• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System (침입탐지시스템에서 경보정보에 대한 대응 능력 모델링 및 성능분석)

  • Jeon Yong-Hee;Jang Jung-Sook;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.855-864
    • /
    • 2005
  • In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator using OPNET Modeller, for the performance analysis on the response capacity of alert information in the proposed system. At first, we model the arrival process of alert information resulted from abnormal traffic. In order to model the situation in which alert information is intensively produced, we apply the IBP(Interrupted Bernoulli Process) which may represent well the burstiness of traffic. Then we perform the simulation in order to gain some quantitative understanding of the system for our performance parameters. Based on the results of the performance analysis, we analyze factors which may hinder in accelerating the speed of security node, and would like to present some methods to enhance performance.

A Study on the Effective Method of Generating the Dynamic Web Documents in the Multi-user System (다중-사용자 시스템에서의 효과적인 동적 웹 문서 발생 방법에 관한 연구)

  • Lee Hyun-Chang;Lee Jong-Eon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.478-485
    • /
    • 2006
  • In this paper, we analyze the conditions of generating the dynamic Web documents in multi-user server and propose effective method for it. PSSI technique leads to replace the complex process of modifying a CGI source program by simply correcting the HTML Web document in the external file form. This technique has the strong points of CGI, flexibility and security of programming as well as those of SSI, easiness of modifying Web documents. Due to the characteristics of PSSI that Web source documents are in the form of external file, we show that with a single CGI program an individual user can design and modify his own Web documents in his directory. This means that PSSI technique has more advantage in managing the server than the CGI method which requires CGI program to be set up whenever that service is needed.

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

Connector for Dynamic Composition of Aspects Based on AOSD (AOSD기반에서 Aspect의 동적결합을 위한 Connector)

  • Kim Tae-Woong;Kim Tae-Gong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.251-258
    • /
    • 2006
  • Aspect-Oriented Software Development is new software development method. It has many advantages related to software performance, maintenance and repair. Also it offers modularization method to a existing programming language for secondary function such as security and fault tolerance. But the present problem is that we have to use new aspect-oriented programming language. Further more when we apply Aspect to legacy system, we have to recompile the source code in order to build software system based on AOSD. In this paper, we propose and design Connector that can be composed with Aspect in legacy system dynamically. To elaborate this work, we use the information of operations about Core and Aspect, and the information of pointcut described with XML. We validate that the proposed Connector has features such as no need of new compiler, no recompilation and no modification of legacy system through case study.

Design and Implementation of Dynamic Peer Selection Scheme for Allocating Proxy-Server on Pure P2P Network Environments (순수 P2P 네트워크 환경에서 프락시-서버 할당을 위한 동적 피어 선정 기법 설계 및 구현)

  • Kim, Young-Jin;Kim, Moon-Jeong;Kim, Ung-Mo;Eom, Young-Ik
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.153-160
    • /
    • 2003
  • Recently, deployments of firewalls and NATs ire increasing to provide network security features or to solve the problem of public IP shortage. But, in these environments, peers in different firewall or NAT environments may get limited services because they cannot open direct communicate channels. This can be a significant problem in pure P2P environments where the peers should get or provide services by opening direct channels among themselves. In this paper, we propose a scheme for dynamically selecting a peer that fan be used as a proxy server. The proxy server supports the communication between the peers in different firewall or NAT environments. The proposed scheme is operating system independent and supports bidirectional communication among the peers in P2P environments. Additionally, the proposed scheme can distribute network traffic by dynamically allocating proxy servers to the peers that is not located in the firewall or NAT environments.

