• Title/Summary/Keyword: 정보 공유 프레임워크

Search Result 222, Processing Time 0.029 seconds

A Mobile Agent Programming System for Efficient Distributed Applications (효율적 분산 응용을 위한 이동 에이전트 프로그래밍 시스템)

  • Jeong, Won-Ho;Kang, Mi-Yeon;Kim, Yun-Su
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.439-452
    • /
    • 2003
  • Mobile agent is one of the good technologies for overcoming network load and latency in distributed applications, and it may be a promising way of base technology of distributed applications because of its high adaptability for various network environments. In this paper, a mobile agent programming system, called HUMAN, is designed and implemented efficient use in various distributed applications based on mobile agents. HUMAN supports such high level utilities as file searhing, addressing by groups of nodes, storing path information, storing search information, and thus it gives us high easiness in agent-based programming. And it provides various itinerary modes and flexible reply modes for easy adaptation to given network environment. It also provides a management server for registering and active agents. Thus it can be efficiently applied for such varous distributed applications as searching distributed information, remote control, and file sharing in networks. A simple electronic commerce system is designed is designed and implemented as a HUMAN based illustrative application.

Zero-day 공격 대응을 위한 네트워크 보안의 지능화 기술

  • Jeong, Il-An;Kim, Ik-Gyun;O, Jin-Tae;Jang, Jong-Su
    • Information and Communications Magazine
    • /
    • v.24 no.11
    • /
    • pp.14-24
    • /
    • 2007
  • 최근 네트워크 공격 기술이 날로 발전함에 따라 각 시스템에서 노출된 취약성이 패치되기 전에 네트워크 환경을 위협하는 zero-day 공격이 최대 이슈로 등장하고 있다. 본 고에서는 zero-day 위협에 대응하기 위해서, 활발하게 진행되고 있는 탐지 시그니처 자동 생성 기술에 대한 최근 연구 동향에 대해 소개하고, 이러한 기존 연구 및 기술들의 단점을 보완하기 위해 개발되고 있는 하드웨어 기반 고성능, 시그니처 자동 생성 시스템을 포괄하는 네트워크 보안 지능화 기술을 소개한다. 그리고 생성된 탐지 시그니처를 타 보안 솔루션들과 공유하기 위한 운영 프레임워크를 제안하고, 생성된 시그니처를 공유하기 위해 사용하는 시그니처 생성 교환프로토콜과 메시지 교환 형식을 정의한다. 이러한 지능화대응 기술을 활용함으로써 zero-day 공격에 대해 초기에 탐지하고 신속하게 대응하여 네트워크 인프라를 보호하는 효과를 기대할 수 있다. 또한, 체계적인 보안 정책 관리를 통하여 향후 발생할 네트워크 위협 공격들에 대해서도 빠르게 대응할 수 있도록 하여 국가적인 차원에서의 효과적인 방어체계를 구축하는데 기여할 것이다.

Republic of Korea's Position on the Convention on Biological Diversity - Digital Sequence Information and post-2020 Global Biodiversity Framework - (생물다양성협약 대응 대한민국의 전략 - 디지털 염기서열 정보 및 2020년 이후 지구 생물다양성 보전 프레임워크 -)

  • Byoungyoon Lee
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2022.09a
    • /
    • pp.4-4
    • /
    • 2022
  • 앞으로 10년간 세계의 생물다양성 보전을 위한 유엔 생물다양성협약 당사국 총회가 2022년 12월 캐나다 몬트리올에서 열린다. 전 세계 전문가와 정책입안자들이 여러 내용을 다루지만 그중에서도 염기서열 정보에 관한 내용을 집중적으로 소개한다. 우선 생물다양성협약에서의 이익공유에 관한 내용은 북아시아 원산인 콩을 현재 대량으로 재배하고 수확하고 있는 미국, 브라질 등의 사례를 선별하여 소개한다. 이어서 생물다양성협약 체결 전후의 생물자원에 대한 인식 변화로 인해 국제적으로 합의한 나고야 의정서의 주요 핵심 내용을 발표한다. 그러나, 최근의 합성생물학은 유전정보만을 가지고 설계자의 의도대로 실물 생물자원 없이 새로운 생물과 원하는 물질을 합성할 수 있기에 국제적으로 마찰이 발생하고 있다. 유전공학과 합성생물학에서 가장 기본적으로 이용하고 있는 유전정보를 생물다양성협약에서는 어떻게 정의하고 있는지, 그리고 이익을 어떻게 공유하는지 알아본다. 생물자원 이용 국가들은 유전정보는 물리적인 실체가 없기에 이익공유대상이 아님을 주장하면서 유전정보는 원하는 누구에게나 이용되어야 한다고 보고 있다. 반면 생물자원 풍부국 입장은 생명과학기술 발전으로 인해 원산지 국가의 허가 없이 생물 유전정보를 활용하는 것은 생물 주권의 침해로 보고 있으며, 유전정보를 실물 생물자원과 동일하게 취급하여 나고야 의정서상의 이익공유를 요구하고 있다. 유전정보에 대한 대한민국의 공식적인 입장과 제 14차 협약 총회에서 합의한 결정문을 소개한다. 또한, 2019년 생물다양성과학기구(IPBES)에서 지구의 생물다양성과 생태계를 평가한 보고서에서 생물 멸종의 위협요인으로 제시된 토지이용 변화, 남획, 기후변화, 오염, 외래종에 대한 문제점을 기반으로 작성된 post-2020 생물다양성협약 10개년 실행 목표를 알아보고 2022년 12월 개최하는 제15차 당사국총회의 주요 의제에 대한 전망과 최근 문제가 되고 있는 '공동의 그러나 차별적인 책임(CBDR, Common But Differentiated Responsibility)'의 개념을 소개한다.

