• Title/Summary/Keyword: policy design

Search Result 3,350, Processing Time 0.027 seconds

Effective iptables Policy Design Against DDoS Attack (DDoS 공격 상황에서 효율적인 iptables 정책 설계)

  • Byeon, Jin-Yeong;Han, Byung-Woo;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.642-645
    • /
    • 2010
  • 본 논문에서는 DDoS(Distribute Denial of Service) 공격 상황에서의 효율적인 iptables 정책 설계 방법에 대해 제안한다. 현재 구축된 인터넷 상황에서는 누구나 손쉽게 DDoS Attack 환경을 구축하여 특정 사이트를 공격할 수 있다. 이를 극복하기 위해 DDoS 방어전용 장비 등을 사용 할 수 있지만 고가라는 단점 때문에 개인 혹은 소규모 서비스 시스템에서 사용하기에 어려운 점이 많다. 본 논문은 이러한 상황을 극복하기 위해 개인 및 소규모 시스템에 적용 가능한 효율적인 iptables 정책을 제안한다. 제안한 각 정책별 성능 평가는 웹 서비스 환경과 DDoS 유형별 공격 시나리오를 가정하여 시행하였고, 이는 실제적으로 효과가 있음을 확인하였다.

  • PDF

Improvement of the Automobile Control Software Testing Process Using a Test Maturity Model

  • Jang, Jin-Wook
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.607-620
    • /
    • 2018
  • The problem surrounding methods of implementing the software testing process has come under the spotlight in recent times. However, as compliance with the software testing process does not necessarily bring with it immediate economic benefits, IT companies need to pursue more aggressive efforts to improve the process, and the software industry needs to makes every effort to improve the software testing process by evaluating the Test Maturity Model integration (TMMi). Furthermore, as the software test process is only at the initial level, high-quality software cannot be guaranteed. This paper applies TMMi model to Automobile control software testing process, including test policy and strategy, test planning, test monitoring and control, test design and execution, and test environment goal. The results suggest improvement of the automobile control software testing process based on Test maturity model. As a result, this study suggest IT organization's test process improve method.

The Design of the Security Management System for Secure Internet (안전한 인터넷을 위한 보안관리 시스템 설계)

  • 정연서;박배욱;손승원;오창석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.74-79
    • /
    • 2002
  • In this paper, we designed the Policy-based ESM(Enterprise Security Management) for network security in Internet. First, we consider the existed network management and present ESM. And then analyze existent systems and drew consideration items at system design. This paper applied to PBNM technology in order to improve security network management.

  • PDF

Conceptual Design of Ground Control Point Survey Automation Technology Using Drone (드론을 활용한 지상기준점 측량 자동화 기술의 개념디자인)

  • Jae-Woo Park;Dong-Jun Yeom
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.4_2
    • /
    • pp.687-696
    • /
    • 2023
  • In recent construction sites, digital maps obtained through drone photogrammetry have garnered increasing attention as indispensable tools for effective construction site management. the strategic placement of Ground Control Points (GCPs) is crucial in drone photogrammetry. Nevertheless, the manual labor and time-intensive nature of GCP surveying pose significant challenges. The purpose of this study is to design the concept of automated GCPs survey technology for enhancing drone photogrammetry efficiency in construction sites. As a result, the productivity of the automated method was analyzed as 118,894.7㎡/hr. It is over 25% productivity improvement compared to traditional methods. In future studies, economic analysis of automated methods should be studied.

A Hoarding Policy for collaborative computing in Mobile Environment : design and Implementation. (이동컴퓨터 상에서의 공동작업을 위한 자동저장 방식 설계 및 구현)

  • 이근영;김남광박승규
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.491-494
    • /
    • 1998
  • This paper describes the design and implementation of file system which allows the collaborative computing in mobile environment. The design goal is to make a logically one file system in the distributed computer systems. The characteristics of frequent, foreseeable and variable disconnections in a mobile environment wrer taken into consideration. We introduce an auto-hoarding system that provides the availability of large number of nodes which are weakly and intermittently connected. The data consistency problems in distributed or replicated mobile data are also discussed.

  • PDF