• Title/Summary/Keyword: 물리망

Search Result 573, Processing Time 0.025 seconds

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Virtual Environment Interfacing based on State Automata and Elementary Classifiers (상태 오토마타와 기본 요소분류기를 이용한 가상현실용 실시간 인터페이싱)

  • Kim, Jong-Sung;Lee, Chan-Su;Song, Kyung-Joon;Min, Byung-Eui;Park, Chee-Hang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3033-3044
    • /
    • 1997
  • This paper presents a system which recognizes dynamic hand gesture for virtual reality (VR). A dynamic hand gesture is a method of communication for human and computer who uses gestures, especially both hands and fingers. Since the human hands and fingers are not the same in physical dimension, the produced by two persons with their hands may not have the same numerical values where obtained through electronic sensors. To recognize meaningful gesture from continuous gestures which have no token of beginning and end, this system segments current motion states using the state automata. In this paper, we apply a fuzzy min-max neural network and feature analysis method using fuzzy logic for on-line pattern recognition.

  • PDF

A Study of Repeater Effect Adjustment Algorithm in CDMA Indoor Positioning System (CDMA 기반의 실내 측위 시스템을 위한 중계기 보정 알고리즘에 관한 연구)

  • Choi, Hee-Dong;Kim, Sun-Mi;Choi, Jeong-Hee;Park, Yong-Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.605-612
    • /
    • 2008
  • This paper researches the estimating location using repeater effect adjustment method in CDMA based system. Repeaters are commonly used by commercial and amateur radio operators to extend signals in the radio frequency range from one receiver to another. The repeater signals are increasing arrival time from base station to mobile station. So if we calculates the mobile station using repeater signals, the estimating position error is increased. However nobody researched about adjusting repeater effects. This paper proposes repeater effect adjustment algorithm. For adjusting repeater effects, we make the triangle using mobile station, reference base station and neighbor base station, and then detect the repeater effects using the triangle characteristic. The proposed method system showed the improved performance in estimating parameters and locating positions by computer simulations.

Turing's Cognitive Science: A Metamathematical Essay for His Centennial (튜링의 인지과학: 튜링 탄생 백주년을 기념하는 메타수학 에세이)

  • Hyun, Woo-Sik
    • Korean Journal of Cognitive Science
    • /
    • v.23 no.3
    • /
    • pp.367-388
    • /
    • 2012
  • The centennial of Alan Mathison Turing(23 June 1912 - 7 June 1954) is an appropriate occasion on which to assess his profound influence on the development of cognitive science. His contributions to and attitudes toward that field are discussed from the metamathematical perspective. This essay addresses (i)Turing's mathematical analysis of cognition, (ii)universal Turing machines, (iii)the limitations of universal Turing machines, (iv)oracle Turing machine beyond universal Turing machine, and (v)Turing test for cognitive science. Turing was a ground-breaker, eager to move on to new fields. He actually opened wider the scientific windows to the mind. The results show that first, by means of mathematical logic Turing discovered a new bridge between the mind and the physical world. Second, Turing gave a new formal analysis of operations of the mind. Third, Turing investigated oracle Turing machines and connectionist network machines as new models of minds beyond the limitations of his own universal machines. This paper explores why the cognitive scientist would be ever expecting a new Turing Test on the shoulder of Alan Turing.

  • PDF

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

Discovery of Sub-pc Scale Plasma Torus in the Nearby Radio Galaxy 3C 84 with the KVN and VERA Array (KaVA)

  • Wajima, Kiyoaki;Kino, Motoki;Kawakatu, Nozomu
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.2
    • /
    • pp.32.4-33
    • /
    • 2016
  • 활동성은하핵(AGN)의 거대 블랙홀 주변에 존재하는 플라스마 디스크의 구조나 물리적인 상태를 관측으로 직접 찾는 것은 AGN 중심부분에서의 제트 형성, 방출과정이나 에너지 수송과정을 조사하기 위해 중요한다. 지금껏 주로 센치미터파장 영역의 다주파 VLBI 관측으로 우리은하에서 가까운 AGN 속에 존재하는 10 pc 정도의 플라스마 디스크가 발견되어 있다만, AGN의 활동성을 정하고 있는 1 pc 이하의 스케일에서의 디스크 구조를 직접 관측한 결과는 아직 없다. 우리는 2015년8월부터 KVN 및 KVN과 일본 VERA로 구성되는 한일공동 VLBI 관측망(KaVA)을 이용해서 전파 은하 3C 84(z = 0.0176, 1 mas = 0.36 pc)의 밀리미터파장 모니터링을 진행하고 있다. KVN과 KaVA를 이용하면 1 pc 이하의 스케일로 3C 84의 중심구조를 고감도에서 분해할 수 있다. 이번 발표에서는 KVN 및 KaVA로 거의 동시에 실시한 관측결과를 중심으로 보고한다. 관측은 2016년2월22일(KaVA 43 GHz) 및 23일(KVN 86 GHz)에 실시되었다. 양 주파수의 이미지에서 종래의 센치미터 ~ 밀리미터파장 VLBI관측으로도 검출되어 있는 중심핵(C1) 및 남쪽에 약 3 mas 떨어져서 위치하는 로브(C3) 성분 뿐만 아니라 C1으로부터 북쪽에 약 2.5 mas 떨어져서 위치하는 새로운 성분(N1)을 검출하였다. N1의 검출 수준은 43, 86 GHz 모두 $6{\sigma}$이며, 양 주파수 사이에서 광학적으로 두꺼운 스펙트럼을 가지고 있다. 과거의 관측으로 측정된 C3의 겉보기 속도는 빛의 속도의 약 23%이며, 남북 로브의 구조와 운동의 대칭을 가정하면 N1이 도플러 분사출 효과 때문에 어두워지고 있는 가능성은 낮다. 따라서 C3에 대응하는 북쪽 N1로브로부터의 복사가 블랙홀 주변의 플라스마 디스크로 인해 저주파수에서 강한 흡수를 받고 있는 결과고 생각된다.

