• Title/Summary/Keyword: Client Agent

Search Result 115, Processing Time 0.025 seconds

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF

Load Balancing in Seamless Game with MigAgent (MigAgent를 이용한 Seamless 게임에서의 부하 분산)

  • Kim, Beob-Kyun;Jang, Hang-Jin;You, Kang-Soo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.51-62
    • /
    • 2006
  • The load of this kind of gores, which is heavier than that of any other precedent, and on enormous seamless virtual world characterize the MMORPG(Massively Multiplayer Online Role-Playing Game) genres. In this seamless environment, gamers can usually accept a set of independent spaces, which is being held by independent game servers, os a single big virtual world. Despite the efforts of some developers, gamers are suffered from huge message traffic which comes from the interaction between client and server and the interaction between fold sowers. In this paper, new gore server architecture using MigAgent is proposed which tries to reduce message traffic. Usually, message traffic reaches the climax when a PC(Player Character) is moving to other field server. MigAgent, designed in this thesis, tries to manage this kind of PCs and to ploy o role of user's agent to prepare for the unexpected situation. Improvement of this system is shown by the analysis of the effect of the size ratio of AOI (Area of Interest) and AC (Adjacent Cell).

  • PDF

Implementing of Security System using Shell Script in UNIX (UNIX상에서 Shell 스크립트를 이용한 보안 시스템 구현)

  • Lee, Min-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.868-870
    • /
    • 2003
  • In this paper, I have implemented the security system using shell script that periodically checking the security elements of unix system for security it transmit to a monitoring server and monitoring many clients. Agent of client executing by crontab scheduler, Environment of server to receive data use restricted TFTP in SunOS. And then, Because of using shell script, apply shell to system with flexible, control performance, and can meet on a sudden situation.

  • PDF

Secure Framework for SIP-based VoIP Network (SIP 프로토콜을 기반으로한 VOIP 네트워크를 위한 Secure Framework)

  • Han, Kyong-Heon;Choi, Sung-Jong;Choi, Dong-You;Bae, Yong-Guen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.295-297
    • /
    • 2008
  • Session Initiation Protocol (SIP) has become the call control protocol of choice for Voice over IP (VoIP) networks because of its open and extensible nature. However, the integrity of call signaling between sites is of utmost importance, and SIP is vulnerable to attackers when left unprotected. Currently a hop-by-hop security model is prevalent, wherein intermediaries forward a request towards the destination user agent server (UAS) without a user agent client (UAC) knowing whether or not the intermediary behaved in a trusted manner. This paper presents an integrated security model for SIP-based VoIP network by combining hop-by-hop security and end-to-end security.

  • PDF

Mechanism for Access Control to Clients in Intranet with Using ARP Spoofing (ARP Spoofing을 이용한 LAN 클라이언트 접속 제어 기법)

  • Lee, Geonwoo;Koo, Sangsoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.15-18
    • /
    • 2018
  • This paper proposes mechanism to build a economical access control system when a user's host requires block to an external network, such as computer class conducted at educational institutions. The proposed mechanism is to block clients from accessing the external network by using the one of MITM(Man In The Middle) technique, ARP Spoofing. It prevents packets from being forwarded to outside by gateway. So It can build system simply and economically because Client hosts are don't need to install firewall or any extra agent.

  • PDF

Distributed System Management using Agent-On-Demand (에이전트-온-디맨드를 이용한 분산 시스템 관리)

  • Sul, Seung-Jin;Lee, Keum-Suk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.1
    • /
    • pp.81-88
    • /
    • 2000
  • As distributed systems become used in wider area of applications, many works has been done to invent more efficient way to manage the distributed systems. The client-server based distributed system management by using SNMP or CMIP has many problems such as scalability, interoperability, flexibility, and so on. Recently, it is evident that managing distributed systems using mobile agents have popularity, and the Java language helps the trend. However, the improvement of performance has to be analyzed when the mechanism of mobile agent is applied In this paper, we discuss a more efficient way to make use of the mobile agent mechanism for managing distributed systems, and propose an Agent-On-Demand (AOD) method. The core of the method is not to use the previous method that mobile agents doing management job is dispatched to the managed nodes by a manager application, but to make agents requested by the managed nodes and then the manager application send the requested agents to that nodes. This process is done through Hierarchical State Threshold (HST). Also we present a performance model for Java RMI and mobile agent, and compare the AOD method with the previous work in terms of network overhead and execution time.

  • PDF

Analytical Models and Performance Evaluations of Network Management Systems (네트워크 관리 시스템의 해석적 모델 및 성능 평가)

  • Jung Woo, Lee;Jae Hyuk, Choi;Woo Seok, Lee;Sang Bang, Choi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.9
    • /
    • pp.17-28
    • /
    • 2004
  • Since the Internet has grown into a large communication infrastructure, the network management system to systematically manage the large number of network components has become an essential part of the Internet. The rapid growth of network size has brought into question the scalability of the existing centralized model, such as SNMP (Simple Network Management Protocol) and CMIP (Common Management Information Protocol). Thus, for efficient network management, researches about mobile agent have also been performed recently. This paper presents analytical models of centralized approach based on SNMP protocol, distributed approach based on mobile agent, and mixed mode to make up for shortcomings of SNMP and mobile agent. We compare the performance of these analytical models based on network management response time. Experiment results show that performance of mobile agent and the mixed mode is less sensitive to the delay in WAN network environment. However, SNMP is more efficient for the simple network environment like LAN.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

Design and Implementation of Educational Information Sharing Systems using Bookmark (즐겨찾기를 이용한 교육용 정보공유시스템의 설계 및 구현)

  • Han, Sun-Gwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.6
    • /
    • pp.77-84
    • /
    • 2004
  • This study proposed the agent system for educational information sharing using bookmark. In order to search and share the educational information effectively, we designed DAML+OIL-typed bookmark information. Proposed system in this study had the P2P type based on Client-Server type. We implemented the bookmark agent that has the intelligent characteristics, that is, automatic categorization of peers and documents, autonomous communication between agents using DAML, and delicate information searching using the ontology dictionary in Semantic Web environment. Hereafter, this study will contribute to activate sharing and searching educational information as well as proposed system will offer the important technologies for SCORM-based e-learning environment.

  • PDF

Design and Implementation of Web-based Information Searching System with Mobile Agent Engine (이동 에이전트 엔진을 이용한 웹 기반 정보 검색 시스템의 설계 및 구현)

  • Oh, Dong-Seok;Kim, Seung-Gwon;Park, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.4
    • /
    • pp.79-87
    • /
    • 1999
  • This paper proposes a searching system with a mobile agent which retrieve data from the distributed hosts. The proposed system dispatched the movable objects, so called AGLET, to the distributed hosts in order to perform a task given by a client or a server. The network of the existing system must not be disturbed during a task is performing. However our system has the strong point that a task can be performed even if the network is disconnected on the way. When the network is disconnected, the system can get the results later after the network system is connected again. Designing the system has been done by using UML(Unified Modeling Language) which is a standardized object-oriented modeling language. AGLET, a pure JAVA product of IBM, is used for the mobile agent.

  • PDF