• Title/Summary/Keyword: Windows Systems

Search Result 558, Processing Time 0.028 seconds

Analysis of Windows Vista Security System for Forensic Examination (포렌식 조사를 위한 윈도우 비스타 보안 체계 분석)

  • Hwang, Seong-Ho;Nam, Hyun-Woo;Park, Neung-Soo;Jo, Su-Hyung;Hong, Do-Won
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.141-148
    • /
    • 2008
  • Windows Vista published by Microsoft provides more powerful security mechanisms than previous Windows operating systems. In the forensics point of view, new security mechanisms make it more difficult to get data related to the criminals in a storage device. In this paper, we analyze BitLocker introduced as an new security mechanism in Windows Vista. Also, compared to the previous Windows operating systems, the changes and security issues of UAC and EFS in Windows Vista are discussed in the forensics point of view. Futhermore, we discuss other characteristics of Windows Vista useful for forensic examinations.

Performance Comparison and Analysis of Container-based Host Operating Systems for sending and receiving High-capacity data on Server Systems

  • Kim, Sungho;Kwon, Oeon;Kim, Jung Han;Byeon, JiHyeon;Hwang, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.65-73
    • /
    • 2022
  • Recently, as the Windows system supports the Windows subsystem for Linux (WSL), various researchers have studied to apply a docker container on various systems such as server systems, workstation system and so on. However, in various existing researchers, there is a lack of performance-related indicators to apply the system to each operating system (linux system and windows system). In this paper, we compared a performance comparison and analysis of container-based host operating systems. We configured experimental environments of operating systems for microsoft windows systems and linux systems based on a docker container support. In experimental results, the containers of linux systems reduced the average data latency of dataset 1-6 by 3.9%, 62.16%, 1552.38%, 7.27%, 60.83%, and 1567.2%, compared to the containers on microsoft windows systems.

A Design and Implementation of a Windows Visual System for the Monitoring of Red Tide on the Internet (인터넷을 통한 적조 관측용 윈도우 비주얼 시스템의 설계 및 구현)

  • 박진우;손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.27 no.7
    • /
    • pp.817-825
    • /
    • 2003
  • The amount of damage suffered from the red tide occurring at the near shore is increasing rapidly. The Windows visual system discussed in this paper is developed in order to help minimize the damage. The system is focused on the monitoring the coastal environment. and forecasting the red tide occurrence. Although several similar systems are now existing. most of them are based on the web application. which cause the large response time. limited presentation ability of data. and inability of data storing at client side. The Windows visual system described in this paper operates on the Internet to get the ubiquitous access. One of three components of the Windows visual system. client system is developed as a Windows application in order to overcome the weak points of the previous systems. The gathering. analysis, and monitoring of data can be done at real time using the Windows visual system.

Development of Multiple-Windows Manager using virtual Screen (가상 화면을 이용한 다중 윈도우즈 매니저 개발)

  • Won, Hui-Chul;Choi, Jae-Kyung;Kim, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.53-59
    • /
    • 2009
  • In this paper, we describe the problems which can happen during multi-tasking process in the Windows operating system (OS) environment. To cope with the problems, multiple-windows manager program is proposed in this paper. If we use the proposed multiple-windows manager program with three virtual screen, we can obtain the effect like using four Windows OS and thus we can improve the tardy speed and the high complexity for multi-tasking process.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

Real-Time Characteristics Analysis and Improvement for OPRoS Component Scheduler on Windows NT Operating System (Windows NT상에서의 OPRoS 컴포넌트 스케줄러의 실시간성 분석 및 개선)

  • Lee, Dong-Su;Ahn, Hee-June
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.1
    • /
    • pp.38-46
    • /
    • 2011
  • The OPRoS (Open Platform for Robotic Service) framework provides uniform operating environment for service robots. As an OPRoS-based service robot has to support real-time as well as non-real-time applications, application of Windows NT kernel based operating system can be restrictive. On the other hand, various benefits such as rich library and device support and abundant developer pool can be enjoyed when service robots are built on Windows NT. The paper presents a user-mode component scheduler of OPRoS, which can provide near real-time scheduling service on Windows NT based on the restricted real-time features of Windows NT kernel. The component scheduler thread with the highest real-time priority in Windows NT system acquires CPU control. And then the component scheduler suspends and resumes each periodic component executors based on its priority and precedence dependency so that the component executors are scheduled in the preemptive manner. We show experiment analysis on the performance limitations of the proposed scheduling technique. The analysis and experimental results show that the proposed scheduler guarantees highly reliable timing down to the resolution of 10ms.

A Study on Ventilation Characteristics of Industrial Windows (공장창호의 환기특성에 관한 연구)

  • Piao, Cheng-Xu;Kim, Tae-Hyeung;Ha, Hyun-Chul;Xu, Rong-Bin
    • Journal of Environmental Science International
    • /
    • v.20 no.5
    • /
    • pp.581-587
    • /
    • 2011
  • Industrial natural ventilation systems consist of gravity ventilator, the high/low windows and doors. Especially, the high windows play an important role in the industrial natural ventilation systems. Generally speaking, industrial high windows are divided into 3 types; louver type, $45^{\circ}$ open type and $90^{\circ}$ open type. This study was numerically and experimentally conducted. Three types of windows were tested to know the ventilation characteristics and estimate the ventilation efficiencies. Numerically, computational fluid dynamics software (AIR PAK Ver. 2.0) was used to observe the flow characteristics inside the industrial building and the concentration contours generated by the tracer gas method. Experimentally, the flow visualization technique and the tracer gas method were applied with the model building to characterize the flow pattern inside the model building and to estimate the ventilation efficiencies with the different windows. It was found that $90^{\circ}$ open type window was most effective for the discharge of pollutants from the industrial building. On the other hand, the louver type window was found to be less effective than any other windows.

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

Intrusion Detection System for Home Windows based Computers

  • Zuzcak, Matej;Sochor, Tomas;Zenka, Milan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4706-4726
    • /
    • 2019
  • The paper is devoted to the detailed description of the distributed system for gathering data from Windows-based workstations and servers. The research presented in the beginning demonstrates that neither a solution for gathering data on attacks against Windows based PCs is available at present nor other security tools and supplementary programs can be combined in order to achieve the required attack data gathering from Windows computers. The design of the newly proposed system named Colander is presented, too. It is based on a client-server architecture while taking much inspiration from previous attempts for designing systems with similar purpose, as well as from IDS systems like Snort. Colander emphasizes its ease of use and minimum demand for system resources. Although the resource usage is usually low, it still requires further optimization, as is noted in the performance testing. Colander's ability to detect threats has been tested by real malware, and it has undergone a pilot field application. Future prospects and development are also proposed.

Environment Construction for App Development Using Smart-phones (스마트폰 App 개발 환경 구축)

  • Kim, Jin-Whan;Cho, Jae-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.574-576
    • /
    • 2010
  • This paper describes constructing methods of environments for the App development using v smart-phones which are widespread rapidly. Various smart-phones and operating systems are used all over the world. In this paper, we will deal with three kinds of smart-phones, that is Windows Mobile Phone(recently Windows Phone7), iPhone and Android Phone using respective operating systems which are widespread in the domestic market.

  • PDF