• Title/Summary/Keyword: 데이터센터 네트워크

Search Result 260, Processing Time 0.031 seconds

Implement of High Available Replicate Systems Based on Cloud Computing (클라우드 컴퓨팅 기반의 고가용성 복제시스템의 구현)

  • Park, Sung-Won;Lee, Moon-Goo;Lee, Nam-Yong
    • 전자공학회논문지 IE
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • As business management has a high level of dependence on Informational Technology (IT), protecting assets of a company from disaster is one of the most important thing that IT operating managers should consider. Because data or information is a major source of operation of the company, data security is the first priority as an aspect of continuity of business management. Therefore, this paper will realize disaster recovery system, which is suspended because of disaster, based on cloud computing system. Realized High Available Replicate System applied a method of multi thread target database to improve Replicate performance, and real time synchronize technology can improve efficiency of network. From Active to Active operation, it maximizes use of backup system, and it has a effect to disperse load of source database system. Also, High Available Replicate System realized consistency verification mechanism and monitoring technique. For Performance evaluation, High Available Replicate System used multi thread method, which shows more than threefold of replicate performance than single thread method.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Coordinates Computation of the EAREF 2012.0 for Earth Observations in the East-Asia Region (동아시아지역의 GNSS CORS 지구관측 네트워크(EAREF 2012.0) 좌표산정 연구)

  • Lee, Young-Jin;Jung, Kwang-Ho;Ryu, In-Sik
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.1
    • /
    • pp.11-22
    • /
    • 2013
  • EAREF(East-Asia Reference Frame) is based on the Eurasian Plate which is considered relatively stable. It is managing the coordinate reference system by a specific epoch through the networking of GNSS CORS of the East-Asia region covering North-east and South-east Asia. Also it'll be the goal to assist integrating the geospatial information management. This study aims to estimate the precise coordinates of EAREF in the East-Asia region at the epoch of January 1st of 2012 (2012.0) after the Great East Japan Earthquake. It is related to 1st stage study for construction of data sets and made up the data processing techniques through the various experiments to upgrade the accuracy. Based on the results of the study, we calculated the initial precise coordinates of the EAREF network from the 2012.0 epoch covering the East-Asia region. The accuracy of the estimated coordinates was compared with the weekly solution provided by the IGS analysis centre. The differences were 0.004m, 0.007m and 0.009m at the directions of X, Y and Z respectively. In addition, this study reviews the next procedure how to implement and upgrade the EAREF network.

Analysis of Water Distribution Network using Digital Data in Agricultural Watershed (농업용수 디지털 정보를 활용한 용수공급 네트워크 분석)

  • Shin, Ji-Hyeon;Nam, Won-Ho;Yoon, Dong-Hyun;Yang, Mi-Hye;Jung, In-Kyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.510-511
    • /
    • 2022
  • 물관리기본법의 시행 및 제1차 국가물관리기본계획의 이행에 따라 물관리 자료의 정보화 요구가 증가하고 있다. 과거 농업용수관리는 기초자료의 오류, 계측데이터의 부족 등이 한계점으로 지적되었으며, 과학화·표준화된 농업용수 물수급 분석 체계 구축 및 물정보의 정확성이 요구된다. 최근 통합물관리 국가정책 대응을 위한 물수급 분석 기반 마련을 목적으로 한국농어촌공사에서는 농업용수 용 배수 계통 정밀조사, 공간자료 재구축 등을 통한 농업용수 디지털 정보체계 구축 사업이 진행되고 있다. 연속수치지형도 및 토지피복, 스마트팜맵 등의 디지털 공간자료를 수집하고 현장조사와 영농조사를 바탕으로 최신화된 용배수계통도, 수혜면적 자료를 구축하였다. 본 연구에서는 디지털화한 용배수계통도를 이용하여 수리해석 모델 기초자료를 구축하고, 들녘단위 (주·보조수원, 저수지 및 양수장 등) 용수계통도 구현함으로써 수원공별 용수공급 네트워크를 분석하고자 한다. 농업용수 공급체계 반영이 가능한 EPA-SWMM (United States Environmental Protection Agency Storm Water Management Model)을 활용하여 다양한 물공급 시나리오를 적용하여 최적의 물관리 방안을 제시하고자 한다. 본 연구에서는 경기도 안성시 고삼저수지를 대상으로 연속수치지형도, 농경지전자지도, 고해상도 DEM 등을 활용한 디지털 조사와 수로 표고, 길이 및 너비 등 현장조사를 수행하였으며, 현장 물관리 방안을 적용하여 물분배 모의가 가능한 EPA-SWMM 기반 수원공-용수로-수혜구역을 연결하는 용수공급 네트워크를 구축하였다. 농촌용수종합정보시스템 (Rural Agricultural Water Resource Information System, RAWRIS)에서 제공하는 계측 자료를 활용하여 관개기간의 강수량, 소비수량, 증발산량, 공급량 등을 적용하여 농업용수 공급량, 배분량을 추정하였다. 본 연구의 결과는 물관리 담당자에게 상세한 현행 용수공급량 및 용수공급체계 정보 제공과 향후 국가물관리기본계획, 농어촌용수이용합리화계획의 물수급 분석 기초자료로 활용 가능할 것으로 사료된다.

