• Title/Summary/Keyword: 필터 링

Search Result 3,386, Processing Time 0.029 seconds

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Design and Implementation of Web-based Home PNA Device Management System (웹 기반 Home PNA 장치 관리 시스템의 설계 및 구현)

  • An, Byeong-O;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.865-874
    • /
    • 2001
  • In this paper, we have designed and implemented Web based Home Phoneline Neworking Aliance(Home PNA)device management, system which can resolve the unfair bandwidth service form may subscribers and manage subscribes using these devices. To manage Home PNA device with Simple Network Management Protocol(SNMP) management elements are classified into system. Port performance, fault functional area based on Management Information Base(MIB) objects from Multi Dwelling Unit(MDU) devices MIB. System management provides configuration information of each MDU devices, and port management provides the current state of subscribes and performs filtering operation against the unauthorized users. And performance management provides traffic information about trunk and subscriber lines. Finally fault management provides fault logging fo the unexpected events and trap message from devices To verify the operability of the proposed system, we have tested it in real network environment.

  • PDF

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF

An Area Efficient Low Power Data Cache for Multimedia Embedded Systems (멀티미디어 내장형 시스템을 위한 저전력 데이터 캐쉬 설계)

  • Kim Cheong-Ghil;Kim Shin-Dug
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.101-110
    • /
    • 2006
  • One of the most effective ways to improve cache performance is to exploit both temporal and spatial locality given by any program executional characteristics. This paper proposes a data cache with small space for low power but high performance on multimedia applications. The basic architecture is a split-cache consisting of a direct-mapped cache with small block sire and a fully-associative buffer with large block size. To overcome the disadvantage of small cache space, two mechanisms are enhanced by considering operational behaviors of multimedia applications: an adaptive multi-block prefetching to initiate various fetch sizes and an efficient block filtering to remove rarely reused data. The simulations on MediaBench show that the proposed 5KB-cache can provide equivalent performance and reduce energy consumption up to 40% as compared with 16KB 4-way set associative cache.

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

An Improved AE Source Location by Wavelet Transform De-noising Technique (웨이블릿 변환 노이즈 제거에 의한 AE 위치표정)

  • Lee, Kyung-Joo;Kwon, Oh-Yang;Joo, Young-Chan
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.20 no.6
    • /
    • pp.490-500
    • /
    • 2000
  • A new technique for the source location of acoustic emission (AE) in plates whose thichness are close to or thinner than the wavelength has been studied by introducing wavelet transform de-noising technique. The detected AE signals were pre-processed using wavelet transform to be decomposed into the low-frequency, high-amplitude flexural components and the high-frequency, low-amplitude extensional components. If the wavelet transform de-noising was employed, we could successfully filter out the extensional wave component, one of the critical errors of source location in plates by arrival time difference method. The accuracy of source location appeared to be significantly improved and independent of the setting of gain and threshold, plate thickness, sensor-to-sensor distance, and the relative position of source to sensors. Since the method utilizes the flexural component of relatively high amplitude, it could be applied to very large, thin-walled structures in practice.

  • PDF

A Development of Proactive Application Service Engine Based on the Distributed Object Group Framework (분산객체그룹프레임워크 기반의 프로액티브 응용서비스엔진 개발)

  • Shin, Chang-Sun;Seo, Jong-Seong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.153-165
    • /
    • 2010
  • In this paper, we proposed a Proactive Application Service Engine (PASE) supporting tailor-made distributed application services based on the Distributed Object Group Framework (DOGF) efficiently managing distributed objects, in the viewpoint of distributed application, composed application on network. The PASE consists of 3 layers which are the physical layer, the middleware layer, and the application layer. With the supporting services of the PASE, the grouping service manages the data gathered from H/W devices and the object's properties for application by user's request as a group. And the security service manages the access of gathered data and the object according to user's right. The data filtering service executes the filtering function to provide application with gathered data. The statistics service analysis past data. The diagnostic service diagnoses a present condition by using the gathered data. And the prediction service predicts a future's status based on the statistics service and the diagnostic service. For verifying the executability of the PASE's services, we applied to a greenhouse automatic control application in ubiquitous agriculture field.

Rotation-Invariant Texture Classification Using Gabor Wavelet (Gabor 웨이블릿을 이용한 회전 변화에 무관한 질감 분류 기법)

  • Kim, Won-Hee;Yin, Qingbo;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1125-1134
    • /
    • 2007
  • In this paper, we propose a new approach for rotation invariant texture classification based on Gabor wavelet. Conventional methods have the low correct classification rate in large texture database. In our proposed method, we define two feature groups which are the global feature vector and the local feature matrix. The feature groups are output of Gabor wavelet filtering. By using the feature groups, we defined an improved discriminant and obtained high classification rates of large texture database in the experiments. From spectrum symmetry of texture images, the number of test times were reduced nearly 50%. Consequently, the correct classification rate is improved with $2.3%{\sim}15.6%$ values in 112 Brodatz texture class, which may vary according to comparison methods.

  • PDF

Performance Improvement of Tone Compression of HDR Images and Qualitative Evaluations using a Modified iCAM06 Technique (Modified iCAM06 기법을 이용한 HDR 영상의 tone compression 개선과 평가)

  • Jang, Jae-Hoon;Lee, Sung-Hak;Sohng, Kyu-Ik
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1055-1065
    • /
    • 2009
  • High-dynamic-range (HDR) rendering technology changes the range from the broad dynamic range (up to 9 log units) of a luminance, in a real-world scene, to the 8-bit dynamic range which is the common output of a display's dynamic range. One of the techniques, iCAM06 has a superior capacity for making HDR images. iCAM06 is capable of making color appearance predictions of HDR images based on CIECAM02 and incorporating spatial process models in the human visual system (HVS) for contrast enhancement. However there are several problems in the iCAM06, including obscure user controllable factors to be decided. These factors have a serious effect on the output image but users get into difficulty in that they can't find an adequate solution on how to adjust. So a suggested model gives a quantitative formulation for user controllable factors of iCAM06 to find suitable values which corresponds with different viewing conditions, and improves subjective visuality of displayed images for varying illuminations.

  • PDF

An Image Watermarking Scheme by Image Fusion in the Wavelet Domain (웨이블릿영역에서 영상융합에 의한 영상 워터마킹 기법)

  • Kim, Dong-Hyun;Choi, In-Ha
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.443-453
    • /
    • 2008
  • In this paper, the 1-level DWT(Discrete Wavelet Transform) coefficients of a binary logo image are used as the watermark. The watermark should be inserted in the same band which is equivalent to the host image when the watermark is inserted in the wavelet domain. This is the image fusion of the proposed watermarking method. The watermark is inserted in relatively significant coefficients after the insertion area is defined. The more significant coefficients have the important information because they are identified as the edge and major surface in images. The significant coefficients are defined when their absolute value exceeds the threshold. The standard deviation is used as the weight value of watermark insertion in order to strengthen the weight of the watermark insertion according to the value of the coefficients. The proposed watermarking method is an adaptive scheme, and the proposed two detection algorithms can be adaptively used when the watermarked image is distorted by cropping, filtering, or compression.

  • PDF