  • PDF

Automated Signature Sharing to Enhance the Coverage of Zero-day Attacks (제로데이 공격 대응력 향상을 위한 시그니처 자동 공유 방안)

  • Kim, Sung-Ki;Jang, Jong-Soo;Min, Byoung-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, automated signature generation systems(ASGSs) have been developed in order to cope with zero-day attacks with malicious codes exploiting vulnerabilities which are not yet publically noticed. To enhance the usefulness of the signatures generated by (ASGSs) it is essential to identify signatures only with the high accuracy of intrusion detection among a number of generated signatures and to provide them to target security systems in a timely manner. This automated signature exchange, distribution, and update operations have to be performed in a secure and universal manner beyond the border of network administrations, and also should be able to eliminate the noise in a signature set which causes performance degradation of the security systems. In this paper, we present a system architecture to support the identification of high quality signatures and to share them among security systems through a scheme which can evaluate the detection accuracy of individual signatures, and also propose a set of algorithms dealing with exchanging, distributing and updating signatures. Though the experiment on a test-bed, we have confirmed that the high quality signatures are automatically saved at the level that the noise rate of a signature set is reduced. The system architecture and the algorithm proposed in the paper can be adopted to a automated signature sharing framework.

HL7기반 의료정보시스템의 상호운용성을 위한 코리오그래피 변환 방법론

  • Im, Deok-Sun;Lee, Yong-Gi;Park, Jong-Heon
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.395-401
    • /
    • 2007
  • 본 논문은 의료정보시스템 관련 표준인 HL7(Health Level 7)의 정보를 토대로 WS-CDL(Web Service Choreograph Description Language) 웹 서비스를 유도하여 의료정보시스템의 상호운용성을 확보하는데 기여하는 논문으로, 웹 서비스화에 있어 인터페이스 측면만이 아닌 코리오그래피 정보까지도 유도해내는 프레임워크를 제시한다. 또한 현재 HL7에서 다루고 있는 부분 외에도 WS-CDL로 대표되는 코리오그래피 기술 언어의 생성부분을 추가하여 참여자간에 연동 구조를 공유할 수 있게 함으로써, 기술 언어의 생성 부분을 추가하기 전보다 참여자간의 원활한 상호연동이 일어날 수 있도록 돕는 등의, 다양한 웹 서비스 구성요소에 대한 유도를 가능하게 할 수 있는 방향을 제시하였다.

  • PDF

Context Sharing Framework Based on Time Dependent Metadata for Social News Service (소셜 뉴스를 위한 시간 종속적인 메타데이터 기반의 컨텍스트 공유 프레임워크)

  • Ga, Myung-Hyun;Oh, Kyeong-Jin;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.39-53
    • /
    • 2013
  • The emergence of the internet technology and SNS has increased the information flow and has changed the way people to communicate from one-way to two-way communication. Users not only consume and share the information, they also can create and share it among their friends across the social network service. It also changes the Social Media behavior to become one of the most important communication tools which also includes Social TV. Social TV is a form which people can watch a TV program and at the same share any information or its content with friends through Social media. Social News is getting popular and also known as a Participatory Social Media. It creates influences on user interest through Internet to represent society issues and creates news credibility based on user's reputation. However, the conventional platforms in news services only focus on the news recommendation domain. Recent development in SNS has changed this landscape to allow user to share and disseminate the news. Conventional platform does not provide any special way for news to be share. Currently, Social News Service only allows user to access the entire news. Nonetheless, they cannot access partial of the contents which related to users interest. For example user only have interested to a partial of the news and share the content, it is still hard for them to do so. In worst cases users might understand the news in different context. To solve this, Social News Service must provide a method to provide additional information. For example, Yovisto known as an academic video searching service provided time dependent metadata from the video. User can search and watch partial of video content according to time dependent metadata. They also can share content with a friend in social media. Yovisto applies a method to divide or synchronize a video based whenever the slides presentation is changed to another page. However, we are not able to employs this method on news video since the news video is not incorporating with any power point slides presentation. Segmentation method is required to separate the news video and to creating time dependent metadata. In this work, In this paper, a time dependent metadata-based framework is proposed to segment news contents and to provide time dependent metadata so that user can use context information to communicate with their friends. The transcript of the news is divided by using the proposed story segmentation method. We provide a tag to represent the entire content of the news. And provide the sub tag to indicate the segmented news which includes the starting time of the news. The time dependent metadata helps user to track the news information. It also allows them to leave a comment on each segment of the news. User also may share the news based on time metadata as segmented news or as a whole. Therefore, it helps the user to understand the shared news. To demonstrate the performance, we evaluate the story segmentation accuracy and also the tag generation. For this purpose, we measured accuracy of the story segmentation through semantic similarity and compared to the benchmark algorithm. Experimental results show that the proposed method outperforms benchmark algorithms in terms of the accuracy of story segmentation. It is important to note that sub tag accuracy is the most important as a part of the proposed framework to share the specific news context with others. To extract a more accurate sub tags, we have created stop word list that is not related to the content of the news such as name of the anchor or reporter. And we applied to framework. We have analyzed the accuracy of tags and sub tags which represent the context of news. From the analysis, it seems that proposed framework is helpful to users for sharing their opinions with context information in Social media and Social news.

