• Title/Summary/Keyword: 시스템 콜

Search Result 172, Processing Time 0.028 seconds

Effective Backup and Real-Time Replication Techniques for HSS System in All-IP Mobile Networks (All-IP 이동 통신망에서 HSS 시스템의 효과적인 백업과 실시간 이중화 기법)

  • Park, Seong-Jin;Park, Hyung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.795-804
    • /
    • 2009
  • An HSS(Home Subscriber Server) system requires a main-memory database on main-memory unit for the real-tine management of the subscriber information in the mobile communication service, in that the system controls not only basic data for handling calls of users, but also additional service data related to user authentication and operational data. Nonetheless, HSS-DBS system, requiring the reliability and stability, need more secure data store method and a back-up technique because the system have a long startup time and the big problem on the failures of main-memory. This paper proposes an efficient back-up replication technique, on the basis of enhancing the stability and performance of HSS system. The proposed shadowing back-up technique adopting the delayed recovery process, can help minimize the real-time back-up overloads by location registration, while the proposed backup replication method enables more stable system operations with replicating the data to remote server in real time.

Cooperative Transmission Scheme for OFDMA Based Enterprise Femtocell Networks (OFDMA 기반의 기업형 펨토셀 네트워크를 위한 협력 통신 기법)

  • Kim, Seung-Yeon;Lee, Sang-Joon;Ryu, Seung-Wan;Cho, Choong-Ho;Lee, Hyong-Yoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.338-347
    • /
    • 2012
  • In this paper, we propose the cooperative transmission scheme (CTS) for system throughput maximization in OFDMA based enterprise femtocell networks. In our scheme, the user equipment (UE) can receive the desired signal from serving femtocell BS (fBS) as well as an adjacent fBS. Thus, UE achieves an improved signal to interference plus and noise ratio (SINR) by the synchronized two signals. The performances of this strategy consider not only the call-level quality of service (QoS) but also the packet-level QoS. We first measure the call blocking probability and utilization for the downlink resources for various offered load in femtocell. Based on that, the outage probability and effective throughput of the system are simulated. Simulation results show that the proposed scheme can reduce the outage probability for enterprise femtocell compared with conventional systems.

Generation of Finite Automata for Intrusion Detection (침입탐지를 위한 유한상태기계의 생성 기법)

  • Lim, Young-Hwan;Wee, Kyu-Bum
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.119-124
    • /
    • 2003
  • Although there have been many studies on using finite automata for intrusion detection, it has been a difficult problem to generate compact finite automata automatically. In a previous research an approach to profile normal behaviors using finite automata was proposed. They divided the system call sequence of each process into three parts prefix, main portion, and suffix, and then substituted macros for frequently occurring substrings. However, the procedure was not automatic. In this paper we present algorithms to automatically generate intrusion detection automata from the sequence of system calls resulting from the normal runs of the programs. We also show the effectiveness of the proposed method through experiments.

발명하는 사람들-제48호

  • Han, Mi-Yeong
    • The Inventors News
    • /
    • no.48
    • /
    • pp.1-16
    • /
    • 2006
  • 축사/발명 유비쿼터스 선도하는 언론 지향/'발명하는 사람들' 창간 4주년 맞다/'발명하는 사람들' 창간 4주년을 축하합니다/반도체 공정분야 특허 출원 급증/운동화에도 웰빙 바람/공기청정기 특허출원 꾸준한 증가/차세대 반도체 특허, 회로.응용 분야에 집중/맥주, 이제 병이 아닌 플라스틱 용기에/특허고객콜센터, 품질인증 획득/특허청,'찾아가는 특허검색서비스' 제공/직무발명보상 개정법 관련 세미나/'쟁점별 특허소송 가이드북'제작/특허청 연구회, 고객감동 경영의 밑거름/한국특허정보원,2006 한국서비스대상 공공부문 대상 수상/현대차, 특허침해 찾으면 로열티 10% 지급/나이키 짝퉁, 한해 3백60만 켤레 적발/특허청, 자동차부품연구원과 업무협약/휴대용 포토 프린터 특허 출원 증가/역사 속의 발명품/하루 10분 발명교실/특허Q&A/한국여성발명협회 13년 발자취/미니인터뷰/이공계 대학교수 대상 특허정보 세미나 개최/실용신안 등록출원, 우선심사 대상 확대/자료 수집을 소홀히 마라/특허청 간부진, 고객 현장 속으로/삼성, 중국 저명상표로/포스코, 특허시스템 가동/도미다의 원너 커트/월마트, 짝퉁 '펜디' 판매로 망신살/일본, '지적재산권 입국' 계획 마련/미국-유럽연합, 짝퉁 퇴치 나선다/특허청, 자체 브랜드 '특허로' 첫상표출원/인청 부평지식재산센터, 발명가 초청강연회 개최/'2006 피츠버그 국제전' 에서 국내 발명가 수상/세계 최고 4대 건강식품/특허법원, 책 제목 출판사 소유로/한국여성발명협회 회원사 발명품 가이드/'2006년 여대생 발명캠프'/

