• Title/Summary/Keyword: 호스트 시스템

Search Result 678, Processing Time 0.03 seconds

Intelligent I/O Subsystem for Future A/V Embedded Device (멀티미디어 기기를 위한 지능형 입출력 서브시스템)

  • Jang, Hyung-Kyu;Won, Yoo-Jip;Ryu, Jae-Min;Shim, Jun-Seok;Boldyrev, Serguei
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.79-91
    • /
    • 2006
  • The intelligent disk can improve the overall performance of the I/O subsystem by processing the I/O operations in the disk side. At present time, however, realizing the intelligent disk seems to be impossible because of the limitation of the I/O subsystem and the lack of the backward compatibility with the traditional I/O interface scheme. In this paper, we proposed new model for the intelligent disk that dynamically optimizes the I/O subsystem using the information that is only related to the physical sector. In this way, the proposed model does not break the compatibility with the traditional I/O interface scheme. For these works, the boosting algorithm that upgrades a weak learner by repeating teaming is used. If the last learner classifies a recent I/O workload as the multimedia workload, the disk reads more sectors. Also, by embedding this functionality as a firmware or a embedded OS within the disk, the overall I/O subsystem can be operated more efficiently without the additional workload.

Attributed Intrusion Detection System using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템)

  • Jeong, Jong-Geun;Lee, Hae-Gun;Her, Kyung;Shin, Suk-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.658-661
    • /
    • 2008
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS(Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security. We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other platforms.

  • PDF

A Service Discovery Scheme Based on NAPTR Resource Record (NAPTR 자원레코드 기반의 서비스 탐색기법)

  • 권성호;김희철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2003
  • NAPRT(Naming Authority Pointer) is a type of resource record specified in IETF RFC 2915. NAPTR enables to register various services in the Domain Name Systems and thus provides a way to discover services available on specific hosts. This paper describes the design and implementation of a Proxy DNS system aimed at supporting NAPTRs. The goal of this work is to study on the feasibility of the service discovery registered in DNS via NAPTR records and provides the result for simplicity and extensibility of implementation through the implementation of a actual Test-bed system This research result can be applied to service discovery in the resource information management for high performance GRE environments as well as to the implementation of DNS infrastructure for the ENUM.

  • PDF

Design and Performance Evaluation of Attributed Intrusion Detection System Model using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능 평가)

  • 정종근;편석범;이윤배
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.117-124
    • /
    • 2000
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS (Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other Platforms.

  • PDF

A Design of New Real Time Monitoring Embedded Controller using Boundary Scan Architecture (경계 주사 구조를 이용한 새로운 실시간 모니터링 실장 제어기 설계)

  • 박세현
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.6
    • /
    • pp.570-578
    • /
    • 2001
  • Boundary scan architecture test methodology was introduced to facilitate the testing of complex printed circuit board. The boundary scan architecture has a tremendous potential for real time monitoring of the operational status of a system without interference of normal system operation. In this paper, a new type of embedded controller for real time monitoring of the operational status of a system is proposed and designed by using boundary scan architecture. The proposed real time monitoring embedded controller consists of test access port controller and an embedded controller proposed real time monitoring embedded controller using boundary scan architecture can save the hard-wire resource and can easily interface with boundary scan architecture chip. Experimental results show that the real time monitoring using proposed embedded controller is more effective then the real time monitoring using host computer.

  • PDF

Real-Time Tank Monitoring System based on CAN (CAN을 기반으로 하는 실시간 탱크 모니터링 시스템)

  • 박진우;진기홍;노동규;박재한;지석준;이장명
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.274-277
    • /
    • 1999
  • Y2k will be able to enormous disaster. The many make an effort to find a solution to problem of Y2k. Problem of Y2k must solution to as follow. First, problem of Y2k solution organization must constructed. Second, in step with each stage\ulcornerthe first, developing and complete stage, stage of Y2k solution must be constructed. Third, solution of Y2k must construct to hierarchy. hierarchy structure constructed form six stage to first stage, first stage is investigation resources, second stage is estimation influence, third stage is planing conversion, fourth stage is working conversion, fifte spot, sixth stage is diffusion on the spot.

