• Title/Summary/Keyword: 정보자원 식별

Search Result 192, Processing Time 0.025 seconds

Hacking Path Retracing Algorithm using Packet Marking (패킷 마킹을 이용한 해킹경로 역추적 알고리즘)

  • 원승영;한승완;서동일;김선영;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.21-30
    • /
    • 2003
  • Retracing schemes using packet marking are currently being studied to protect network resources by isolating DDoS attack. One promising solution is the probabilistic packet marking (PPM). However, PPM can't use ICMP by encoding a mark into the IP identification field. Likewise, it can't identify the original source through a hash function used to encode trace information and reduce the mark size. In addition, the retracing problem overlaps with the result from the XOR operation. An algorithm is therefore proposed to pursue the attacker's source efficiently. The source is marked in a packet using a router ID, with marking information abstracted.

  • PDF

A QoS Improvement Scheme for Real-time Traffic using IPv6 Flow Labels (IPv6 플로우 레이블을 이용한 실시간 트래픽의 QoS개선 방안)

  • 이인화;김성조
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.787-798
    • /
    • 2003
  • The flow label field in IPv6 has been proposed to provide the QoS. Since the existing flow label specification scheme like random-number format utilizes the label only as the identifier of flow, it is not appropriate for providing differentiated services according to the characteristics of various types of real-time traffic. This paper proposes a hybrid scheme that makes use of the flow label fields as components of flow and QoS parameters as well. To be specific, this paper investigates a scheme that both guarantees the end-to-end service quality and utilizes efficiently backbone resources by allowing users to specify QoS parameters using flow labels. Assuming an MLPS-TE network as the backbone, we compare the performance of our proposed scheme with that of random-number scheme through simulation. The simulation result shows that our scheme is more efficient than the existing one in terms of the transmission rate as well as the resource utilization of the backbone.

Analysis of Threat Agent for Important Information Systems (중요 정보시스템 위협원에 대한 분석)

  • Kim, Tai-Hoon;Kim, Seok-Soo;Park, Gil-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.203-208
    • /
    • 2007
  • Because the networks and systems become more complex, the implementation of the security countermeasures for important Information Systems becomes more critical consideration. The designers and developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. Security countermeasures may be made for formulating an effective overall security solution to address threats at all layers of the information infrastructure. But all these works can be done after assuming who is the threat agent. In this paper we identify the treat agents for information systems, summarize the characteristics of threat agents, and apply weighting factors to them.

  • PDF

Adaptive Scanning Scheme for Mobile Broadband Wireless Networks based on the IEEE 802.16e Standard (802.16e 표준 기반 광대역 무선 이동 망을 위한 동적 스캐닝 기법)

  • Park, Jae-Sung;Lim, Yu-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.151-159
    • /
    • 2008
  • Mobile broadband wireless network is emerging as one of the hottest research areas due to technical advances, and the demands of users who wish to enjoy the same network experience on the move. In this paper, we investigate the handover process at the medium access control (MAC) layer in an IEEE 802.16e-based system. In particular, we identify problems concerned with the scan initiation Process called cell reselection and propose a received signal strength (RSS) estimation scheme to dynamically trigger a scanning process. We show how the RSS estimation scheme can timely initiate a scanning process by anticipating RSS values considering scan duration required.

  • PDF

Feature Point Extraction of Sea Cucumbers using Canny Edge Detection (캐니 에지 검출을 이용한 해삼의 특징점 추출)

  • Lee, Keon-Ik;Woo, Young-Bae;Min, Jun-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1281-1286
    • /
    • 2018
  • The sea cucumber, which is distributed over 1,500 species worldwide, is a highly value-added variety that has been considered an important source of marine resources in many countries for a long period of time. Most of the research on sea cucumbers involves the effectiveness of food and its extractions; however, there was no research on the extraction of sea cucumbers. In response, this research suggested a boundary detection algorithm to extract the special spot of sea cucumbers Therefore, in order to capture a large quantity of high value-added in sea cucumbers and we believe that they will be a great help to the sea cucumber recognition program in the future.

