• Title/Summary/Keyword: Active Directory

Search Result 17, Processing Time 0.019 seconds

Enhanced Server Availability for DDoS Amplification Attack Using CLDAP Protocol (CLDAP 프로토콜을 이용한 DDoS 증폭공격에 대한 서버 가용성 향상방안 연구)

  • Choi, Suk June;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Recently, DDoS amplification attacks using servers that provide Microsoft Active Directory information using CLDAP protocol are increasing. Because CLDAP is an open standard application that allows a wide range of directory information to be accessed and maintained in a network, the server is characterized by its openness to the Internet. This can be exploited by the Reflector server to perform an amplification attack by an attacker. In addition, this attack can be attacked with a packet that is amplified 70 times more than the conventional UDP-based flooding attack, and it can block service to small and medium sized server. Therefore, in this paper, we propose an algorithm that can reduce the DDoS amplification attack using CLDAP server and implement the corresponding CLDAP server environment virtually, and implement and demonstrate the corresponding algorithm. This provides a way to ensure the availability of the server.

Efficient Idle Virtual Machine Management for Heterogeneous Cloud using Common Deployment Model

  • Saravanakumar, C.;Arun, C.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1501-1518
    • /
    • 2016
  • This paper presents an effective management of VM (Virtual Machine) for heterogeneous cloud using Common Deployment Model (CDM) brokering mechanism. The effective utilization of VM is achieved by means of task scheduling with VM placement technique. The placements of VM for the physical machine are analyzed with respect to execution time of the task. The idle time of the VMis utilized productively in order to improve the performance. The VMs are also scheduled to maintain the state of the current VM after the task completion. CDM based algorithm maintains two directories namely Active Directory (AD) and Passive Directory (PD). These directories maintain VM with proper configuration mapping of the physical machines to perform two operations namely VM migration and VM roll back. VM migration operation is performed from AD to PD whereas VM roll back operation is performed from PD to AD. The main objectives of the proposed algorithm is to manage the VM's idle time effectively and to maximize the utilization of resources at the data center. The VM placement and VM scheduling algorithms are analyzed in various dimensions of the cloud and the results are compared with iCanCloud model.

A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack

  • Kim, Jisun;Jo, Eulhan;Lee, Sungwon;Cho, Taenam
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.772-786
    • /
    • 2021
  • The process of tracking suspicious behavior manually on a system and gathering evidence are labor-intensive, variable, and experience-dependent. The system logs are the most important sources for evidences in this process. However, in the Microsoft Windows operating system, the action events are irregular and the log structure is difficult to audit. In this paper, we propose a model that overcomes these problems and efficiently analyzes Microsoft Windows logs. The proposed model extracts lists of both common and key events from the Microsoft Windows logs to determine detailed actions. In addition, we show an approach based on the proposed model applied to track illegal file access. The proposed approach employs three-step tracking templates using Elastic Stack as well as key-event, common-event lists and identify event lists, which enables visualization of the data for analysis. Using the three-step model, analysts can adjust the depth of their analysis.

A Study on the Development of Web-based Discussion System with Hill's Discussion-based Teaching Model (Hill의 토론 학습 모형을 적용한 웹 기반 토론 학습 시스템 개발)

  • Kim, Jeon-Hoon;Lee, Jae-Mu
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.1
    • /
    • pp.99-114
    • /
    • 2007
  • The web-based discussion allows learners to participate in the learning actively and positively, and it can provide learners with the learner-oriented active interaction and learning environment. However, the web-based discussion produced communication-oriented learning environment using bulletin board and data directory and researched mainly the state and activation of the discussion, and had less system supporting dynamic discussion process. Even if the discussion made appearance partially and totally as learners' activities at a variety of web-based teaching, specific discussion-based teaching model was not developed. Therefore, a systematic web-based discussion system needs to be developed to activate human interaction and to give shape to the stages and elements of the discussion model. The paper supports dynamic discussion activities and applies Hill's common discussion model describing detailed discussion stages to develop systematic web-based discussion system.

  • PDF

A Case Study on the Construction of Cyber Textbook Museum Database (사이버교과서박물관 데이터베이스 구축에 관한 사례 연구)

  • Kim, Eun-Ju;Lee, Myeong-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.4
    • /
    • pp.67-84
    • /
    • 2009
  • Cyber Textbook Museum is created by the Korean Educational Development Institute in part of the project to manage the knowledge and information of Korea to promote understanding of Korean education and its history. The original and full text of textbooks dating from the 1890s to the present have been digitized and arranged for easy access over internet. An exclusive portal site dealing with Korean textbooks and curriculum materials was made to provide not only the directory service of textbooks and curriculums in diverse data classifications, school levels, years/periods and subjects but also the keyword search by searching engine. Users can search the necessary materials easily and systematically over the screen and use all the functions except save, capture and print. The management system for textbook image(DjVu format), search system and DRM(Digital Rights Management) system were developed. Finally, four suggestions are proposed which are related in the aspects of policy, technical, systematic aspects for active and tremendous use of the site.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Formation of the Minority Societies and Socio-Cultural Adaptation of the Chinese and Korean Immigrants in Vancouver, Canada (중국인과 한국인 이민자들의 소수민족사회 형성과 사회문화적 적응: 캐나다 밴쿠버의 사례연구)

  • Kim, Doo-Sub
    • Korea journal of population studies
    • /
    • v.21 no.2
    • /
    • pp.144-181
    • /
    • 1998
  • The main purpose of this study is to understand the socio-cultural adaptation and life-styles of the Chinese and Korean immigrants in Vancouver, Canada. Of interest are the immigration policies of the Canadian government and formation of the Chinese and Korean minority societies in Vancouver. Attention is given to estimating the size of the Korean population in Vancouver, utilizing the listings of telephone directory and the proportion of surname Kims in the Korean population. This paper focuses on explaining the distinctive adaptation patterns and socio-cultural characteristics of the Chinese and Korean immigrants. A conceptual scheme of socio-cultual adaptation of the minority immigrants, which is hypothesized as a function of the participation to the host society and the cultural identity, is also developed in this paper. Findings of the analysis suggest that the Chinese and Korean population in Vancouver witnessed a rapid growth since the mid 1980s, when the Canadian government launched the immigration programs for investors and entrepreneurs. It appears that the Chinese and Korean immigrants hold strong ethnic identity and maintain cultural traditions and life-styles of their own. While Chinese immigrants are characterized by active participation to the host society, Korean immigrants tend to confine themselves to the Korean enclave, and thus keep a certain distance from the host society. This appears to be particularly true for the Koreans who immigrated with a status of investor or entrepreneur. As the key force behind the ethnic differences in their adaptation, the role of voluntary associations is stressed. Finally, the future prospects of the Chinese and Korean societies and their acculturation are discussed in this study.

  • PDF