  • PDF

Protective Mechanism for Sensitive Data using Lightweight Process Tracking (경량화 프로세스 추적을 통한 중요 데이터 유출 방지)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.33-39
    • /
    • 2009
  • As the usage of computers and mobile handsets is popularized, the processing and storing of private and business data are increased. Hence we note that these sensitive data should never be transferred out of these personal devices without user's permission. In this paper, we propose a simple method to prevent transferring the sensitive data out of personal computing devices through their networking interfaces. The proposed method determines which processes invoke open system call related to the sensitive data, and then traces them within a specific duration. The proposed scheme has advantage over the existing ones using authentication or encryption because it could be still working well independent upon the new attack technologies or the latest vulnerabilities of hardware and software. In order to verify the proposed algorithm, we test it by implementing the necessary codes at the user and kernel spaces of Linux.

Malicious Application Determination Using the System Call Event (시스템 콜 이벤트 분석을 활용한 악성 애플리케이션 판별)

  • Yun, SeokMin;Ham, YouJeong;Han, GeunShik;Lee, HyungWoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.169-176
    • /
    • 2015
  • Recently smartphone market is rapidly growing and application market has also grown significantly. Mobile applications have been provided in various forms, such as education, game, SNS, weather and news. And It is distributed through a variety of distribution channels. Malicious applications deployed with malicious objectives are growing as well as applications that can be useful in everyday life well. In this study, Events from a malicious application that is provided by the normal application deployment and Android MalGenome Project through the open market were extracted and analyzed. And using the results, We create a model to determine whether the application is malicious. Finally, model was evaluated using a variety of statistical method.

Malware Classification Possibility based on Sequence Information (순서 정보 기반 악성코드 분류 가능성)

  • Yun, Tae-Uk;Park, Chan-Soo;Hwang, Tae-Gyu;Kim, Sung Kwon
    • Journal of KIISE
    • /
    • v.44 no.11
    • /
    • pp.1125-1129
    • /
    • 2017
  • LSTM(Long Short-term Memory) is a kind of RNN(Recurrent Neural Network) in which a next-state is updated by remembering the previous states. The information of calling a sequence in a malware can be defined as system call function that is called at each time. In this paper, we use calling sequences of system calls in malware codes as input for malware classification to utilize the feature remembering previous states via LSTM. We run an experiment to show that our method can classify malware and measure accuracy by changing the length of system call sequences.

A Stable Random Access Protocol For A Computer Network (안정된 컴퓨터 통신망을 위한 임의 접근 프로토콜)

  • Lee, Sang-Geon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.515-522
    • /
    • 1997
  • A neat prefect stable random access protocol for a broadcast channel,the distributed queuing random access protocol(DQRAP)is presented and evaluated.The DQRAP prootcol utilizes minisolts to provide termaty chan-nel feedback and two distributed queues to:9a) resolve contention and (b) to schedute the transmission of messages.Three minislots are sufficient to resolve collisions faster than the tranmission times of all inboled mecages.Three minislots are suffcient to resolve collisions faster than the tranmission times of all inbolved arrivals when ternary minislot feedback is used.Modelingand simulation indicate that the DQRAP protocol, using as few as three minislits,achives a performance level which approaches that of hypothetical perfect cheduling protocol,ie,the M/D/I system,with respect to propagation delay,thus offers the potential of improved performance over current protocols in satellite,metropolitan and packet radio networks.

  • PDF

Development of the Hybrid embedded IP-PBX (하이브리드 임베디드 IP-PBX 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.83-89
    • /
    • 2011
  • Nowadays, Internet Telephony Services based on SIP are gaining an explosive increase for general user. Thus a various demands of the user about convenience of IP-PBX are growing. The most important requirements of these is hybrid IP telephony system which is connected not only internet telephone but also general PSTN telephone. Therefore, in this paper, we have developed Hybrid IP-PBX connected all type of telephony terminals for small office. We have developed FXS module for connecting all type and FXO for using PSTN telephone number also. This Hybrid IP-PBX that is can be connected Soft-phone provide various optional services. We measured voice quality and test simultaneous calling for proof of validity.

iCaMs: An Intelligent System for Anti Call Phishing and Message Scams (iCaMs: 안티 콜 피싱 및 메시지 사기를 위한 지능형 시스템)

  • Tran, Manh-Hung;Yang, Hui-Gyu;Dang, Thien-Binh;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.156-159
    • /
    • 2019
  • The damage from voice phishing reaches one trillion won in the past 5 years following report of Business Korea on August 28, 2018. Voice phishing and mobile phone scams are recognized as a top concern not only in Korea but also in over the world in recent years. In this paper, we propose an efficient system to identify the caller and alert or prevent of dangerous to users. Our system includes a mobile application and web server using client and server architecture. The main purpose of this system is to automatically display the information of unidentified callers when a user receives a call or message. A mobile application installs on a mobile phone to automatically get the caller phone number and send it to the server through web services to verify. The web server applies a machine learning to a global phone book with Blacklist and Whitelist to verify the phone number getting from the mobile application and returns the result.