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

An Study on the Standardization for Bibliographic Records of Provider Supplied E-monograph Package (전자책 패키지의 서지레코드 표준화에 관한 연구)

  • Lee, Mihwa
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.1
    • /
    • pp.51-69
    • /
    • 2013
  • It was difficult for user to identify e-books due to some problems such as duplicable bibliographic records and inconsistent descriptive cataloging when cataloging the bibliographic records of the e-book packages in OPAC. Therefore, the purpose of this study was to find the applicable methods of the provider neutral e-book(e-monograph) MARC record guideline for the standardization of the bibliographic records of the provider supplied e-book package. Through the literature reviews and homepage analysis of 15 university libraries in domestic, the theoretical background on cataloging e-book, the descriptive cataloging of e-book, the provider-neutral e-monograph MARC record guideline as new standard for e-book, and the libraries practices of cataloging bibliographic records of the e-book package were inquired. Based on these analysis, it was to suggest applicable methods of provider neutral e-book(e-monograph) MARC record guideline for the standardization of the bibliographic records of domestic e-book packages in aspect of cataloging rule, KORMARC, and neutral bibliographic records. This study will contribute to build FRBRization of the e-books in OPAC as finding the guideline for the standardization of the bibliographic records of the e-book packages for both providers and libraries.

An Exploratory Study on the Uniqueness of Crowds and its Implications for Public Data Platform Design from the Information Processing View (정보처리관점에서 본 대중의 특성과 공공데이터 플랫폼 설계 시사점에 관한 탐색 연구)

  • Kim, Sang Wook;Lee, Jae Sook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.373-381
    • /
    • 2017
  • As the viewpoint of data evolves from business resources to value resources, the focus on the data processing is rapidly shifting from the cartesian (alphanumeric) to the contextual. In response to this trend, the government is actively promoting the utilization of public data by the private sectors. With a focus on the fact that the mainstream of public data users is the crowds, this study, therefore, seeks to identify differences between the members and the crowds from information processing view, followed by presenting directions and main points for the design of data platform. This study is perhaps to be a starting point for finding practical alternatives for creating 'collective intelligence ecosystem' and to be a basis for building a big data base in response to the opening of public data.

A Formal Specification and Meta-Model for Development of Cooperative Collection·Analysis Framework

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.85-92
    • /
    • 2019
  • Companies can identify user groups or consumption trends by collecting and analyzing opinions of many users on special subjects or their products as well as utilize them as various purposes such as predicting some specific trends or marketing strategies. Therefore current analyzing tools of social media have come into use as a means to measure the performances of social media marketing through network's statistical analysis. However these tools require expensive computing and network resources including burden of costs for building up and operating complex software platforms and much operating know-how. Hence, small companies or private business operators have difficulty in utilizing those social media data effectively. This paper proposes a framework applied into developing analysis system of social media. The framework could be set up and operate the system to extract necessary social media's data. Also to design the system, this study suggests a meta-model of proposed framework and to guarantee completeness and consistency, a formal specification of meta-model by using Z language is suggested. Finally, we could verify the clearness of framework's design by performing Z model checking of formal specification's output through Z-EVES tool.

Fuzzy-MOEH : Resource Constraints Project Scheduling Algorithm with Fuzzy Concept (Fuzzy-MOEH : 퍼지 개념을 이용한 자원제약 프로젝트 스케줄링 알고리즘)

  • Koh, Jang-Kwon;Shin, Ye-Ho;Ryu, Keun-Ho;Kim, Hong-Gi
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.4
    • /
    • pp.359-371
    • /
    • 2001
  • Project scheduling under resource constraint conditions have contained to many uncertain factors and it is perfonned by human experts. The expert identifies the activities of the project, decides the precedent relationships between these activities, and then construct the schedule using expected activity's duration. At this time, most of the scheduling methods concentrate on one of scheduling factor between activity duration and cost. And the activity duration, which is the most important factor in scheduling, is decided by heuristic of expert. Therefore it may cause uncertainty of activity duration decision and the use of this activity duration may increase the uncertainty of constructed schedule. This paper proposes Fuzzy-MOEH scheduling algorithm, which is the aggregation of the fuzzy number for deciding activity duration and applies the cost function for solving the problems of previous scheduling methods. This paper also analyze the utility and property of Fuzzy-MEOH algorithm through the comparison between Fuzzy-MEOH algorithm and existing MEOH algorithm.

  • PDF