• Title/Summary/Keyword: 행위 기반 제어

Search Result 118, Processing Time 0.025 seconds

A Design of Performance Management System in Heterogeneous Networks (이종 전산망의 통합성능 관리 방법)

  • Hwang, Jun;Kwon, Hyeog-In
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.2
    • /
    • pp.237-246
    • /
    • 1995
  • As the needs for accessing distributed informations and computing resources are increasing the need for network interconnection is growing. There are many of the network management packages including performance management tools; but most of them are not appropriate to be used in heterogeneous interconnected networks. To monitor and to control efficiently the performance of heterogeneous network, first, we have to define all performance parameters in general meaning. We need models and criteria for supporting performance analysis activities of the management system. In this study, we have designed a centralized performance management system based on the OSI management, which can be used in heterogeneous networks.

  • PDF

Network Session Analysis For BotNet Detection (봇넷 탐지를 위한 네트워크 세션 분석)

  • Park, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2689-2694
    • /
    • 2012
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spam. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this paper, we propose IRC (Internet Relay Chat) that is used to control the botnet communication in a session channel of IRC servers connected through the analysis of the relationship of the channel and the connection with the server bot-infected hosts and how to detect.

Design and Implementation of Event Trace FAcilities for Debugging RPC-oriented Distributed Systems (RPC에 기반한 분산 시스템의 디버깅을 위한 이벤트 추적 기능의 설계 및 구현)

  • Seo, Yeong-Ae;Lee, Eun-Jeong;Park, Chang-Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.3
    • /
    • pp.313-325
    • /
    • 1999
  • 분산 프로그램의 디버깅이 순차 프로그램의 디버깅보다 어려운 이유중의 하나는 수행중인 프로세스들 간의 통신 때문이다. 비록 분산 시스템을 위해 구축된 디버거들이 많이 있음에도 불구하고 , 프로세스들간의 통신 이벤트를 효과적으로 디버깅할수 있는 실용적인 수준의 디버거는 없는 실정이다. 본 논문에서는 분산 시스템의 개발에 널리 사용되고있는 RPC 매커니즘을 이용한 프로그램간의 통신을 효과적으로 디버깅하는 방법을 제시한다. 이를 위하여 RPC 통신 이벤트를 디버깅 객체로 정의한 RPC 이벤트 모델을 제안하고 이에 기초하여 RPC 이벤트 추적 기능을 설계 및 구현하였다. RPC 프로토콜을 분석한 결과를 이용하여 메시지의 송.수신 이벤트를 추적 기능을 설계 구현하였다. RPC 프로토콜을 분석한 결과를 이용하여 메시지의 송.수신 이벤트를 라이브러리 함수의 호출과 자료의 값으로 기술하고 해당라이브러리 함수의 호출이 발생한 위치를 인지함으로써 모든 통신 이벤트의 발생을 탐지할수 있었다. 제안된 RPC 이벤트 추적기능은 현재 분산 디버거인 유니뷰 시스템에 구현되었다. 이벤트 추적 기능의 추가적 구현으로 인하여 유니뷰 시스템은 추적된 통신의 내용을 보면서 관련된 소스 코드를 보거나 프로그램을 제어하고 원격 함수 호출에 사용된 매개변수의 값을 보는 등의 행위가 가능하다. 또한 이러한 이벤트 추적기능을 수행하기 위하여 별도의 라이브러리나 수행환경이 요구되지 않으므로 실제분산시스템의 개발 환경에 적응하기가 용이한 장점을 가진다.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

The Method for Real-Time Systems Modeling Based On the Object and Temporal Logic (객체 및 시제논리에 기반한 실시간 시스템 모형화 방법)

  • Kim, Jung-Sool;Kang, Byung-Wook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1522-1536
    • /
    • 1998
  • In this paper, we present a modeling method for the real-time systems. This method is based on the DARTS (Design Approach for Real-Time Systems) and widely extended to analysis phase. The DARTS method provides a good guideline for the real -time software design, but it uses structured analysis and does not provide a specification language. So. this paper provides extended DARTS modeling techniques to the analysis area based on the objects. Internal behavior of system showed by means of a NPN (Numerical Petri Net) for analysis, and the specification language is provided based on the temporal logic for transition synchronization sequence control. By the example, we identified the proposed method was applied well. And through the reachability graph, we verified whether the deadlocks may occur or not in the analysis phase before the design phase. Thus. it gives easy way to analysis, so that it will lead to the design phase naturally.

