• 제목/요약/키워드: Target server

검색결과 180건 처리시간 0.022초

명령제어서버 탐색 방법 - DNS 분석 중심으로 (A Study of Command & Control Server through Analysis - DNS query log)

  • 천양하
    • 한국전자통신학회논문지
    • /
    • 제8권12호
    • /
    • pp.1849-1856
    • /
    • 2013
  • 서비스 거부공격, 즉 DDoS(Destribute Denial of Service) 공격은 정상적인 사용자가 서비스를 이용하지 못하도록 방해하는 공격 기법이다. DDoS 공격에 대응하기 위해서는 공격주체, 공격대상, 그리고 그 사이의 네트워크를 대상으로 다양한 기법들이 연구개발 되고 있으나 모두 완벽한 답이 되지 못하고 있는 실정이다. 본 연구에서는 DDoS 공격이 발생하는 근원지에서 공격의 사전 준비작업 혹은 공격에 이용되는 봇이나 악성코드 등이 발생시키는 네트워크 트래픽의 분석을 통해 발견된 악성코드 및 봇을 제거하거나 공격 트래픽을 중도에서 차단함으로써 DDoS 공격에 대해 효율적으로 대응하는 방법을 개발하는 것을 목적으로 한다.

다중 스테레오 카메라를 이용한 3차원 모델링 시스템 (A 3D Modeling System Using Multiple Stereo Cameras)

  • 김한성;손광훈
    • 대한전자공학회논문지SP
    • /
    • 제44권1호
    • /
    • pp.1-9
    • /
    • 2007
  • 본 논문에서는 임의 시점에서의 장면을 생성하기 위한 3차원 모델링 및 렌더링 시스템을 제안한다. 제안되는 시스템은 공간상에 설치된 복수의 스테레오 카메라와 PC들로 구성되며 UDP를 이용해 연결되어 각 카메라에서 획득되고 분석된 영상 데이터들을 모델링 PC로 전송해 실시간으로 3차원 모델을 생성하고, 이로부터 사용자가 원하는 위치에서의 장면을 생성해 디스플레이 하게 된다. 제안된 알고리듬은 성능 평가 결과 기존의 알고리듬보다 좋은 성능을 보였으며, 구현된 시스템은 실시간으로 사용자에게 원하는 시점에서의 영상을 자연스럽게 제공함을 실험을 통해 검증하였다.

Game Design of Online Sutda using 3-Tier Structure

  • An, Syungog;An, Sung-Ho;Jung, Jinyoung;Kim, Soo-Kyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권9호
    • /
    • pp.55-60
    • /
    • 2015
  • This paper introduces a program structure that minimizes the client's business logic by reducing the client's specifications as a way of minimizing the limitations of online game platforms. The objective of this thesis is to design an online game that is based on a 3-tier client/server structure, and thus using this 3-tier structure to ultimately create an online Sutda game that anyone can enjoy. The progression of newly released games is highly based on the mobile market and the number of online games being launched is decreasing. As the mobile game market grows, more and more multi-platform games are being developed and target platforms within online games are greatly diversifying. Through these situations, this thesis minimizes the client's business logic through a 3-tier structure of application-middleware-database, and also proposes an online game client/server that allows three or more users to participate simultaneously through the server.

Numerical Formula and Verification of Web Robot for Collection Speedup of Web Documents

  • 김원;김영기;진용욕
    • 인터넷정보학회논문지
    • /
    • 제5권6호
    • /
    • pp.1-10
    • /
    • 2004
  • A web robot is a software that has abilities of tracking and collecting web documents on the Internet(l), The performance scalability of recent web robots reached the limit CIS the number of web documents on the internet has increased sharply as the rapid growth of the Internet continues, Accordingly, it is strongly demanded to study on the performance scalability in searching and collecting documents on the web. 'Design of web robot based on Multi-Agent to speed up documents collection ' rather than 'Sequentially executing Web Robot based on the existing Fork-Join method' and the results of analysis on its performance scalability is presented in the thesis, For collection speedup, a Multi-Agent based web robot performs the independent process for inactive URL ('Dead-links' URL), which is caused by overloaded web documents, temporary network or web-server disturbance, after dividing them into each agent. The agents consist of four component; Loader, Extractor, Active URL Scanner and inactive URL Scanner. The thesis models a Multi-Agent based web robot based on 'Amdahl's Law' to speed up documents collection, introduces a numerical formula for collection speedup, and verifies its performance improvement by comparing data from the formula with data from experiments based on the formula. Moreover, 'Dynamic URL Partition algorithm' is introduced and realized to minimize the workload of the web server by maximizing a interval of the web server which can be a collection target.

