• Title/Summary/Keyword: 소프트웨어 복제도

Search Result 121, Processing Time 0.026 seconds

Development of Functional USB Solution to Contain Executable Software Using Scanning Mechanism (스캐닝 기법을 이용한 실행 소프트웨어를 담을 수 있는 기능성 USB 솔루션 개발)

  • Kim, Nam-Ho;Hwang, Bu-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.947-952
    • /
    • 2012
  • The technology suggested in this study is the method to contain executable software in a portable storage devices like the USB and install an application program to operate it in any client devices. To solve this problem, we can store pre-scanned information on the above client's files, registry, and services in the device before installing the proper application program to be installed using the scanning method and manage in the USB the resources that generated and changed by post-scanning the information after installing the above application program in the client's device. After that, necessary files in the client to be used can be copied for using, and after use, related files are deleted, and it also includes the process to return to the previous system environment. This method is advantageous in that once any sort of application programs needed to be installed gets to be installed in an external portable storage devices like the USB, the application program installed can be operated in any computer not raising any issues like illegal copy.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

Database Transaction Routing Algorithm Using AOP (AOP를 사용한 데이터베이스 트랜잭션 라우팅 알고리즘)

  • Kang, Hyun Sik;Lee, Sukhoon;Baik, Doo-Kwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.11
    • /
    • pp.471-478
    • /
    • 2014
  • Database replication is utilized to increase credibility, availability and prevent overload of distributed databases. Two models currently exist for replication - Master/Slave and Multi-Master. Since the Multi-Master model has problems of increasing complexity and costs to interface among multiple databases for updates and inserts, the Master/Slave model is more appropriate when frequent data inserts and updates are required. However, Master/Slave model also has a problem of not having exact criteria when systems choose to connect between Master and Slave for transactions. Therefore, this research suggests a routing algorithm based on AOP (Aspect Oriented Programming) in the Master/Slave database model. The algorithm classifies applications as cross-cutting concerns based on AOP, modularizes each concern, and routes transactions among Master and Slave databases. This paper evaluates stability and performance of the suggested algorithm through integration tests based on scenarios.

Implementation of High Performance Overlay Multicast Packet Forwarding Engine On NetFPGA (NetFPGA를 이용한 고성능 오버레이 멀티캐스트 패킷 전송 엔진 구현)

  • Jeon, Hyuk-Jin;Lee, Hyun-Seok;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.6
    • /
    • pp.9-17
    • /
    • 2012
  • High-quality multimedia on the Internet has attracted attention because of its wide application area. IP multicast has been proposed as a solution to use efficient network resources in these services. However, IP multicast has not been commonly used due to a number of practical issues such as security and management. As an alternative, an overlay multicast routing which is performed in upper protocol layers on legacy networks without changing hardware has been presented. Yet, the maximum data transmission capacity of the overlay multicast is not sufficient for real time transmission of multimedia data. In this paper, we have implemented an overlay multicast engine on NetFPGA which allows us to perform packet replication and tunneling which need high-speed. In addition, we have implemented extra portions which need low-speed in software. From now on, we will progress research which increase the number of terminal spots which can be replicated by improvement and amplify throughputs by optimization.

Design and Implementation of eBPF-based Virtual TAP for Inter-VM Traffic Monitoring (가상 네트워크 트래픽 모니터링을 위한 eBPF 기반 Virtual TAP 설계 및 구현)

  • Hong, Jibum;Jeong, Seyeon;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.26-34
    • /
    • 2018
  • With the proliferation of cloud computing and services, the internet traffic and the demand for better quality of service are increasing. For this reason, server virtualization and network virtualization technology, which uses the resources of internal servers in the data center more efficiently, is receiving increased attention. However, the existing hardware Test Access Port (TAP) equipment is unfit for deployment in the virtual datapaths configured for server virtualization. Virtual TAP (vTAP), which is a software version of the hardware TAP, overcomes this problem by duplicating packets in a virtual switch. However, implementation of vTAP in a virtual switch has a performance problem because it shares the computing resources of the host machines with virtual switch and other VMs. We propose a vTAP implementation technique based on the extended Berkeley Packet Filter (eBPF), which is a high-speed packet processing technology, and compare its performance with that of the existing vTAP.

Methods to Enhance Service Scalability Using Service Replication and Migration (서비스 복제 및 이주를 이용한 서비스 확장성 향상 기법)

  • Kim, Ji-Won;Lee, Jae-Yoo;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.7
    • /
    • pp.503-517
    • /
    • 2010
  • Service-oriented computing, the effective paradigm for developing service applications by using reusable services, becomes popular. In service-oriented computing, service consumer has no responsibility for managing services, just invokes services what service providers are producing. On the other hand, service providers should manage any resources and data for service consumers can use the service anytime and anywhere. However, it is hard service providers manage the quality of the services because an unspecified number of service consumers. Therefore, service scalability for providing services with higher quality of services specified in a service level agreement becomes a potential problem in service-oriented computing. There have been many researches for scalability in network, database, and distributed computing area. But a research about a definition of service scalability and metrics of measuring service scalability is still not mature in service engineering area. In this paper, we construct a service network which connects multiple service nodes, and integrate all the resources to manage it. And we also present a service scalability framework for managing service scalability by using a mechanism of service migration or replication. In section 3, we, firstly, present the structure of the scalability management framework and basic functionalities. In section 4, we propose scalability enhancement mechanism which is needed to release functionality of the framework. In section 5, we design and implement the framework by using proposed mechanism. In section 6, we demonstrate the result of our case study which dynamically manages services in multi-nodes environment by applying our framework. Through the case study, we show the applicability of our scalability management framework and mechanism.

