• Title/Summary/Keyword: Client Code

Search Result 105, Processing Time 0.023 seconds

Important Information Protection using Client Virtualization (클라이언트 가상화를 이용한 중요정보 보호)

  • Lim, Se-Jung;Kim, Gwang-Jun;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.111-117
    • /
    • 2011
  • In this paper, proposed client virtualization technology to minimize degradation of the local computing environment, efficient and qualified users in the area of virtual functions needed to enable the user to provide important information in the local computing environment protection and performance, stability and continuity was important to keep. As well as the local computing environment from malicious code attacks such as methods for protecting virtualized domain also can not be overlooked as a major problem area in a virtualized, virtualized data through the encryption of user-space security, maximized. In addition, through virtualization using local computing resources efficiently while still a local computing system separate from the computing resources to a single user can get the same effect.

Profile based Malicious Loader Attack Detection and Filtering Method (프로파일 기반 악성 로더 공격탐지 및 필터링 기법)

  • Yoon, E-Joong;Kim, Yo-Sik
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.21-29
    • /
    • 2006
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing. Specially, forge the code of program and disrupt normal operation using a malicious loader program against the Internet application client. In this paper, we first analyze and generate signatures of malicious loader detection. And, we propose a method to secure the application client based on profiling which can detect and filter out abnormal malicious loader requests.

  • PDF

A Network Fault-tolerant Software Streaming Technology (네트워크 고장감내 소프트웨어 스트리밍 기술)

  • Shim, Jeong-Min;Kim, Won-Young;Choi, Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.437-441
    • /
    • 2004
  • As the development of networks and computer systems, users want various services. To meet user's various needs, new technologies is developed and a software streaming technology, uses software with streaming technology, is newly coming out. If network trouble occurs, the software is not available because the streaming server can't send the binary code that software needs to be executed in the streaming service based on network environment. In this paper, we propose the management technology of software binary code in client that managing the binary codes classfied by the function kept in the local storage device, provides the service continuously after the network trouble with the given binary code previously not the binary code from the server.

  • PDF

The Security Framework Using ONE-TIME Execution Code in a Client/Server Environment (클라이언트/서버 환경에서 일회성 실행 코드를 이용한 보안 프레임워크)

  • Beak, Yeong-Tae;Lee, Se-Hoon;Shin, Young-Jin;Park, Jeon-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.33-36
    • /
    • 2011
  • 본 논문에서는 기존 클라이언트/서버 환경에서 이용되는 보안 방법에 대해 새로운 방식으로 접근하고 이를 통하여 전통적인 클라이언트/서버 환경의 정보시스템에서 클라이언트를 위조하거나 변조하는 등 해킹시도 및 해킹 여부를 판별하여 안전한 클라이언트 시스템이 작동될 수 있는 일회성 코드를 이용한 보안 프레임워크를 제안한다. 제안된 보안 프레임워크는 기업체의 정보시스템 뿐만 아니라 게임 분야 등에 매우 유용하게 활용될 수 있다.

  • PDF

HRSF: Single Disk Failure Recovery for Liberation Code Based Storage Systems

  • Li, Jun;Hou, Mengshu
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.55-66
    • /
    • 2019
  • Storage system often applies erasure codes to protect against disk failure and ensure system reliability and availability. Liberation code that is a type of coding scheme has been widely used in many storage systems because its encoding and modifying operations are efficient. However, it cannot effectively achieve fast recovery from single disk failure in storage systems, and has great influence on recovery performance as well as response time of client requests. To solve this problem, in this paper, we present HRSF, a Hybrid Recovery method for solving Single disk Failure. We present the optimal algorithm to accelerate failure recovery process. Theoretical analysis proves that our scheme consumes approximately 25% less amount of data read than the conventional method. In the evaluation, we perform extensive experiments by setting different number of disks and chunk sizes. The results show that HRSF outperforms conventional method in terms of the amount of data read and failure recovery time.

P-HDNS : A New Scheme to Support Multilingual Domain Names (한글도메인이름을 지원하기 위한 Proxy HDNS 구현)

  • Kim, Weon;Chin, Yong-Ohk
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.1-10
    • /
    • 1999
  • Given a domain, client applications over the Internet are in support of the DNS (Domain Name System) to get its corresponding IP address. Currently, only domain names expressed by ASCII code are recognized over the Internet. This enforces the usage of ASCII domain names even in countries which use languages based on multilingual code other than ASCII code. In this paper, we present a methodology to support multilingual domain names on top of the existing DNS. The methodology is based on code translation of domain names in multilingual code into ASCII code via UTF5. We implement a gateway, called Proxy Hangul DNS (P-HDNS) based on the proposed methodology. This paper presents the principles of the methodology and the implementation details of P-HDNS.

  • PDF

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Design and Implementation of DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP의 설계 및 구현에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.747-754
    • /
    • 2016
  • DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.

Design and Implementation of Secure Identification and Authentication Model using lava Technology on the Web Environment (웹 환경에서 자바 기술을 이용한 안전한 사용자 식별 및 인증 모델 설계)

  • Song, Gi-Pyeung;Son, Hong;Kim, Sun-Joo;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.433-438
    • /
    • 2000
  • Now, It is vulnerabilities and problems of adaption in user identification and authentication on the Web environments; the BAA(Basic Access Authentication) of HTTP1.0 is that use. ID and password is passed with clear-text between client and server, For this enhancement, the DAA(Digest Access Authentication) of HTTP1.1 is that use. password is digested by MAC(Message Authentication Code) mechanism. but, this mechanism is not adapted by venders of Web browsers. This paper propose the lava based user identification and authentication model to resolve the above problems. Proposed systems are applied to the Web environment, since it has independence to web server and client.

  • PDF

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur Jung-Youn;Truong Le Xuan;Lee Sang-Kyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.357-362
    • /
    • 2005
  • Iris recognition system is the one of the most reliable biometries recognition system. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transformed into polar coordinates. After performing three times Wavelet transformation, normalization was done using a sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compared pairs of two adjacent pixels. The binary code of the iris is transmitted to the server by the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the database. The process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.