Intrinsic and Extrinsic Factors Affecting Use of Sharing Economy Services and the Moderating Effect of Benefits (공유경제 서비스 사용에 영향을 미치는 사용자의 내외적 요인과 이익의 조절효과)

  • Kim, Sanghyun;Park, Hyunsun;Lim, Jeongtaek
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.482-491
    • /
    • 2020
  • This study proposed a research model based on self-determination theory and unified theory of acceptance and use of technology to explain the factors influencing intention to use sharing economy services. A total of 392 responses were collected, and structural equation analysis was performed with AMOS 22.0. The results are summarized as follows. First, self-technological aptness and trust had a positive effect on intention to use sharing economy services. Second, access bigger market and environmental friendliness had a positive effect on intention to use sharing economy services. Third, intention to use sharing economy services had a positive effect on actual usage of sharing economy services. Finally, benefits was found to strengthen the relationship between intention to use sharing economy services and actual usage of sharing economy services. The findings of this study would provide a theoretical framework for sharing economy services and important information for understanding individuals using the sharing economy services.

A Study on DGPS Framework and Performance Evaluation for High-Accurate Localization based on GPS/AGPS (GPS/AGPS 기반의 고정밀 측위가 가능한 DGPS 프레임워크 및 성능평가에 관한 연구)

  • Seo, Ho-Seok;Jung, Se-Hoon;Oh, Min-Joo;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.8
    • /
    • pp.927-938
    • /
    • 2014
  • A number of crime and disease relief situation show a clear increasing trend in domestic and overseas country. In particular, we desperately need a fast location information sharing with high accuracy for dealing with this situation efficiently. In this paper, we propose a DGPS framework and performance evaluation based on Web service enable increase location accuracy using low-cost GPS or AGPS. The framework consists of mobile station to realize the final service by receiving the correction values that are created in the base station closest to the current position from DGPS server, base station system to transmit the correct values to DPGS server by installing at base point and DGPS framework working at DGPS server. Our framework is fundamentally designed to respond based on XML to service request. In addition, for performance evaluation, we make use of 3 sites of Level 2 city base-station among the base stations being operated in Suncheon-si. Through performance evaluation, we show that our framework outperforms about 10%~15% in terms of error improvement rate, compared with the existing schemes. And we have the advantage that various services can be expanded owing to receiving the correction values through mobile device such as, smart phone, smart pad, net-book by using XML based Web services.

Design and implementation of OSGi-based Context-Aware Mobile Healthcare System (OSGi 기반 상황인지 모바일 헬스케어 시스템 설계 및 구현)

  • Song, Seung-Jae;Kim, Nam-Ho;Ryu, Sing-Hwan;Shin, Ho-Jin;Jang, Kyung-Soo;Shin, Dong-Ryoel
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.2 s.314
    • /
    • pp.47-59
    • /
    • 2007
  • Recently, Healthcare system has not been standardized and has been developed as an embedded system lacking interoperability. We are finally going to face such problems as having excessive load in using network caused by the uncontrolled spread of system and un-guaranteed interoperability among the heterogeneous systems. We suggest the possibility that OSGi and JADE can be accepted as a solution for the above problems.

DoS Attack at Access Point Using Python (파이썬을 이용한 무선 공유기 DoS 공격)

  • Ji, Byoung-Kyu;Moon, Bong-Kyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.192-195
    • /
    • 2017
  • 최근 무선 네트워크의 발달로 카페나 대학교, 지하철 등 대부분 공간에서 무선 공유기를 통해 WIFI 서비스가 제공되고 있다. 무선 공유기는 IEEE의 표준 프로토콜인 802.11을 사용하는데, 이 프로토콜의 상용화된 버전인 802.11n의 관리 프레임은 암호화되어 있지 않아 쉽게 악용될 수 있다. 이는 Rogue AP, 비밀번호 크래킹 등 다른 공격으로의 발판이 될 수 있으며 이에 따라 보안에 위협이 될 수 있다. 본 논문에서는 파이썬을 이용해 이러한 취약점에 대해 공격하는 과정을 분석하고 이를 통해 발생할 수 있는 취약점과 대책에 대해 논의할 것이다.