• Title/Summary/Keyword: Target server

Search Result 180, Processing Time 0.025 seconds

Design of a Protected Server Network with Decoys for Network-based Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.57-64
    • /
    • 2018
  • In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. In this paper, we design a protected server network with a large number of decoys to anonymize the protected servers that dynamically mutate their IP address and port numbers according to Hidden Tunnel Networking, which is a network-based moving target defense scheme. In the network, a protected server is one-to-one mapped to a decoy-bed that generates a number of decoys, and the decoys share the same IP address pool with the protected server. First, the protected server network supports mutating the IP address and port numbers of the protected server very frequently regardless of the number of decoys. Second, it provides independence of the decoy-bed configuration. Third, it allows the protected servers to freely change their IP address pool. Lastly, it can reduce the possibility that an attacker will reuse the discovered attributes of a protected server in previous scanning. We believe that applying Hidden Tunnel Networking to protected servers in the proposed network can significantly reduce the probability of the protected servers being identified and compromised by attackers through deploying a large number of decoys.

NCS Learning Module Providing System Using CORS Based on Filter (CORS 기반 필터를 이용한 NCS 학습모듈 제공 시스템)

  • Kim, Dae-Kyeong;Na, Seung-Cheul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.161-167
    • /
    • 2015
  • This paper proposed system for providing the national competency standards learning module, which has changed and updated from time to time. The provisioning server of the proposed system provides learning module, and the management server carry out fault management, billing, request management, statistics and aggregate, etc, and the target server requests the learning module in the provisioning server through the domain. The proposed system determines provide of the learning module by CORS based on filter, which is to determine whether matches or not with domain of the provisioning server and the target server. The proposed system can be patch and maintenance remotely about NCS based learning module to be new update and removed. Also, the proposed system may provide contents in conjunction with existing educational systems, and may be extended in the future to enable the management for domain of the target server.

A Migration Method of Virtual Machines based Dynamic Threshold in Virtualization Environments (가상화 환경에서 동적 임계치 기반 가상 머신 이주 기법)

  • Choi, Hogun;Park, JiSu;Shon, Jin Gon
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.2
    • /
    • pp.83-90
    • /
    • 2015
  • In an virtualization environment, several virtual machines use physical resources together. If a specific virtual machine uses to much of the computing resources, other machines may not be working properly. There are various method to solve this problem. Most representative study is to migrate a specified virtual machines to a different server, a target server. In this study, server load can be transferred to a target server by the remigrate of the load imposed on virtual machine. It is still problematic that virtual machine has to remigrate to a different server. This thesis has proposed the algorithm determining the remigration targets by applying dynamic thresholds to solve those problems. The migration algorithm applies dynamic thresholds according to the following criteria. Firstly, the usage of CPU, network and memory; secondly, decide the set of artificial machine and the target server based on the resources surpassed thresholds; thirdly, determine artificial machines based on the resource usage in the target server.

Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.25-32
    • /
    • 2019
  • In this paper, we propose a method to apply the attack surface expansion through decoy traps to a protected server network. The network consists of a large number of decoys and protected servers. In the network, each protected server dynamically mutates its IP address and port numbers based on Hidden Tunnel Networking that is a network-based moving target defense scheme. The moving target defense is a new approach to cyber security and continuously changes system's attack surface to prevent attacks. And, the attack surface expansion is an approach that uses decoys and decoy groups to protect attacks. The proposed method modifies the NAT table of the protected server with a custom chain and a RETURN target in order to make attackers waste all their time and effort in the decoy traps. We theoretically analyze the attacker success rate for the protected server network before and after applying the proposed method. The proposed method is expected to significantly reduce the probability that a protected server will be identified and compromised by attackers.

A Real-time Remote Logging Model for Development of Location-Based Mobile Applications

  • Choi, Yun-seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.69-76
    • /
    • 2016
  • In this paper, we propose a real-time remote logging model for development of android applications using LBS(Location based Service). The model has two major parts: Mobile Log Management Service and Remote Log Server. Mobile Log Management Service consists of the log collector and the remote log manager. The log collector is an aspect of AOP which can collect logs from the target application without modifications of source codes. The remote log manager has a background service component so that it can receive logs whenever the log collector captures logs from the target application. Remote Log Server communicates with Mobile Log Management Service by socket interface. Therefore, Remote Log Server can show logs in real-time. To validate the efficiency of the proposed model, we show a case study, and compare the model with other models.

