reduced by process automation. Odoo is an open source ERP platform including more than 15000 apps. ERP systems such as Odoo are all-in-one management systems. Odoo can be suitable for small and medium organizations, but duo to efficiency limitations, Odoo is not suitable for the large ones. Furthermore, Odoo can be implemented on both local or public servers in which each has some advantages and disadvantages such as; the speed of internet, synced data or anywhere access. In many cases, there is a persistent need to have more than one synchronized Odoo instance in several physical places. We modified Odoo to support this kind of requirements and improve its efficiency by replacing its standard database with a distributed one, namely CockroachDB.