• Title/Summary/Keyword: Windows System

Search Result 1,451, Processing Time 0.024 seconds

A study on neutralization malicious code using Windows Crypto API and an implementation of Crypto API hooking tool (윈도우즈 Crypto API를 이용한 악성코드 무력화 방안 연구 및 도구 구현)

  • Song, Jung-Hwan;Hwang, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.111-117
    • /
    • 2011
  • Advances in encryption technology to secret communication and information security has been strengthened. Cryptovirus is the advent of encryption technology to exploit. Also, anyone can build and deploy malicious code using windows CAPI. Cryptovirus and malicious code using windows CAPI use the normal windows API. So vaccine software and security system are difficult to detect and analyze them. This paper examines and make hooking tool against Crytovirus and malicious code using windows CAPI.

Real-time Processing Method for Windows OS Using MSR_FSB_FREQ Control (MSR_FSB_FREQ 제어를 이용한 윈도우 운영체제에 실시간 처리 방법)

  • Kim, Jong Jin;Lee, Sang Gil;Lee, Cheol Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.95-105
    • /
    • 2021
  • In the case of laptops and tablet PC's that replace desktop, it uses the Windows operating system to provide various functions depending on operating system dependency, the Windows operating system does not support real-time processing because it uses multi-level feedback queue scheduling that extends round-robin scheduling. Also, since the initial value of Local APIC Counter can not be obtained from the Windows 8, the real-time processing function provided through the existing RTiK does not work. In this paper, we calculate Local APIC Counter value by using MSR_FSB_FREQ register to support real-time processing function on tablet PC's. We designed and implemented RTiK+, which provides real-time processing function to guarantee the periodicity by calculating the operation time of accurate timer. In order to verify and evaluate the performance of the implemented the RTiK+, the period was measured by using the Read Time-Stamp Counter(RDTSC) instruction and it was confirmed that it operates normally at 1ms and 0.1ms period.

The Comparative Study on Performance Analysis of Windows 7 and Ubuntu Applying Open Source IDS/IPS Suricata (오픈소스 IDS/IPS Suricata를 적용한 Windows7과 Ubuntu 성능 비교 분석)

  • Seok, Jinug;Kim, Jimyung;Choi, Moonseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.141-151
    • /
    • 2017
  • Nowadays, It is undeniable that the threat of network security is growing as time flows due to worldwide development of wire/wireless, various Internet platform and sophisticated hacking techniques. The amount of traffics that Network security solution has to handle is increasing and recently many occurrence of explosive traffic attacks from PulseWave are being observed which has many similar characteristics to New DDos. Medium and small sized firms abroad have developed and distributed Snort and Suricata that are based on open-source Intrusion Detection System(IDS) / Intrusion Prevention System (IPS). The goal of this study is to compare between Windows7 by applying suicata 4.0.0 32bit version and Ubuntu 16.04.3 LTS by applying suicata 4.0.0 version which is an open source Intrusion Detection System / Intrusion Protection System that uses multi threads method. This experiment's environment was set as followed C1100 server model of Dell, Intel Xeon CPU L5520 2.27GHz*2 with 8 cores and 16 threads, 72GB of RAM, Samsung SSD 250GB*4 of HDD which was set on RAID0. According to the result, Suricata in Ubuntu is superior to Suricata in Windows7 in performance and this result indicates that Ubuntu's performance is far advanced than Windows7. This meaningful result is derived because Ubuntu that applied Suricata used multi core CPU and RAM more effectively.

리눅스 기반의 인터넷 원격 교육 시스템 개발 -교재 설계 모듈을 중심으로-

  • 성평식;박춘원
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.11a
    • /
    • pp.635-645
    • /
    • 2000
  • Within a context of rapid technological change and shifting market conditions, the education environment requires new paradigm of education delivery In accordance of such a technological progress, distance education system, which makes the loaming take place at anytime anywhere, overcoming barriers of time, or distance, is emerging as a mainstream of education delivery replacing the convectional one way delivery system from instructor to learners. This Paper aims to introduce the development principle and algorithm about Instructional System Design(ISD) module, a part of a total solution for distance education services. It was developed on Linux, a free Unix-type operating system. Linux supports so various network protocols, sharing the network resources in a smooth way, that it is able to integrate with other operating system very easily, especially with Windows NT or Windows 2000 servers. In terms of quality, it never falls behind the windows products which are commercially available only, It is a right operating system for the such a school environment that is usually limited in budgets. The development environment of the distance education solution to which ISD module belongs is composing of Apache server for web server, Java bean based on components for ISD module, PHP, server-side scripting language, for HTML documents and MySQL for DBMS.

