• Title/Summary/Keyword: Mail Server

Search Result 116, Processing Time 0.037 seconds

A Study of Prevention Model the Spread of Phishing Attack for Protection the Medical Information (의료정보 보호를 위한 피싱공격 확산방지모델 연구)

  • Choi, Kyong-Ho;Chung, Kyung-Yong;Shin, Dong-Kun
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.273-277
    • /
    • 2013
  • Phishing attacks have been implemented in smarter, more advanced ways with the passage of time. Hackers use intelligent phishing attacks to take over computers and to penetrate internal networks in major organizations. So, in this paper, a model for a prevention of phishing attack spread is conceptual designed in order to protect internal users and sensitive or important information from sophisticated phishing attacks. Internal users simultaneously utilize both external web and organizational mail services. And hackers can take the both side equally as a vector. Thus, packets in each service must be monitored and stored to recognize threatening elements from both sides. The model designed in this paper extends the mail server based security structure used in conventional studies for the protection of Internet mail services accessed by intranet users. This model can build a list of phishing sites as the system checks e-mails compared to that of the method that directly intercepts accesses to phishing sites using a proxy server, so it represents no standby time for request and response processes.

Public Key Encryption with Keyword Search in Multi-Receiver Setting (다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템)

  • Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.31-38
    • /
    • 2009
  • To provide the privacy of a keyword, a public key encryption with keyword search(PEKS) firstly was propsed by Boneh et al. The PEKS scheme enables that an email sender sends an encrypted email with receiver's public key to an email server and a server can obtain the relation between the given encrypted email and an encrypted query generated by a receiver. In this email system, we easily consider the situation that a user sends the one identical encrypted email to multi-receiver like as group e-mail. Hwang and Lee proposed a searchable public key encryption considering multi-receivers. To reduce the size of transmission data and the server's computation is important issue in multi-receiver setting. In this paper, we propose an efficient searchable public key encryption for multi-receiver (mPEKS) which is more efficient and reduces the server's pairing computation.

Recognition Method of Korean Abnormal Language for Spam Mail Filtering (스팸메일 필터링을 위한 한글 변칙어 인식 방법)

  • Ahn, Hee-Kook;Han, Uk-Pyo;Shin, Seung-Ho;Yang, Dong-Il;Roh, Hee-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.2
    • /
    • pp.287-297
    • /
    • 2011
  • As electronic mails are being widely used for facility and speedness of information communication, as the amount of spam mails which have malice and advertisement increase and cause lots of social and economic problem. A number of approaches have been proposed to alleviate the impact of spam. These approaches can be categorized into pre-acceptance and post-acceptance methods. Post-acceptance methods include bayesian filters, collaborative filtering and e-mail prioritization which are based on words or sentances. But, spammers are changing those characteristics and sending to avoid filtering system. In the case of Korean, the abnormal usages can be much more than other languages because syllable is composed of chosung, jungsung, and jongsung. Existing formal expressions and learning algorithms have the limits to meet with those changes promptly and efficiently. So, we present an methods for recognizing Korean abnormal language(Koral) to improve accuracy and efficiency of filtering system. The method is based on syllabic than word and Smith-waterman algorithm. Through the experiment on filter keyword and e-mail extracted from mail server, we confirmed that Koral is recognized exactly according to similarity level. The required time and space costs are within the permitted limit.

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.

Fuzzy Web Usage Mining for User Modeling

  • Jang, Jae-Sung;Jun, Sung-Hae;Oh, Kyung-Whan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.3
    • /
    • pp.204-209
    • /
    • 2002
  • The interest of data mining in artificial intelligence with fuzzy logic has been increased. Data mining is a process of extracting desirable knowledge and interesting pattern ken large data set. Because of expansion of WWW, web data is more and more huge. Besides mining web contents and web structures, another important task for web mining is web usage mining which mines web log data to discover user access pattern. The goal of web usage mining in this paper is to find interesting user pattern in the web with user feedback. It is very important to find user's characteristic fer e-business environment. In Customer Relationship Management, recommending product and sending e-mail to user by extracted users characteristics are needed. Using our method, we extract user profile from the result of web usage mining. In this research, we concentrate on finding association rules and verify validity of them. The proposed procedure can integrate fuzzy set concept and association rule. Fuzzy association rule uses given server log file and performs several preprocessing tasks. Extracted transaction files are used to find rules by fuzzy web usage mining. To verify the validity of user's feedback, the web log data from our laboratory web server.

An Architecture and Experimentation for Efficient and Reliable Name Service Systems (효율적이고 신뢰성 있는 네임 서비스 시스템의 구조 및 실험)

  • 심영철;박준철;강호석;이준원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.375-390
    • /
    • 2004
  • Domain Name System(DNS), one of the most important Internet services, handles mapping from host names to Internet addresses and vice versa, and precedes many Internet applications such as Web, e-mail, file transfer, etc. In this paper, we propose a structural design of a generic name server system providing name services for a huge domain for the purpose of improving the performance as well as the reliability of the system. We demonstrate the validity of the design by implementing and running a testbed system. Our testbed employs a couple of master name sowers for distributing the service overhead over two, rather than one, servers and for achieving high availability of the system as a whole. We suggest the use of dynamic update to add and delete records from a zone for which the name server has authority. The slave name servers located remotely then get a new, updated copy of the zone via incremental zone transfers(IXFRs). The experiments with the implemented testbed show that the proposed structure would easily manage increasing demands on the server power, and be highly available in the face of transient faults of a module in the system.