Migration Mechanism Supporting Eficient Fault-Tolerance on Agent Platform (에이전트 플랫폼에서의 효율적인 결함-허용을 제공하는 이주 기법)

  • Seo, Dong-Min;Yun, Jong-Hyeon;Yeo, Myung-Ho;Yoo, Jae-Soo;Cho, Ki-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.9
    • /
    • pp.89-99
    • /
    • 2007
  • With the development of the internet technology, network application services based on a large number of network nodes have been focused. However, such application services require much larger network size and traffic than current network. In order to develop them, efficient solutions as well as a simple improvement of network infra processing time are required. In this paper, to contribute a improvement of network computing technology, we design and implement the agent platform software based on the agent technology that performs works independently and asynchronously on a network and platform. The proposed agent platform software supports the scalability to accommodate the number of network hosts with rapid growth, the adaptability on a variable environments, and the availability for a fault-tolerance.

A Study on How to Build a Disaster Recovery System that can Minimize Recovery Time Objective(RTO) and Recovery Point Objective(RPO) to Ensure Business Continuity (비즈니스 연속성 보장을 위한 복구 시간 목표(RTO) 및 복구 지점 목표(RPO)를 최소화할 수 있는 재해복구시스템 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.91-99
    • /
    • 2021
  • In the current business environment where dependence on IT has increased rapidly, the risk from disasters or cyber-attacks is also increasing. Business continuity, the ability to continue to provide service in the event of a business disruption caused by a disaster, is essential. In other words, you need to have a plan in place to keep your core business functions uninterrupted with rapid recovery within a predetermined Recovery Time Objective (RTO) and Recovery Point Objective (RPO) time frame. In this paper, we propose a disaster recovery system construction method that can minimize RTO and RPO to ensure business continuity. The system configuration adopts Tier 7 disaster recovery model, synchronous storage replication, hot disaster recovery site, and operation management automation solution. This ensures continuity of core business with virtually no data loss and minimal RTO and RPO.

Country Clustering Based on Environmental Factors Influencing on Software Piracy (소프트웨어 불법복제에 영향을 미치는 환경 요인에 기반한 국가 분류)

  • Suh, Bomil;Shim, Junho
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.227-246
    • /
    • 2017
  • Purpose: As the importance of software has been emphasized recently, the size of the software market is continuously expanding. The development of the software market is being adversely affected by software piracy. In this study, we try to classify countries around the world based on the macro environmental factors, which influence software piracy. We also try to identify the differences in software piracy for each classified type. Design/methodology/approach: The data-driven approach is used in this study. From the BSA, the World Bank, and the OECD, we collect data from 1990 to 2015 for 127 environmental variables of 225 countries. Cronbach's ${\alpha}$ analysis, item-to-total correlation analysis, and exploratory factor analysis derive 15 constructs from the data. We apply two-step approach to cluster analysis. The number of clusters is determined to be 5 by hierarchical cluster analysis at the first step, and the countries are classified by the K-means clustering at the second step. We conduct ANOVA and MANOVA in order to verify the differences of the environmental factors and software piracy among derived clusters. Findings: The five clusters are identified as underdeveloped countries, developing countries, developed countries, world powers, and developing country with large market. There are statistically significant differences in the environmental factors among the clusters. In addition, there are statistically significant differences in software piracy rate, pirated value, and legal software sales among the clusters.

Secure Group Communication Scheme for e-Commerce Based on Mobile Agents (이동에이전트 기반의 전자상거래를 위한 안전한 그룹통신 기법)

  • Cho, Hyun-Jin;Kim, Gu -Su;Eom, Young-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.487-490
    • /
    • 2005
  • 이동 에이전트란 어떠한 동작을 수행하는 명령과 자신의 상태 정보를 포함하는 자율적인 소프트웨어 객체이다. 이동 에이전트는 자율적으로 이동할 수 있으며 복제와 증식이 가능하고 사용자의 업무를 대신해서 수행할 수 있다는 장점으로 인해 전자상거래에서 사용자를 대신하여 상품 검색 및 구매에 사용될 수 있다. 이 때 다수의 이동 에이전트가 하나의 그룹이 되어 서로 메시지를 주고받으며 사용자의 요구사항을 수행한다. 이동 에이전트간 전달되는 메시지는 상품의 정보뿐 아니라 사용자 또는 에이전트의 비밀정보가 될 수 있다. 악의를 가진 외부 개체로부터 그룹 멤버쉽이나 메시지가 변경된다면 이동 에이전트 그룹은 사용자가 의도하지 않는 동작을 수행할 수 있다. 본 논문에서는 이러한 공격을 방어하기 위해 그룹 멤버간 암호화 통신을 할 수 있는 그룹 세션키 생성 기법을 제안한다. 기존 기법과는 달리 본 논문에서는 중앙 키 분배 서버 없이 그룹에 참가하는 이동 에이전트 각자 그룹 세션키를 생성한다. 또한 키 갱신을 주기적으로 수행함으로써 외부 개체로부터 그룹 세션키의 습득을 어렵게 한다.

  • PDF