  • PDF

A Study on the Improvement of IoT Network Performance Test Framework using OSS (개방형 SW를 이용한 IoT 네트워크 성능시험기 개선에 관한 연구)

  • Joung Youngjun;Jeong Yido;Lee SungHwa;Kim JinTae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.97-102
    • /
    • 2023
  • This study is to provide improvement of tester for IoT system, which has recently become diversified and large-scale and It is about a method to improve the packet processing performance of the tester and securing flexibility in traffic protocol creation and operation. The purpose of this study is to design a OSS DPDK-based high-speed IoT network performance test system, which pre-verifies and measures the performance of data traffic transmission in an increasingly sophisticated high-capacity IoT network system. The basic structure of the high-speed IoT performance tester was designed using a DPDK-based traffic generator, the expected effect was suggested to traffic modeling and packet generation capability when the system was applied through experiments

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

TeGCN:Transformer-embedded Graph Neural Network for Thin-filer default prediction (TeGCN:씬파일러 신용평가를 위한 트랜스포머 임베딩 기반 그래프 신경망 구조 개발)

  • Seongsu Kim;Junho Bae;Juhyeon Lee;Heejoo Jung;Hee-Woong Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.419-437
    • /
    • 2023
  • As the number of thin filers in Korea surpasses 12 million, there is a growing interest in enhancing the accuracy of assessing their credit default risk to generate additional revenue. Specifically, researchers are actively pursuing the development of default prediction models using machine learning and deep learning algorithms, in contrast to traditional statistical default prediction methods, which struggle to capture nonlinearity. Among these efforts, Graph Neural Network (GNN) architecture is noteworthy for predicting default in situations with limited data on thin filers. This is due to their ability to incorporate network information between borrowers alongside conventional credit-related data. However, prior research employing graph neural networks has faced limitations in effectively handling diverse categorical variables present in credit information. In this study, we introduce the Transformer embedded Graph Convolutional Network (TeGCN), which aims to address these limitations and enable effective default prediction for thin filers. TeGCN combines the TabTransformer, capable of extracting contextual information from categorical variables, with the Graph Convolutional Network, which captures network information between borrowers. Our TeGCN model surpasses the baseline model's performance across both the general borrower dataset and the thin filer dataset. Specially, our model performs outstanding results in thin filer default prediction. This study achieves high default prediction accuracy by a model structure tailored to characteristics of credit information containing numerous categorical variables, especially in the context of thin filers with limited data. Our study can contribute to resolving the financial exclusion issues faced by thin filers and facilitate additional revenue within the financial industry.

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.

A Study on the CD ROM Network(LAN) (CD-ROM 네트워크(LAN)에 관한 소고(小考))

  • Kil, Hyung-Do
    • Journal of Information Management
    • /
    • v.21 no.2
    • /
    • pp.9-23
    • /
    • 1990
  • CD-ROM technique, not more than 10 years after development, goes through rapid growth, has been taken advantage of several practical application parts. Needless to say about bibliographic data, numeric value, the phonetics, an image and a picture data that are recorded as abstract or full text, and offered and applied to industry, information service including library, it can be used for library staffs, information retrieval. Escape from the need of one disc drive and one computer to access one disc, now we organize an ideal system that can be retrieved several CD-ROM used only one drive, several users can access several information, so networking is possible through LAN. In this article, we studied the function and type, characteristics, system, structure, data block, production procedure, standardization of CD-ROM LAN.

  • PDF

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.