  • PDF

딥러닝 기반 자율주행 계단 등반 물품운송 로봇 개발 (Development of Stair Climbing Robot for Delivery Based on Deep Learning)

  • 문기일;이승현;추정필;오연우;이상순
    • 반도체디스플레이기술학회지
    • /
    • 제21권4호
    • /
    • pp.121-125
    • /
    • 2022
  • This paper deals with the development of a deep-learning-based robot that recognizes various types of stairs and performs a mission to go up to the target floor. The overall motion sequence of the robot is performed based on the ROS robot operating system, and it is possible to detect the shape of the stairs required to implement the motion sequence through rapid object recognition through YOLOv4 and Cuda acceleration calculations. Using the ROS operating system installed in Jetson Nano, a system was built to support communication between Arduino DUE and OpenCM 9.04 with heterogeneous hardware and to control the movement of the robot by aligning the received sensors and data. In addition, the web server for robot control was manufactured as ROS web server, and flow chart and basic ROS communication were designed to enable control through computer and smartphone through message passing.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

SYSTEM ARCHITECTURE OF THE TELEMATICS POSITIONING TESTBED

  • Kim, Young-Min;Kim, Bong-Soo;Choi, Wan-Sik
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.349-352
    • /
    • 2005
  • The telematics positioning testbed is an infrastructure to test and verify positioning technology, the sub-component of telernatics system. The positioning testbed provides the environment of performance analysis for acquisition of static and dynamic positioning information using telematics vehicle. This testbed consists of onboard positioning system, positioning reference station and lab positioning server. The onboard positioning system equipped in telematics vehicle, consists of target positioning system, reference positioning system, and analysis tool. A equipment acquiring high precision positioning data obtained from GPS combined with IMU was set as a reference positioning system. Analysis tool compares observed positioning data with high precision positioning information from a reference positioning system, and processes positioning information. Positioning reference station is RTK system used for reducing atmosphere error, and it transmits corrected information to reference positioning system. Positioning server which is located at laboratory manages positioning database and provides monitoring data to integrated testbed operating system. It is expected that the testbed supports commercialization of telernatics technology and services, integrated testing among component technology and verification.

  • PDF

USB Camera를 이용한 이미지 트래킹을 위한 Pan/Tilt 제어용 Embedded System 개발 (Development of an Image Tracking System Using an USB Camera on an Embedded System)

  • 김희식;남철;오드게렐;하관용
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.182-184
    • /
    • 2005
  • An embedded system has been applied to many fields including households and industrial sites. The embedded system is implemented fur image tracking in security area. This system supports a fixed IP far the reliable server operation on TCP/IP networks. A real time video image on the is analyzed to detect a certain invader who jumped into the observed area. The digital camera is connected at the USB host port of the target board. The video images from the video camera is continuously analyzed and displayed at the Linux web-server. The moving vector of the invaders on the continuous image frames is calculated and then it sends the calculated pan/tilt movement. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The experiment result showed tracking performance by the moving part speed of 10 to 150 pixels/sec.

  • PDF

SNMP를 이용한 효율적인 시스템 모니터링 (Low Overhead System Monitoring Based on SNMP)

  • 김태수;정창영;김동억;김용석
    • 산업기술연구
    • /
    • 제25권A호
    • /
    • pp.175-182
    • /
    • 2005
  • SNMP is a standard protocol for management of networking devices. Nowadays, most computer systems have capability to act as SNMP agents. In this paper, we describe our system monitoring software based on SNMP. It consists of a monitoring server, SNMP agents, and client programs. The monitoring server collects status information from the SNMP agents running on the monitoring target graphical display. We developed two version of clients, Java based standalone program and Web based program. Since most known SNMP packages are too big and heavy, we developed an efficient version of SNMP library for out system monitoring.

  • PDF

N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지 (DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram)

  • 김동현;김강석
    • 정보보호학회논문지
    • /
    • 제28권5호
    • /
    • pp.1141-1151
    • /
    • 2018
  • APT(Advanced Persistent Threat) 공격에서 감염 호스트와 C&C(Command and Control) 서버 간 통신은 공격 대상의 내부로 침입하기 위한 핵심단계이다. 공격자는 C&C 서버를 통해 다수의 감염 호스트를 제어하고, 침입 및 공격 행위를 지시하는데, 이 단계에서 C&C 서버가 노출되면 공격은 실패할 수 있다. 따라서 최근의 경우 DGA(Domain Generation Algorithm)를 통해 C&C 서버의 DNS를 짧은 시간 간격으로 교체하여 탐지를 어렵게 하고 있다. 특히 하루에도 500만개 이상 새로 등록되는 DNS 전부를 검증하고 탐지하는 것은 매우 어렵다. 이러한 문제점을 해결하기 위해 본 논문에서는 정상 DNS와 DGA를 통해 생성된 DNS(DGA-DNS)의 형태적 유사도(similarity) 분석을 이용한 DGA-DNS 탐지와 이를 통해 APT 공격 징후로 판단하는 모델을 제시하고 유효성을 검증한다.