• Title/Summary/Keyword: 자동로그인

Search Result 117, Processing Time 0.022 seconds

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

Real time Storage Manager to store very large datausing block transaction (블록 단위 트랜잭션을 이용한 대용량 데이터의 실시간 저장관리기)

  • Baek, Sung-Ha;Lee, Dong-Wook;Eo, Sang-Hun;Chung, Warn-Ill;Kim, Gyoung-Bae;Oh, Young-Hwan;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.2
    • /
    • pp.1-12
    • /
    • 2008
  • Automatic semiconductor manufacture system generating transaction from 50,000 to 500,000 per a second needs storage management system processing very large data at once. A lot of storage management systems are researched for storing very large data. Existing storage management system is typical DBMS on a disk. It is difficult that the DBMS on a disk processes the 500,000 number of insert transaction per a second. So, the DBMS on main memory appeared to use memory. But it is difficultthat very large data stores into the DBMS on a memory because of limited amount of memory. In this paper we propose storage management system using insert transaction of a block unit that can process insert transaction over 50,000 and store data on low storage cost. A transaction of a block unit can decrease cost for a log and index per each tuple as transforming a transaction of a tuple unit to a block unit. Besides, the proposed system come cost to decompress all block of data because the information of each field be loss. To solve the problems, the proposed system generates the index of each compressed block to prevent reducing speed for searching. The proposed system can store very large data generated in semiconductor system and reduce storage cost.

  • PDF

An Intelligent Image Retrieval System using XML (XML을 이용한 지능형 이미지 검색 시스템)

  • 홍성용;나연묵
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.132-144
    • /
    • 2004
  • With the rapid development of internet technology, the number of internet users and the amount of multimedia information on the internet is ever increasing. Recently, the web sites, such as e-business sites and shopping mall sites, deal with lots of image information. As a result, it is required to support content- based image retrieval efficiently on such image data. This paper proposes an intelligent image retrieval system, which adopts XML, technology. To support object-based col)tent retrieval on product catalog images containing multiple objects, we describe a multi -level metadata structure which represents the local features, global features, and semantics of image data. To enable semantic-based and content-based retrieval on such image data, we design a XML-Schema for the proposed metadata and show how to represent such metadata using XML- documents. We also describe how to automatically transform the retrieval results into the forms suitable for the various user environments, such as web browser or mobile browser, using XSLT The proposed scheme can be easily implemented on any commercial platforms supporting XML technology. It can be utilized to enable efficient image metadata sharing between systems, and it will contribute in improving the retrieval correctness and the user's satisfaction on content-based e-catalog image retrieval.

  • PDF

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

A Study on the Information Management of Construction Workers Using Smartmaker of Site Safety Management Supervisor (현장 안전관리 감독자의 smartmaker 를 활용한 건설현장 근로자 정보 관리의 관한 연구)

  • Kim, Sung-hyun;Lee, Ji-yeob;Son, Kiyoung
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.3 no.1
    • /
    • pp.32-40
    • /
    • 2020
  • In this study, an application was developed to reduce the work between labor and safety managers and to hire better workers when hiring workers. With the expected increase in foreign workers in the future, the number of illegal workers will also increase. As a result, accident and on-site management are becoming more difficult due to insufficient information collection of workers. Therefore, it was possible to secure on-site safety through an application that could collect accurate information and reduce the time of information exchange between safety managers and labor managers. In addition, the application was designed to help the safety manager identify the faithful workers more quickly when re-employment of the day laborers if many day laborers were assessed and filled out as they were. This anticipates the expected effect of shortening the construction period. The current application collected necessary information through an interview with the site manager. If the company collects more information needed in the field and has big data than it has collected necessary information so far, it will be highly competitive in the market as it can improve the completeness of applications by establishing opinions and reflecting information accordingly.

A Study on the Development of IoT Inspection System for Gas Leakage Inspection in Kitchen Gas Range Built-in Method (주방 가스레인지 빌트인 방식에서 가스 누출검사를 위한 IoT 검사 시스템 개발에 관한 연구)

  • Kang, Dae Guk;Choi, Young Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.283-290
    • /
    • 2022
  • In this study, an IoT inspection system that can be linked with a server was developed using a gas timer and ESP-01 Wi-Fi module installed on a gas valve in the home. The server environment of the gas leak IoT inspection system was installed with APM (Apache, PHP, MySQL) to collect gas pressure data by generation so that leakage checks could be performed. In order to control the gas leak IoT inspection system, the app inventory was used to manage the gas leak check value in real time. In addition, user convenience has been enhanced so that membership management, WiFi settings, and leakage check values can be checked through mobile apps. In order to manage subscribers by region, the user list was checked by logging in in in the administrator mode so that the information on whether or not the leak test was conducted and the results could be provided. In addition, when the user presses the gas leak check button, the pressure is automatically checked, and the measured value is stored in the server, and when a gas leak occurs, the leakage check is performed after alarm and repair so that it can be used if normal. In addition, in order to prevent overlapping membership, membership management can be performed based on MAC addresses.

Simplistic QA for an Enhanced Dynamic Wedge using the Reversed Wedge Pair Method (역방향 조사방식을 통한 동적쐐기의 품질관리)

  • Lee Jeong Woo;Hong Semie;Suh Tae Suk
    • Progress in Medical Physics
    • /
    • v.15 no.3
    • /
    • pp.161-166
    • /
    • 2004
  • A simplistic quality assurance (QA) method was designed for a Linac built-in enhanced dynamic wedge (EDW), which can be utilized to make wedged beam distributions. For the purpose of implementing the EDW symmetry QA, a film dosimetry system, low speedy dosimetry film, film densitometer and 3D RTP system were used, and the films irradiated by means of a 60$^{\circ}$ Reversed wedge pair (REWP) method. The profiles were then analyzed in terms of their symmetries, including partial treatment, which is the case of stopping it abruptly during EDW irradiation, and the measured and calculated values compared using the Cad Plan Golden Segmented Treatment Table (Golden STT). The result of this experiment was in good agreement, within 1 %, of the 'reversed wedge pair counterbalance effect'. For the QA of the effective wedge factor (EWF), the authors measured EWFs in relation to the 10$^{\circ}$, 15$^{\circ}$, 20$^{\circ}$, 25$^{\circ}$, 30$^{\circ}$, 45$^{\circ}$ and 60$^{\circ}$ EDW, which were compared with the calculated values using the correction factor derived from the Golden STT and the log files produced automatically during the process of EDW irradiation. By means of this method it was capable of check up the safety of effective wedge factor without any other dosimetry system. The EDW QA was able to be completed within 1 hour from irradiation to analysis as a consequence of the simplified QA procedure, with maximized effectiveness. Unlike the metal wedge system, the EDW system was heavily dependent on the dose rates and jaw movements; therefore, its features could potentially cause inaccuracy. The frequent simplistic QA for the EDW is essential, and could secure against the flaw of dynamic treatment that uses the EDW.

  • PDF