• Title/Summary/Keyword: 호스트 시스템

Search Result 678, Processing Time 0.024 seconds

The Design and Implementation of A Distributed Intrusion Detection System for Multiple Attacks (대규모 네트워크 상의 다중공격에 대비한 분산 침입탐지시스템의 설계 및 구현)

  • 최주영;최은정;김명주
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.21-29
    • /
    • 2001
  • For multiple attacks through large networks e.g., internet, IDS had better be installed over several hosts and collect all the audit data from them with appropriate synthesis. We propose a new distributed intrusion detection system called SPIDER II which is the upgraded version of the previous standalone IDS - SPIDER I. As like the previous version, SPIDER II has been implemented on Linux Accel 6.1 in CNU C. After planting intrusion detection engines over several target hosts as active agents, the administration module of SPIDER II receives all the logs from agents and analyzes hem. For the world-wide standardization on IDS, SPIDER II is compatible with MITRE's CVE(Common Vulnerabilities and Exposures).

  • PDF

Performance Evaluation of PDP System Using Realtime Network Monitoring (실시간 네트워크 모니터링을 적용한 PDP 시스템의 성능 평가)

  • Song, Eun-Ha;Jeong, Jae-Hong;Jeong, Young-Sik
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.181-188
    • /
    • 2004
  • PDF(Parallel/Distributed Processing) is an internet-based parallel/distributed processing system that utilizes resources from hosts on the internet in idle state to perform large scale application through parallel processing, thus decreasing the total execution time. In this paper. do propose an adaptive method to be changed network environment at any time using realtime monitoring of host. It is found from experiments that parallel/distributed processing has better performance than its without monitoring as an adaptive strategy, which copy with task delay factor by overload and fault of network, be applicable to the cockpits of task allocation algorithm in PDP.

A Study on Network Security Modeling using Single Sign-On (Single Sign-On을 적용한 네트워크 보안 모델링)

  • 서희석;김희완
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.49-56
    • /
    • 2004
  • With the growing usage of the networks, the users in the Internet uses some kinds of web server. They confused that each web server uses the different user ID and passwords. To solve these problems, SSO (Single Sign-On) solution is introduced. We presents the modeling methods which are efficiently constructed the network management models. We constructed the intrusion detection systems and firewalls using the SSO. This architecture is efficient to manage the network usage and control. SSO solution designed on the small scale Intranet. CA server in the 550 that depends on PKI (Public Key Infrastructure) is used to issue the certificates. SHTTP based on SSL (Secure Socket Layer) is used to protect the data between certificate server and the intranet users.

  • PDF

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

Analysis of Mobility and Security Requirements for Mobile IPTV (모바일 IPTV의 이동성에 대한 침해 분석 및 대응방안)

  • Lee, Sun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.37-44
    • /
    • 2010
  • The mobility is one of the most important factor for mobile IPTV. However, mobility is highly vulnerable to eavesdropping and unauthorized access. Generally mobility of mobile services is based on handover techniques. But we showed that mobile IPTV must use other techniques to confirm mobility. In this paper, we analyzed security of wibro mobile IPTV from the viewpoint of mobility. We considered DCAS host must include new addresses of mobile devices. We analyzed total number of authentication for the proposed method. So we showed that proposed method was more efficient than wibro-mobile IPTV. We compared the security of our proposal to the security requirements of TTA.

A Resource Reallocation Scheme Enhancing the Survivability of Essential Services (필수 서비스 생존성 향상을 위한 자원 재할당 기법)

  • Kim, Sung-Ki;Min, Byoung-Joon;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.95-102
    • /
    • 2003
  • In order to guarantee the survivability of essential services against attacks based on new methodology, we need a solution to recognize important resources for the services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the construction of intrusion tolerant systems. By means of resource reallocation within a host, this scheme enables selected essential services to survive even after the occurrence if a system attack. Experimental result obtained on a test-bed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS (Intrusion Detection System) to produce more effective responsive mechanisms against attacks.