  • PDF

A Development of Remote Control System using PDA based WINDOWS CE .NET (WINDOWS CE .NET 기반의 PDA를 이용한 원격제어시스템 개발)

  • Yang, Won-Seok;Lee, Yoo-Sang;Jeon, Jae-Wuk;Moon, Il-Hyeon;Jeon, Chang-Wan;Ahn, Dal;Lim, Jong-Sik;Choi, Kwan-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1480-1490
    • /
    • 2007
  • This study implemented a remote control system using PDA based on WINDOWS CE. NET. In existing remote control systems, the user generally controls remote objects and obtain data using a computer, which is a local system connected to the internet, and the remote objects are connected to server computers. In order to control remote objects, the user has to have a computer, a space to use the Internet, and wired internet. The system proposed in this study uses an embedded board as a server and PDA as a client. Thus, the user can control remote objects at any place as long as wireless internet is available. In addition, because an embedded board is used as a server, the system has the characteristics of high performance and low power consumption. The proposed system provides not only remote control environment using PDA but also conventional control environment using a computer as a client. In case PDA is not available, remote objects still can be controlled from any place as long as there are wired internet and a computer.

  • PDF

Performance Comparison and Analysis of Container-based Host Operating Systems for sending and receiving High-capacity data on Server Systems

  • Kim, Sungho;Kwon, Oeon;Kim, Jung Han;Byeon, JiHyeon;Hwang, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.65-73
    • /
    • 2022
  • Recently, as the Windows system supports the Windows subsystem for Linux (WSL), various researchers have studied to apply a docker container on various systems such as server systems, workstation system and so on. However, in various existing researchers, there is a lack of performance-related indicators to apply the system to each operating system (linux system and windows system). In this paper, we compared a performance comparison and analysis of container-based host operating systems. We configured experimental environments of operating systems for microsoft windows systems and linux systems based on a docker container support. In experimental results, the containers of linux systems reduced the average data latency of dataset 1-6 by 3.9%, 62.16%, 1552.38%, 7.27%, 60.83%, and 1567.2%, compared to the containers on microsoft windows systems.

Novel Push-Front Fibonacci Windows Model for Finding Emerging Patterns with Better Completeness and Accuracy

  • Akhriza, Tubagus Mohammad;Ma, Yinghua;Li, Jianhua
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.111-121
    • /
    • 2018
  • To find the emerging patterns (EPs) in streaming transaction data, the streaming is first divided into some time windows containing a number of transactions. Itemsets are generated from transactions in each window, and then the emergence of itemsets is evaluated between two windows. In the tilted-time windows model (TTWM), it is assumed that people need support data with finer accuracy from the most recent windows, while accepting coarser accuracy from older windows. Therefore, a limited array's elements are used to maintain all support data in a way that condenses old windows by merging them inside one element. The capacity of elements that accommodates the windows inside is modeled using a particular number sequence. However, in a stream, as new data arrives, the current array updating mechanisms lead to many null elements in the array and cause data incompleteness and inaccuracy problems. Two models derived from TTWM, logarithmic TTWM and Fibonacci windows model, also inherit the same problems. This article proposes a novel push-front Fibonacci windows model as a solution, and experiments are conducted to demonstrate its superiority in finding more EPs compared to other models.

XML-based Windows Event Log Forensic tool design and implementation (XML기반 Windows Event Log Forensic 도구 설계 및 구현)

  • Kim, Jongmin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.27-32
    • /
    • 2020
  • The Windows Event Log is a Log that defines the overall behavior of the system, and these files contain data that can detect various user behaviors and signs of anomalies. However, since the Event Log is generated for each action, it takes a considerable amount of time to analyze the log. Therefore, in this study, we designed and implemented an XML-based Event Log analysis tool based on the main Event Log list of "Spotting the Adversary with Windows Event Log Monitoring" presented at the NSA.

Development of a 3D Graphic Simulator for Assembling Robot (조립용 로봇이 3차원 그래픽 시뮬레이터 개발)

  • 장영희
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1998.03a
    • /
    • pp.227-232
    • /
    • 1998
  • We developed a Off-Line Graphic Simulator which can simulate a robot model in 3D graphics space in Windows 95 version. 4 axes SCARA robot was adopted as an objective model. Forward kinematics, inverse kinematics and robot dynamics modeling were included in the developed program. The interface between users and the off-line program system in the Windows 95's graphic user interface environment was also studied. The developing language is Microsoft Visual C++. Graphic libraries, OpenGL, by Silicon Graphics, Inc. were utilized for 3D graphics.

  • PDF