A Potential Target of Tanshinone IIA for Acute Promyelocytic Leukemia Revealed by Inverse Docking and Drug Repurposing

  • Chen, Shao-Jun
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.10
    • /
    • pp.4301-4305
    • /
    • 2014
  • Tanshinone IIA is a pharmacologically active ingredient extracted from Danshen, a Chinese traditional medicine. Its molecular mechanisms are still unclear. The present study utilized computational approaches to uncover the potential targets of this compound. In this research, PharmMapper server was used as the inverse docking tool andnd the results were verified by Autodock vina in PyRx 0.8, and by DRAR-CPI, a server for drug repositioning via the chemical-protein interactome. Results showed that the retinoic acid receptor alpha ($RAR{\alpha}$), a target protein in acute promyelocytic leukemia (APL), was in the top rank, with a pharmacophore model matching well the molecular features of Tanshinone IIA. Moreover, molecular docking and drug repurposing results showed that the complex was also matched in terms of structure and chemical-protein interactions. These results indicated that $RAR{\alpha}$ may be a potential target of Tanshinone IIA for APL. The study can provide useful information for further biological and biochemical research on natural compounds.

Remote Monitoring and Motor Control Based on Multi-Platform (다중플랫폼 기반 영상감시 및 원격지 모터제어시스템 구현)

  • Choi, Seung-Dal;Jang, Gun-Ho;Kim, Seok-Min;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.200-202
    • /
    • 2004
  • This paper deals with the real-time monitoring and control system using PC, PDA(Win CE embedded device) and PCS(based BREW platform). The camera attached to the server captures the moving target, and the captured frame of color image is encoded in JPEG for image compression at the server. The client(PC, PDA, PCS) receives the image data from the remote server and the received image is decoded from decompression. We use the TCP/IP protocol to send the image frames. The client can control the position of the camera by sending the control command to the server. Two DC servo motors for the camera are controlled in any directions, up-down and left-right, by the controller which is communicating with the server via the serial communication to get the control command. In this way, on the client we can monitor the moving images at the server and also control the position of the camera.

  • PDF

Targeting Algorithm for Personalized Message Syndication (개인 맞춤형 메시지 신디케이션을 위한 타겟팅 알고리즘)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.43-49
    • /
    • 2012
  • Personalized message syndication is an important process for maximizing the effect of mobile marketing. This paper proposes an algorithm for determining clients satisfying target conditions in real-time. The proxy server as an intermediate node stores client profiles (gender, age, location, etc) and their respective summaries into a database. When a company syndicates messages at run time, the proxy server maps target conditions expressed by boolean expressions to integer value and determines target clients by comparing target value with profile summary. Thus, this approach provides efficient personalized message syndication in very large systems with millions of clients because it can determine target clients in real-time and work with a traditional database easily.

Implementation of Image Transmission Server System using Embedded Linux (임베디드 리눅스 기반의 영상전송서버 시스템 구현)

  • Jung, Yeon-Sung;Nam, Boo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.388-390
    • /
    • 2004
  • In this paper, we performed the implementation of image transmission server system using embedded system that is for the specified object and easy to install at any places and move to wherever. Since the embedded system has lower capability than PC, we have to reduce the quantity of calculation and transmission. The image compression like JPEG, needs that the server calculates for making compressed image, makes the server carry the load. So we compresses the image at the server and transmit the codes to the clients connected, then the received codes from server are decoded and displayed at the clients. In this process to make the image compression and transmission effectively, we decrease the procedure as simple as possible to transmit the data in almost real-time. We used the Redhat linux 9.0 OS at the host PC and the target board based on embedded linux. The image sequences are obtained from the camera attached to the FPGA board with ALTERA chip. For effectiveness and avoiding some constraints, we made the device driver. Generally the image transmission server is PC, but using the embedded system as a server makes the server portable and cheaper than the system based on PC.

  • PDF

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.