  • PDF

An Intrusion Detection Method by Tracing Root Privileged Processes (Root 권한 프로세스 추적을 통한 침입 탐지 기법)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.239-244
    • /
    • 2008
  • It is not enough to reduce damages of computer systems by just patching vulnerability codes after incidents occur. It is necessary to detect and block intrusions by boosting the durability of systems even if there are vulnerable codes in systems. This paper proposes a robust real-time intrusion detection method by monitoring root privileged processes instead of system administrators in Linux systems. This method saves IP addresses of users in the process table and monitors IP addresses of every root privileged process. The proposed method is verified to protect vulnerable programs against the buffer overflow by using KON program. A configuration protocol is proposed to manage systems remotely and host IP addresses are protected from intrusions safely through this protocol.

Host Anomaly Detection of Neural Networks and Neural-fuzzy Techniques with Soundex Algorithm (사운덱스 알고리즘을 적용한 신경망라 뉴로-처지 기법의 호스트 이상 탐지)

  • Cha, Byung-Rae;Kim, Hyung-Jong;Park, Bong-Gu;Cho, Hyug-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.13-22
    • /
    • 2005
  • To improve the anomaly IDS using system calls, this study focuses on Neural Networks Learning using the Soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the Soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm with fuzzy membership function. The back-propagation neural networks and Neuro-Fuzzy technique are applied for anomaly intrusion detection of system calls using Sendmail Data of UNM to demonstrate its aspect of he complexity of time, space and MDL performance.

Resource Redundancy Elimination by Bridging the Semantic Gap in Virtualized Systems (가상 환경에서 시멘틱 갭 연결을 통한 자원 중복성 제거)

  • Kim, Inhyeok;Kim, Taehyoung;Eom, Young Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.185-187
    • /
    • 2011
  • 전통적인 가상화 기술들은 하나의 물리 머신에서 서로 다른 운영체제들을 동작시키기 위해 여러 개의 가상 머신을 제공하고 있다. 이러한 가상화 기술들은 운영체제를 소스 수정없이, 혹은 약간의 수정만으로 물리 머신에서 동작하는 것과 동일한 방식으로 동작할 수 있도록 지원하기 때문에 호스트와 게스트 간의 깊은 시멘틱 갭을 발생시킨다. 이러한 시멘틱 갭은 여러 컴퓨팅 자원에 대한 공간 중복과 접근 중복의 중요한 원인이 되고, 이러한 자원 중복은 대규모 가상화 시스템의 확장성에 제약한다. 이러한 자원 중복을 제거하기 위해 컨텐츠 기반 페이지 공유 등 다양한 연구들이 진행되어 왔지만 운영체제 수정없이 지원하는 정책으로 인한 시멘틱 갭은 여전히 제안 기법들을 제한하게 된다. 이에 우리들은 운영체제의 자원 관리 부분을 수정하여 근본적인 시멘틱 갭을 제거함으로써 메모리와 스토리지의 공간 및 접근 중복성을 제거할 수 있는 파일시스템을 제안하였다. 그리고 실험을 통해 기존의 가상 블록 장치를 사용하는 파일시스템과 비교 및 평가하여 제안 시스템이 페이지 캐시 공유 및 스토리지 접근 중복 제거에 효과적임을 입증하였다.

Incremental and Retargetable Linker for Embedded System (내장형 시스템을 위한 점진적이고 목표 재설정 가능한 링커)

  • Wu, Deok-Kyun;Han, Kyung-Sook;Pyo, Chang-Woo;Kim, Heung-Nam
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.183-192
    • /
    • 2001
  • In a development environment for embedded system with a connection between host and target system, the linker of host system links the cross-compiled object file and modules of target system and downloads the linked object file to the target system. In this research, we separate this linker into the module dependent on object file format and the module independent on object file format. The dependent module gets the linking information independent on file format from the object file, and the independent module actually does the linking process with this linking information_ This separation can improve the portability of development environment for a target system_ Also, our linker does the incremental remote linking that applies relocation not only to the obj ect file to be loaded but also to target's modules to have been loaded_ This incremental remote linking can reduce a linking time than linking by the united modules because of linking by module. The result of measuring linking time for SPEC95 integer benchmarks shows an average of reduction rates of 64.90%. Also, incremental remote linking can improve the comfortability of users who develop programs because users do not consider a downloading order of linking object files. Currently, we developed this linker in the embedded application development environment ESTO [1] to be prepared for a commercial product.

  • PDF