• Title/Summary/Keyword: 네트워크 자원

Search Result 2,778, Processing Time 0.031 seconds

STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme (STRIDE 및 HARM 기반 클라우드 네트워크 취약점 탐지 기법)

  • Jo, Jeong-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.599-612
    • /
    • 2019
  • Cloud networks are used to provide various services. As services are increasingly deployed using cloud networks, there are a number of resources in the cloud that leverage a variety of environments and protocols. However, there is a security intrusion on these resources, and research on cloud network vulnerability detection is required as threats to cloud resources emerge. In this paper, we propose a vulnerability detection scheme using STRIDE and HARM for vulnerability detection of resources utilizing various environments and protocols, and present cloud network vulnerability detection scheme through vulnerability detection scenario composition.

(Performance Evaluation of Proxy-based Mobile Agent Model for Hierarchical Management Domains) (계층형 관리 도메인을 위한 프록시 기반의 이동 에이전트 모델의 성능 평가)

  • 박상윤
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.1049-1062
    • /
    • 2002
  • As the distributed resources in the networks have become increasingly popular, the accesses to these resources having been activated. Especially, the accesses to the distributed resources using the mobile agent technologies provide the mechanisms supporting mobility with mobile users as well as the dynamic accesses to the resources in the fixed networks. Proxy-based mobile agent model is defined as mobile agent network model which allocates the hierarchical domains to the distributed resources changed dynamically, assigns one proxy server for each domain, and promotes the management and the cooperation of the mobile agents. In this paper, we introduce the architecture and the execution scenario for proxy-based mobile agent model which is suitable for the hierarchical management domains. In simulation, we evaluate the proxy server's route optimization functionality and the performance reducing execution time of the mobile agents.

  • PDF

Adaptive Resource Allocation Schemes in Wireless Mobile Networks (무선 이동 네트워크에서의 적응적 자원 할당 방법)

  • Kang, Yoo-Hwa;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.477-488
    • /
    • 2001
  • In wireless networking environments, supporting guaranteed quality of service to mobile hosts is difficult due to the facts that wireless networks have limited bandwidth and mobile hosts frequently move in and out of cells. In spite of the characteristics of wireless communications, the quality of some types of services, i.e., real-time services, must be guaranteed at a certain level. When a mobile host moves into another cell, service rates for mobile hosts in wireless networks may be adjusted since wireless networks have limited bandwidths. In this paper, we propose two resource allocation algorithms in wireless mobile networks, using quality of service (QoS) specifications. For efficient use of resources of wireless networks, the proposed algorithms dynamically allocate rates of flows in proportion to QoS with limited resources.

  • PDF

An analysis and design on the security node for guaranteeing availability against network based DoS (네트워크 기반 서비스 거부 공격에 대응한 가용성 유지를 위한 보안 노드 분석 및 설계)

  • 백남균;김지훈;신화종;이완석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.550-558
    • /
    • 2004
  • In order to design network node for guaranteeing availability against network based DoS attack, some restrictions such as the relationship analysis on upper and lower layer bandwidth, buffer capacity, attack resources, a number of attack session and loss probability are analyzed. And then, to make good use of network resource, the relationship between required resources for satisfying loss probability and cost is discussed. The results of this study are expected to be applied to the effective security node design against network DoS.

Strategic Alliance Networks in Korean Construction Industry: Network Structure and Performance of Firms (국내건설기업의 제휴네트워크 : 네트워크 구조와 성과)

  • Kim, Kon-Shik;Shin, Tack-Hyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.4
    • /
    • pp.151-164
    • /
    • 2009
  • Strategic alliances developed as formalized inter-organizational relationships are core vehicles to share information, resources and knowledge. The structural characteristics of strategic network constructed by strategic alliances have been important agenda in strategic management discipline. This paper has two folds in analysing the strategic network formulated by project level alliances in Korean construction industry. First, we investigate the strategic network using the tools and methods of social network analysis, such as centrality, cohesion, structural equivalence, and power law. Second, the performance of firms within networks are analysed longitudinally with panel data analysis. We have found that the strategic networks in this industry has scale-free characteristics, where the degree distribution fits the power law, and the vertically equivalent structure is clear. We also present that the performance of firms are continuously affected by the degree centrality of firms in this network for the last 10 years.

Mobility Support Scheme Based on Machine Learning in Industrial Wireless Sensor Network (산업용 무선 센서 네트워크에서의 기계학습 기반 이동성 지원 방안)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Jung, Kwansoo;Oh, Seungmin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.256-264
    • /
    • 2020
  • Industrial Wireless Sensor Networks (IWSNs) is exploited to achieve various objectives such as improving productivity and reducing cost in the diversity of industrial application, and it has requirements such as low-delay and high reliability packet transmission. To accomplish the requirement, the network manager performs graph construction and resource allocation about network topology, and determines the transmission cycle and path of each node in advance. However, this network management scheme cannot treat mobile devices that cause continuous topology changes because graph reconstruction and resource reallocation should be performed as network topology changes. That is, despite the growing need of mobile devices in many industries, existing scheme cannot adequately respond to path failure caused by movement of mobile device and packet loss in the process of path recovery. To solve this problem, a network management scheme is required to prevent packet loss caused by mobile devices. Thus, we analyse the location and movement cycle of mobile devices over time using machine learning for predicting the mobility pattern. In the proposed scheme, the network manager could prevent the problems caused by mobile devices through performing graph construction and resource allocation for the predicted network topology based on the movement pattern. Performance evaluation results show a prediction rate of about 86% compared with actual movement pattern, and a higher packet delivery ratio and a lower resource share compared to existing scheme.