A Design and Implementation of VOD Service System with Off-line Search Function (오프라인 검색기능을 가진 주문형 비디오 서비스 시스템 설계 및 구현)

  • 이혜정;박두순
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.3
    • /
    • pp.205-214
    • /
    • 2001
  • As the real time multimedia data service has become available due to the rapid progress of computer and Internet technology, the users can enjoy the newly developed service, which is called Video On-Dem-and(VOD). However, most of service providers have not paid their attention much on the software for various service modes on VOD, but they are only concentrating un the hardware to provide with the high resolution video display. Therefore, the service providers are recently to pay more attention on the software to cope with the various demands of users than hardware. So this paper has designed and implemented the VOD service system for those demands. Since the VOD service system suggested by this paper enable off-line search functions through E-mail, the users can possibly get the necessary information from off-line Search without connecting to the server while the current VOD service can prominently help users to save the time and effort to sea고 and select the Video contents by using periodical current awareness service supported by PUSH technology and user oriented information booking and feedback service supported by SDI service.

  • PDF

Anticipated Benefits of electronic Commerce and Competitive Strategies (전자상거래를 통한 국내 인터넷 쇼핑몰 업체들의 기대 이득과 경쟁전략)

  • 장시영;이정섭
    • Korean Management Science Review
    • /
    • v.17 no.3
    • /
    • pp.31-47
    • /
    • 2000
  • The widespread diffusion of Internet has enables companies to conduct business in quite a different way. marketing on the Internet becomes more important as firms adopt electronic commerce as a means to implement competitive strategies. One hundred and four BC shopping mall companies responded to an e-mail and web server survey about the anticipated benefits of electronic commerce and related strategies. The survey also asked about improvements in value chain activities and impediments to the implementation of electronic commerce in Korea. The results indicated that Korean shopping mall companies followed differentiation strategy significantly more than the other two strategies. In addition, six benefits factors were drawn from this study - information, productivity, cost savings, customers, management information, and applications. Productivity factor was related to cost leadership strategy, and customers factor was related with cost leadership, differentiation and focus strategies. Several benefits factors were also correlated with value chain activity improvements. The results of this study were compared with those of research conducted in the United States.

  • PDF

A design and implementation of data server on distributed multimedia stress for huge multimedia mail (대용량 멀티미디어 메일을 위한 분산 멀티미디어 스트림 상의 데이터서버의 설계 및 구현)

  • 박용희;전성미;고희선;임영환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.223-225
    • /
    • 2001
  • 기존의 멀티미디어 메일은 대용량 메일이라 개인 사용자에게 그 부담이 크지 않을 수가 업었다. 이에 인터넷 기반에서 멀티미디어 데이터서버에 대해서 많은 제품뿐만 아니라 서비스에 대한 QoS 만족을 위해 많은 연구실에서 연구해 왔었다. 특히나, VOD 서버나 인터넷방송을 위한 서버의 구축을 위해 많은 연구가 있어왔다. 본 연구는 인터넷기반이 아닌 본 연구실의 프로덕트인 VIP(Visual Interface Player)와 멀티미디어 스트림 엔진인 Essence를 이용한 멀티미디어 동영상 메일 전송 기법과 Essence를 이용한 동영상 멀티미디어 메일을 저장하는데 필요한 Essence내에 데이터베이스를 지원하기 위한 DBMedium 개발과 데이터베이스 라이브러리를 개발하기 위한 일련의 과정을 제안하고 있다.

  • PDF

RP Preprocessor Based on Distributed Objects (분산객체를 응용한 RP Preprocessor의 기능 구현)

  • 지해성;이승원
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.2
    • /
    • pp.120-128
    • /
    • 2003
  • When considering the use of rapid prototyping (RP), there are many issues a designer has to address for handling an STL model, the de facto standard fur RP. Today designers can skip all these issues by visiting web-based service bureaus that readily supply needed information for the RP services. Since orders are taken for RP parts through the web page of service providers designers are now asked to upload their STL files to the company server either by direct upload, ftp file transfer, or as an e-mail attachment. If the service bureau, however, fixes or edits an STL filceto optimize the RP process but neglects to tell its customer about the rework in detail, it may cause problems down the line in processing of the original CAD data for other applications. In this paper, we propose a framework for a collaborative virtual environment between CAD designers and RP processes on the internet which directly provides designers with an advanced preprocessor functionality, design visualization, as well as model display, repair, and slicing over the network. This can help smooth data transfer from CAD to RP process with minimum inconsistency in CAD.