• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.03 seconds

Design and Implementation Of Web Base System And Intranet (인트라넷과 웹 기반 시스템 설계 및 구현)

  • 남태희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.182-187
    • /
    • 2002
  • This paper is not sparing many efforts for efficient improvement of business about limited office automation applying the latest various internet practical use technique. therefore, Treatise that see in reply with web administration systems design and implementation to Promise efficiency of corporation my business. present that embody intranet construction and this by electronic commerce system to invent productive profit of corporation outstretching business by Web Base System, and analyzed validity security problem and corporation business application dimension accordingly.

  • PDF

Design and Implementation of FakePort for Efficient Port Control Based on Linux Server (리눅스 서버의 효율적인 포트제어를 위한 페이크포트 설계 및 구현)

  • 김완경;소우영;김환국;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.319-324
    • /
    • 2004
  • Internet is spread by the rapid development of information telecommunication infrastructure. But there are swinging damages becuase of most of the user has a shortage of knowledge. Especially, in proportion to increase of Linux user as PC, that is exposed to various threatener and is target of malicious attacker. In this paper, design and implement Fakeport based on Linux to control port efficiently and easily for protection against attack.

  • PDF

Design and Implementation of Internet Worm Traffic Generation System (인터넷 웜 트래픽 분석을 위한 웜 생성도구 설계 및 구현)

  • 최병철;최양서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.333-337
    • /
    • 2004
  • The Internet worm is changed rapidly and virus vaccine can not defense the whole Internet worm. To prevent them form spreading into network and analysis specifications, we design and implement the Internet Worm Traffic Generator. In this research, we offer the real worm propagation environment through protocol and scenario specification.

  • PDF

Design and Implementation of Crypto Chip for SEED and Triple-DES (SEED와 Triple-DES 전용 암호칩의 설계 및 구현)

  • 김영미;이정엽;전은아;정원석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.59-64
    • /
    • 2004
  • In this paper a design and an implementation of a crypto chip which implements SEED and Triple-DES algorithms are described. We designed it by VHDL(VHSIC Hardware Description Language) which is a designed system-description language. To apply the chip to various application, four operating Modes such as ECB, CBC, CFB, and CFB are supported. The chip was designed by the Virtex-E XCV2000E BG560 of Xilinx and we confirmed result of it at the FPGA implementation by functional and timing simulation using the Xilinx Foundation Series 3.li.

  • PDF

Autonomous, Scalable, and Resilient Overlay Infrastructure

  • Shami, Khaldoon;Magoni, Damien;Lorenz, Pascal
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.378-390
    • /
    • 2006
  • Many distributed applications build overlays on top of the Internet. Several unsolved issues at the network layer can explain this trend to implement network services such as multicast, mobility, and security at the application layer. On one hand, overlays creating basic topologies are usually limited in flexibility and scalability. On the other hand, overlays creating complex topologies require some form of application level addressing, routing, and naming mechanisms. Our aim is to design an efficient and robust addressing, routing, and naming infrastructure for these complex overlays. Our only assumption is that they are deployed over the Internet topology. Applications that use our middleware will be relieved from managing their own overlay topologies. Our infrastructure is based on the separation of the naming and the addressing planes and provides a convergence plane for the current heterogeneous Internet environment. To implement this property, we have designed a scalable distributed k-resilient name to address binding system. This paper describes the design of our overlay infrastructure and presents performance results concerning its routing scalability, its path inflation efficiency and its resilience to network dynamics.

Synergy: An Overlay Internetworking Architecture and Implementation

  • Kwon, Min-Seok;Fahmy, Sonia
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.181-190
    • /
    • 2010
  • A multitude of overlay network designs for resilient routing, multicasting, quality of service, content distribution, storage, and object location have been proposed. Overlay networks offer several attractive features, including ease of deployment, flexibility, adaptivity, and an infrastructure for collaboration among hosts. In this paper, we explore cooperation among co-existing, possibly heterogeneous, overlay networks. We discuss a spectrum of cooperative forwarding and information sharing services, and investigate the associated scalability, heterogeneity, and security problems. Motivated by these services, we design Synergy, a utility-based overlay internetworking architecture that fosters overlay cooperation. Our architecture promotes fair peering relationships to achieve synergism. Results from Internet experiments with cooperative forwarding overlays indicate that our Synergy prototype improves delay, throughput, and loss performance, while maintaining the autonomy and heterogeneity of individual overlay networks.