  • PDF

A GateSensor for Effective and Efficient Entering/Taking Management of Vehicles for Construction Logistics (건설 자재 반출입 차량 관리 효율화를 위한 게이트센서)

  • Yoon, Su-Won;Song, Jae-Hong;Shin, Tae-Hong;Chin, Sang-Yoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.1
    • /
    • pp.85-96
    • /
    • 2011
  • The access monitoring and control system of vehicles involved in construction logistics has been evolved from paper-based through bar code-based and to RFID-based management with pursuing automatic data collection and management. However, existing management methods have a limit that they still need manpower allocation for access control of vehicles. Therefore this research has proposed an framework that includes devices and an information system for effective and efficient data collection for access control of vehicles for construction logistics. And the proposed framework has been verified through a laboratory test using a prototype system developed in this research. It is expected that the installation methods of RFID antenna and tag for the framework could be applied to not only the access control of construction site but also various RFID applications at construction sites.

A Hierarchical Preamble Design Technique for Efficient Handover in OFDM-based Multi-hop Relay Systems (OFDM 기반 다중 홉 릴레이시스템에서 효율적인 핸드오버를 위한 계층적 프리앰블 설계 기법)

  • Yoo, Hyun-Il;Kim, Yeong-Jun;Woo, Kyung-Soo;Kim, Jae-Kwon;Yun, Sang-Boh;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.342-351
    • /
    • 2008
  • In this paper, a new handover procedure for OFDM-based multi-hop relay systems is proposed to reduce the handover overhead by distinguishing inter-cell handover event from intra-cell handover event at the level of physical layer using a hierarchical design concept of preamble. A Subcell ID concept for identifying RS in a cell is proposed in the design of hierarchical manner, in addition to the existing Cell ID for identifying BS. The decision on either inter-cell handover or intra-cell handover is made by the signal quality measure of CBINR(Carrier of BS to Interference and Noise Ratio) and CRINR(Carrier of RS to Interference and Noise Ratio), provided by the hierarchical preamble. The proposed handover procedure can simplify scanning procedure and skip/simplify network re-entry procedure (capability negotiation, authorization, registration), resulting in a significant reduction of handover overhead.

Estimation of User Activity States for Context-Aware Computing in Mobile Devices (모바일 디바이스에서 상황인식 컴퓨팅을 위한 사용자 활동 상태 추정)

  • Baek Jonghun;Yun Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.1 s.307
    • /
    • pp.67-74
    • /
    • 2006
  • Contort-aware computing technology is one of the key technology of ubiquitous computing in the mobile device environment. Context recognition computing enables computer applications that automatically respond to user's everyday activity to be realized. In this paper, We use accelerometer could sense activity states of the object and apply to mobile devices. This method for estimating human motion states utilizes various statistics of accelerometer data, such as mean, standard variation, and skewness, as features for classification, and is expected to be more effective than other existing methods that rely on only a few simple statistics. Classification algorithm uses simple decision tree instead of existing neural network by considering mobile devices with limited resources. A series of experiments for testing the effectiveness of the our context detection system for mobile applications and ubiquitous computing has been performed, and its result is presented.

Analytical Methodology of Stable Isotopes Ratios: Sample Pretreatment, Analysis and Application (안정동위원소비 분석 기법의 이해: 시료의 전처리, 분석 및 자료의 해석과 적용)

  • Kim, Min-Seob;Hwang, Jong-Yeon;Kwon, Oh-Sang;Lee, Won-Seok
    • Korean Journal of Ecology and Environment
    • /
    • v.46 no.4
    • /
    • pp.471-487
    • /
    • 2013
  • This review paper was written to provide background information as well as future application for aquatic ecologists interested in using stable isotope. Stable isotope techniques has proved to be an extremely useful to elucidate a lot of environmental and ecological problems. Stable isotopes have been used as possible tracers to identify sources, to quantify relative inputs in a system. When utilized carefully, stable isotope tools provides apparent advantages for the scientists to find out the processes of material cycles in various environments and energy flows in natural ecosystems.