The Impacts of Characteristics of Airbnb Host on User Satisfactions (숙박공유 플랫폼 서비스의 서비스 공급자 특성이 사용자의 만족감에 미치는 영향 : 에어비앤비(Airbnb) 호스트 주체를 중심으로)

  • Lee, Ui-Jun;Won, Hyeong-sik;Lee, Sae-rom
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.1-22
    • /
    • 2020
  • Purpose Along with increasing use of mobile devices, the sharing economy platform services, which generate profits by sharing products owned or labor, have been activated. A representative example of the sharing economy platform service is Airbnb, which connects providers having idle residential space with users. The results revealed that the cases of superhosts and professional companies had a positive and negative effect on user satisfaction, respectively. Based on signaling theory, this study drew the following implications: residential space providers should make an effort to meet the superhost conditions suggested by Airbnb, and offering residential spaces by individual suppliers rather than professional accommodation companies can more heighten user satisfaction. Design/methodology/approach Because sharing behavior is promoted through trust between interested parties, this study aimed to verify the effects of provider characteristics on user satisfaction in a sharing economy platform service. Specifically, it analyzed user satisfaction, according to host attributes (i.e., "superhost or not," gender, and "professional company or not") among the characteristics of Airbnb suppliers. Findings The results revealed that the cases of superhosts and professional companies had a positive and negative effect on user satisfaction, respectively. Based on these analyses results, this study drew the following implications: residential space providers should make an effort to meet the superhost conditions suggested by Airbnb, and offering residential spaces by individual suppliers rather than professional accommodation companies can more heighten user satisfaction.

Design and Implementation of MDEC module for CMCIS System (CMCIS 시스템을 위한 MDEC 모듈의 설계 및 구현)

  • Jung, Hyon-Chel;Kim, Tea-Koon;Kang, Dong-Won;Kim, Jea-Young;Kim, Se-jim;Cho, Sung-chil;Kim, Hong-Sam;Lee, Yong-Hee;Seo, Kwang-Suk;Park, Myeong-Chul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.125-128
    • /
    • 2016
  • 본 논문에서는 다중 생체계측 장비를 CMCIS(Central Monitoring and Cardiology Information System) 기반의 통합 시스템에 연동하기 위한 MDEC(Medical Device Exchange Communication)의 설계 및 구현을 소개한다. MDEC은 6종의 계층장비의 신호를 받아 각 서버로 데이터를 전송할 수 있도록 설계하고 Linux OS을 포팅 하였다. 각 장비별 프로토콜에 대해 최소화된 기본 프로토콜을 정의하고 통신방법에 따라 UART 포트 혹은 USB 포트를 생체정보의 물리적 입력장치로 사용하였다. 호스트 서버와는 유무선 LAN울 통해 정보를 전달할 수 있게 하드웨어를 설계하였다. 본 연구의 결과는 CMCIS 기반의 통합 시스템을 구축하는 기반기술로 향후 효율적 의료서비스에 기여할 것으로 사료된다.

  • PDF

Implementation of Mirroring and Efficient User Interface System for Smart Phone (스마트폰을 위한 미러링 및 효율적인 사용자 인터페이스 시스템 구현)

  • Kim, Jeong-Hoon;Ko, Do-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.363-365
    • /
    • 2015
  • Recently, Smart Phone is widely used and replaces with the work of computer system. So, to overcome the inconveniences of Smart-Phone small screen size, a mirroring the screen of Smart Phone to TV or Computer monitor is studied to show a larger screen to the users. In this study, we implemented a screen mirroring and efficient user interface(computer mouse and keyboard) system with Bluetooth and USB host functions for a smart phone using standard 5 pin(MHL compatible) connector output to HDMI Monitor. Dock-style and Monitor embedded system are designed respectively.

Packet Replacement Technique for Securing Anonymity in P2P Network (P2P 네트워크에서 익명성 보장을 위한 패킷 대치 기법)

  • Kim Byung Ryong;Kim Ki Chang
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.331-338
    • /
    • 2005
  • Flooding based P2P system basically provides anonymity and under the anonymity circumstances user and provider exchange information. Most of packets transferred from node to node do not contain identity information on node that sent packet. And these packets are transmitted to the destination through the routing systems dynamically composed of intermediate nodes. Therefore it is impossible to know who transmitted it for the first and who the designated recipient is. But since downloading and uploading host's IP address is exposed it does not provide anonymity. This study introduces techniques to provide anonymity for protecting identification of users and resource Providers by replacing QueryHit Packets in systems where anonymity can cause trouble.