Efficient Integrated Design of AES Crypto Engine Based on Unified Data-Path Architecture (단일 데이터패스 구조에 기반한 AES 암호화 및 복호화 엔진의 효율적인 통합설계)

  • Jeong, Chan-Bok;Moon, Yong-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.3
    • /
    • pp.121-127
    • /
    • 2012
  • An integrated crypto engine for encryption and decryption of AES algorithm based on unified data-path architecture is efficiently designed and implemented in this paper. In order to unify the design of encryption and decryption, internal steps in single round is adjusted so as to operate with columns after row operation is completed and efficient method for a buffer is developed to simplify the Shift Rows operation. Also, only one S-box is used for both key expansion and crypto operation and Key-Box saving expended key is introduced provide the key required in encryption and decryption. The functional simulation based on ModelSim simulator shows that 164 clocks are required to process the data of 128bits in the proposed engine. In addition, the proposed engine is implemented with 6,801 gates by using Xilinx Synthesizer. This demonstrate that 40% gates savings is achieved in the proposed engine, compared to individual designs of encryption and decryption engine.

Configuration of Mail Delivery System Based on Reinforcement Learning

  • Morishita, Soichiro;Hiraoka, Kazuyuki;Kobayashi, Hidetsune;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.830-833
    • /
    • 2002
  • To solve the internal security problem such as human error and bad faith, the automation of computer system management is significant. For this purpose, we focus attention in the automation of Mail Delivery Service. Today, requirement for reliable mail delivery system becomes larger and larger. However, existing systems are too strict about their configuration. Hence, we propose the method based on Reinforcement Learning (RL) to achieve proper MX record ordering. A measure on validity of the design of system, such as network topology number of servers and so on, is also obtained as side benefit. In order to verify the usability of the presented method, we did on a small model of mail delivery system. As a result, we show that RL is available for determination of the proper MX record ordering. Additionally, we suggest that it is also available for comparing validity of setting of MTA and the network design.

  • PDF

A study on improvement of walking safety in newtown schoolzone way (초등학교 통학환경개선에 관한 연구)

  • Yoon, Yong-Gil
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.10 no.2
    • /
    • pp.20-29
    • /
    • 2011
  • The purpose of this study is to suggest a scheme to provide children safer and more comfortable walking circumstances by survey current walking circumstances of schoolzone ways. A scheme suggested in this study was based on the analysis of survey to elementary school in 3 Newtowns(Dongtan, Dongbaek and Gumdan Districts) and actually surveyed data on school zone, the scheme can be summed up as follows; First, to avoid pedestrian roads being interrupted and to expend waiting space near schoolzone ways, several measures are needed including fixing roads and building additional gateway. Second, to secure pedestrians' safety in school zone ways should be planned and established more security concepts und facilities Third, to improve the walking safety in schoolzone way should be established specially "schoolzone B-plan".

A New Scheme for Watermarking Engineering Graph

  • Zhanchuan, Cai;Wei, Sun;Changzhen, Xiong;Dongxu, Qi
    • International Journal of CAD/CAM
    • /
    • v.6 no.1
    • /
    • pp.99-104
    • /
    • 2006
  • Engineering graph plays an important role in design and manufacture, such as architecture, machinery, manufacture, military. However, almost no persons consider the security and copyright of two-dimensional engineering graph. A novel method for two-dimensional engineering graph watermark based U system is proposed in this paper. Watermarks generated by this technique can be successfully extracted even after rotation, translation and scaling transform.