A Novel Design of CDSK Receiver for Improving the BER Performance (BER 성능 향상을 위해 제안하는 새로운 CDSK 수신기)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.638-643
    • /
    • 2013
  • Chaos communication system has a sensitive characteristic to initial conditions, because completely another signal is generated when initial condition of chaos equation is changed subtly. Also, chaos communication systems have the characteristics of non-periodic, non-predictability, the broadband signal, such as ease of implementation. Due to these characteristics, security of chaos communication system generally is evaluated better than other systems. However, BER(Bit Error Rate) performance is evaluated worse than other digital system, because existing chaos communication system's transmitter and receiver are strong influence by interference signal and noise. So, research to improve the BER performance of the chaotic communication system is performed continuously. In this paper, We will propose a new CDSK(Correlation Delay Shift Keying) receiver for BER performance improvement. After we compare to the performance of existing CDSK receiver and proposed CDSK receiver, BER performance of proposed CDSK receiver evaluate. Also, when using the new CDSK receiver, we evaluate the BER performance according to the spreading factors and find an optimum spreading factor. If chaos communication system use a new CDSK receiver, BER performance is improved than existing CDSK receiver. Also, if spreading factor's value is increased, BER performance is improved, because it is not nearly affected by interference signal and noise.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.

Design and Verification of Newly Developed Anti-jamming GPS Test System (새롭게 개발된 항재밍 위성항법장치 점검 시스템 설계 및 검증)

  • Kwon, Byung-Gi;Lee, Jong-Hong;Heo, Yong-Kwan;Lee, Chul
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.1-7
    • /
    • 2015
  • These anti-jamming GPS systems are verified using large anechoic chamber or field-test until now. When using a large anechoic chamber, Independent verification from external enviroments like noise is an advantage but high cost and availability of chamber are disadvantages. And in case of field test, verification under real propagation enviroment is an advantage but security problem of military equipments and problem of making same test condition are disadvantages. This paper presents an newly developed anti-jamming GPS test system. This test system mainly consists of small anechoic chamber, jamming divider, jamming signal generator and satellite simulator. The small anechoic chamber is installed many jamming antennas to transmit multi jamming signals and the jamming divider is newly developed to control multi jamming signals. According to self performance test and combined test with Anti-jamming GPS receiver, we verified our system's reliability.

Design of Web-based Parallel Computing Environment Using Aglet (Aglet을 이용한 웹 기반 병렬컴퓨팅 환경설계)

  • 김윤호
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.2
    • /
    • pp.209-216
    • /
    • 2002
  • World Wide Web has potential possibility of infrastructure for parallel computing environment connecting massive computing resources, not just platform to provide and share information via browser. The approach of Web-based parallel computing has many advantages of the ease of accessibility, scalability, cost-effectiveness, and utilization of existing networks. Applet has the possibility of decomposing the independent/parallel task, moving over network, and executing in computers connected in Web, but it lacks in the flexibility due to strict security semantic model. Therefore, in this paper, Web-based parallel computing environment using mobile agent, Aglet (Agile applet) was designed and possible implementation technologies and architecture were analyzed. And simple simulation and analysis was done compared with applet-based approach.

  • PDF

Assessment of Rice Cultivation in Rural Areas from E3 (Energy, Environment, and Economy) Perspectives (E3(Energy, Environment, and Economy)관점에서의 농촌 바이오매스 평가 - 벼 재배를 중심으로 -)

  • Lee, Jimin;Kim, Taegon;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Population growth and increasing consumption of resources in the process of the industrial development has caused environmental pollution, climate change, and resource exhaustion. Therefore 'sustainable development' has become the important issue for the future. The sustainable development aims at effective resource use, less environmental impacts, and higher social security. Generally the rural area including agricultural fields and forest has various and plentiful natural resources which could make future development sustainable. To develop potential rural resources, the values for energy, environment and economy should be assessed considering the life-cycle of resources. The purposes of this study are to suggest the E3 (Energy, Environment, and Economy) assessment model for rural biomass considering life-cycle of resource and to apply the model to rice, the major agricultural product. As the results of this study, it turned out through E3 assessment that economic gain of rice cultivation is 578,374 won/10a, carbon absorption is $1,530kgCO_2/10a$, carbon emission is $926.65kgCO_2/10a$, and bio-energy potential of by-product is 394,028 kcal/10a. When E3 assessment was applied to by province, the results varied by regions because of the amount of input during cultivation. These results would be useful to realize the rural biomass and design regional resources plan in integrated E3 perspective.