• Title/Summary/Keyword: Blocking of Access

Search Result 142, Processing Time 0.023 seconds

Design of Prevention Model according to a Dysfunctional of Corporate Information (기업 정보화 역기능에 따른 피해를 최소화하기 위한 기업 정보 처리 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.11-17
    • /
    • 2016
  • Recently, As the IT skills development, the different kinds of data (or information) generated by the company are becoming more frequent leaked to outside organizations and individuals. However, it is insufficient situation to reduce the dysfunctional corporate information at the enterprise level. In this paper, we propose a role-based enterprise information processing model to minimize the dysfunctions of corporate information. The proposed model is to allow you to set protect corporate information through the relevant departments for the management and supervision of enterprise information, and rapid and systematic recovery and operating strategy was to improve the efficiency of enterprise information services. The proposed model is caught blocking access to information access to information to establish a rapid and systematic recovery and operational continuity strategy after the administrator user permissions and roles that access to information is centrally managed by the user when the abnormality. In experimental results, virus damage was lower 48.8% than the previous model. In addition, information on the number of dysfunction distribution occurring within the company gained 17.9% lower results than the previous model.

Bandwidth Management of WiMAX Systems and Performance Modeling

  • Li, Yue;He, Jian-Hua;Xing, Weixi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.63-81
    • /
    • 2008
  • WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network’s performance compared to WCPS.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Analysis of abnormal traffic controller deployed in Internet access point (인터넷 액세스점에서의 이상 트래픽 제어기 성능분석)

  • Kim Kwangsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.107-115
    • /
    • 2005
  • ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than $30{\%}.$ When traffic intended unknown attack occurs, network IDS is high false positive probability and so is limited to apply. In this environment, the ATC can be a key player to help the network node such as router to control abnormal traffic.

Real-Time User Login Account Access Management Using Mobile App (모바일 앱을 이용한 실시간 사용자 계정 접근 관리)

  • Choi, Seokhwan;Kwon, Junho;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.350-358
    • /
    • 2017
  • Spill of personal information using a stolen ID and password that recently occurred in large enterprises and portal web site such as Nate, Auction, National Agricultural Cooperative Federation, suggesting the importance of protecting personal information. By managing access to user accounts in real time, users will be able to block access before personal information is leaked. Therefore, In this paper, we propose a method to prevent spill of personal information that may occur when connected to others by using an authorized ID and password from portals. Specifically, we offer a mobile status control app that controls the logged status of user account in real time to view login status information to user by visualization and information about specific time and IP address. Also, we propose a method for detecting and blocking duplicated login that connect via IP address change.

PLASMA THIN FILMS PREVENTING CHLORIDE LONS FROM INTERFERING WITH THE NERNSTIAN pH-RESPONSE OF PLATINUM ELECTRODE SURFACE

  • Yajima, Tastuhiko
    • Journal of the Korean institute of surface engineering
    • /
    • v.29 no.6
    • /
    • pp.678-682
    • /
    • 1996
  • The plasma-deposited polymer thin films at platinum surface were investigated as materials blocking access of chloride ions to the platinum surface and preventing their interference with the Nernstian responce of platinum. In the presence of chloride ions, the pH response of a naked platinum was remarkably affected. By comparison of pH responses of coated and uncoated platinum-wire electrodes immersed in solutions with chloride ions, it was found that toluene and ethylbenzene plasma films could improve the pH response of platinum. The pH response of coated platinum electrodes may be explained by the ability of protons, by virtue of their small size, to move through the polymer matrix to the platinum surface.

  • PDF

Performance Analysis for CDMA Soft Handoffs between MSC's under Hexagonal Configuration (육각형의 셀배치를 가지는 CDMA 이동통신 시스템에서 MSC 간의 소프트 핸드오프를 위한 성능분석)

  • Choi, Woo-Yong;Jun, Chi-Hyuck
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.30 no.4
    • /
    • pp.277-284
    • /
    • 2004
  • CDMA (Code Division Multiple Access) is a promising air interface technique for digital cellular systems. The soft handoff between base stations is one of many important features of CDMA for the mobile stations crossing the cell boundaries. The service areas of MSC's (Mobile Switching Centers) are defined as the unions of the service areas of the base stations connected to MSC's and are assumed to have hexagonal shapes. An analytical approach to the performance analysis of the link between MSC's for supporting the inter-MSC soft handoff scheme will be developed to obtain the probability that a soft handoff to an adjacent MSC will be blocked due to the shortage of the link capacity. Also, the rate of new connection establishments that are requested by the mobile stations moving to the service area of an MSC according to the inter-MSC soft handoff scheme will be obtained.

Design of a shared buffer memory switch with a linked-list architecture for ATM applications (Linked-list 구조를 갖는 ATM용 공통 버퍼형 메모리 스위치 설계)

  • 이명희;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.11
    • /
    • pp.2850-2861
    • /
    • 1996
  • This paper describes the design of AATM switch LIS of shared buffer type with linked-list architecture to control memory access. The proposed switch LSI consists of the buffer memory, controller and FIFO memory blocks and two special circuits to avoid the cell blocking. One of the special circuit is a new address control scheme with linked-list architecture which maintains the address of buffer memory serially ordered from write address to read address. All of the address is linked as chain is operated like a FIFO. The other is slip-flag register it will be hold the address chain when readaddress missed the reading of data. The circuits control the buffer memory efficiently and reduce the cell loss rate. As a result the designed chip operates at 33ns and occupied on 2.7*2.8mm$^{2}$ using 0.8.mu.m CMOS technology.

  • PDF

Improvement of Channel Efficiency in Mobile Communications by User Relay Scheme

  • JIA, Zhongning;MUTSUURA, Kouichi;AKIZUKI, Osamu;CHIN, YoonTze;HANDA, Shiro;OSHITA, Shinjiro
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1447-1450
    • /
    • 2002
  • In this paper, we propose a new access method named UR (Use. Relay) scheme to improve the channel efficiency in mobile communications. In UR scheme, packets of a data terminal that do not demand real time communications are relayed by other terminals during their inactive periods, which ue communicating with the base station through a fixed channel at that time. Simulation results show that with UR scheme, the blocking probability md the throughput are improved considerably with an allowable increase in the average delay.

  • PDF