Resource Selection Algorithm for Uniformly Partitioned MPI Parallel Programs on the Grid (그리드에서 균등 분배 MPI 병렬 프로그램을 위한 자원 선택 알고리즘)

  • 이원재;이상권;임민열;맹승렬;조정완
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.73-75
    • /
    • 2003
  • 고속 네트워크의 등장으로 관리 영역을 초월한 계산 자원의 공유가 가능하게 되었고, 그리드 컴퓨팅이 등장하였다. 그리드 환경에 포함된 각 자원들은 이질적이고, 이질적인 환경에서 고성능을 얻기 위해서는 효과적인 자원 발견 및 자원 선택이 중요하다. 본 논문에서는 균등 분배 MPI 프로그램들에 대한 성능 예측 알고리즘과 자원 선택 알고리즘을 제안한다. 성능 예측 알고리즘은 자원의 이질성, 네트워크 성능, 복수 노드에 있는 CPU 부하, 응용 프로그램의 특성을 고려해 성능을 예측 한다. 자원 선택 알고리즘은 k개의 후보 자원 집합들을 생성한 후, 이들 중 최적의 집합을 선택한다. 이를 통해 기존 그리디 알고리즘의 약점이던 지역성을 극복했다.

  • PDF

Design of Management Model Integrating Wired and Wireless Network (유무선 네트워크 통합 관리 Model 설계)

  • 이주영;신복덕;하경재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.493-495
    • /
    • 2004
  • 본 논문에서는 유선네트워크와 Mobile Node간의 연결로 구성되는 무선네트워크에서 Mobile Node의 이동위치에 따라 Data통신 Packet을 조회하고 관리 및 통계할 수 있는 유무선 네트워크 통합 관리 Model을 설계하였다. 무선네트워크 관리에 필요한 MIB 항목이 SNMP에 명확히 표준화되어 있지 못하므로 무선네트워크의 자원을 정확히 관리하기 위해서 Mobile Node의 이동위치에 따른 Data통신 Packet을 저장할 수 있는 메카니즘과 MIB 항목의 정의가 필요하다. 따라서 무선네트워크의 Data통신 Packet을 관리하기 위해 필요한 SNMP의 구성방법과 관리에 필요한 새로운 MIB 항목을 정의하고 우선 SNMP Agent를 구성하여 Mobile Node에 탑재하였다. Mobile Node의 정보, 전달성격, 이동경로 및 이동패턴을 본 논문에서 정의한 MIB에 저장하고 효율적으로 무선네트워크 자원을 관리할 수 있도록 한다.

  • PDF

A Global TraHlc Conool Architecture For Isolating Network Attacts h Highspeed Intemet Backbone Networle (인터넷 백본망상에서 네트워크 공격 고립을 위한 전역 트래픽 제어 구조)

  • 노병희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5B
    • /
    • pp.491-497
    • /
    • 2004
  • In this Paper, we W a Hovel global traffic control architecture to isolate malicious network attacks and protect network infrastructure in Internet backbone networks. Unlike existing methods based on individual packets or flows, since the proposed detection and control methods are operated on the aggregate traffic level, the computational complexity can k significantly reduced, and they are applicable to develop a global defense architecture against network attack. Experimental results show that the proposed scheme can detect the network attack symptoms very exactly and quickly and protect the network resources as well as the normal traffic flows very efficiently.

Radio Resource Management using a Game Theoretic Approach Method in Heterogeneous Wireless Networks (이종 네트워크 환경에서 게임 이론적 접근방법을 이용한 무선 자원관리)

  • Kim, Nam-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.2178-2184
    • /
    • 2015
  • With the development of wireless network technologies, mobile users may use various networks easily and expect more advanced services. On the other hand, it may bring on some problems with network resource management that should lead the service provider to improve the current service quality and manage the network resource efficiently. This paper proposes the optimized radio resource management (RRM) scheme that integrates the Grey Relational Analysis (GRA) and game theory. The first applies the GRA to determine the Grey Relation Coefficient (GRC) factors that represent the network preference, and the network provider then selects the requested service that provide maximum payoff through Nash Equilibrium. Six requested services that have one application service among four different types of service classes were considered and the game was played repeatedly. In WiMAX, WLAN 1 and WLAN 2 game, the maximum payoff of each players was 93, 90.6 and 92.8 respectively. The experimental results show that every requested service can be selected by the network provider. Consequently, the proposed radio resource management mechanism is more effective in heterogeneous wireless networks.