  • PDF

A Study on the Expansion of Fundamental Categories Based on Thesaurus International Standards (시소러스 국제표준 기반 기본 범주의 확장에 관한 연구)

  • Chang, Inho
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.1
    • /
    • pp.273-291
    • /
    • 2019
  • This study aims to extend fundamental categories from Clause 11, "facet analysis" in International Standards for thesaurus(ISO 25964-1) by analyzing fundamental categories of Clause 11 and concept and their scope in a thesaurus of Clause 5. For to do this, the fundamental categories were established by adjusting partially and adding mental entities explicitly referencing the highest concepts(YAMATO which is the upper ontology of Mizoguchi, and ISO 2788) and existing fundamental categories(PMEST, FRBR group 3 entities, 13 categories in CRG). Also, established fundamental categories were reorganized and structured based on concreteness/abstraction of PMEST in Ranganathan and independence/dependence of YAMATO in Mizoguchi. And the upper categories were divided into independent and dependent entities. Under these entities 28 criteria are included in the independent ones and 2 criteria in the dependent ones. In the further study, the result of this study can be expected to reuse and refer as controlled vocabulary in the field like classification, taxonomies and thesauri where expected to utilize fundamental categories and as the high-level concept when constructing an ontology for information retrieval.

공정한 은닉 KCDSA 서명에 기반한 추적 가능한 전자화폐 시스템

  • 이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.85-97
    • /
    • 1999
  • A blind signature scheme is a protocol allowing verifier to obtain a valid signature for a message m from a signer without him seeing the message. This means that the bank in collaboration with the shop cannot trace the electronic cash to user. However anonymous electronic cash also facilitates fraud and criminal acts such as money laundering anonymous blackmailing and illegal purchaes. Therefore in this paper we propose fair blind signature scheme based on KCDSA which is a domestic digital signature scheme and it apply a electronic cash system. In particularly a proposed electronic cash system have an anonymity control ability which trace a user who make use a electronic cash illegally in association with a trusted center.

Gesture Interface for Controlling Intelligent Humanoid Robot (지능형 로봇 제어를 위한 제스처 인터페이스)

  • Bae Ki Tae;Kim Man Jin;Lee Chil Woo;Oh Jae Yong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.10
    • /
    • pp.1337-1346
    • /
    • 2005
  • In this paper, we describe an algorithm which can automatically recognize human gesture for Human-Robot interaction. In early works, many systems for recognizing human gestures work under many restricted conditions. To eliminate these restrictions, we have proposed the method that can represent 3D and 2D gesture information simultaneously, APM. This method is less sensitive to noise or appearance characteristic. First, the feature vectors are extracted using APM. The next step is constructing a gesture space by analyzing the statistical information of training images with PCA. And then, input images are compared to the model and individually symbolized to one portion of the model space. In the last step, the symbolized images are recognized with HMM as one of model gestures. The experimental results indicate that the proposed algorithm is efficient on gesture recognition, and it is very convenient to apply to humanoid robot or intelligent interface systems.

  • PDF

Development of a Cause Analysis Program to Risky Driving with Vision System (Vision 시스템을 이용한 위험운전 원인 분석 프로그램 개발에 관한 연구)

  • Oh, Ju-Taek;Lee, Sang-Yong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.149-161
    • /
    • 2009
  • Electronic control systems of vehicle are rapidly developed to keep balance of a driver`s safety and the legal, social needs. The driver assistance systems are putted into practical use according to the cost drop in hardware and highly efficient sensor, etc. This study has developed a lane and vehicle detection program using CCD camera. The Risky Driving Analysis Program based on vision systems is developed by combining a risky driving detection algorithm formed in previous study with lane and vehicle detection program suggested in this study. Risky driving detection programs developed in this study with information coming from the vehicle moving data and lane data are useful in efficiently analyzing the cause and effect of risky driving behavior.

  • PDF