• Title/Summary/Keyword: DNS

Search Result 468, Processing Time 0.03 seconds

A Service Discovery Scheme Based on NAPTR Resource Record (NAPTR 자원레코드 기반의 서비스 탐색기법)

  • 권성호;김희철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2003
  • NAPRT(Naming Authority Pointer) is a type of resource record specified in IETF RFC 2915. NAPTR enables to register various services in the Domain Name Systems and thus provides a way to discover services available on specific hosts. This paper describes the design and implementation of a Proxy DNS system aimed at supporting NAPTRs. The goal of this work is to study on the feasibility of the service discovery registered in DNS via NAPTR records and provides the result for simplicity and extensibility of implementation through the implementation of a actual Test-bed system This research result can be applied to service discovery in the resource information management for high performance GRE environments as well as to the implementation of DNS infrastructure for the ENUM.

  • PDF

A study on an Efficient Kerberos Authentication based on X.509 (X.509 인터넷 공개키 기반구조에서 Kerberos 인증에 관한 연구)

  • 김철현;신광철;김창원
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.5
    • /
    • pp.641-652
    • /
    • 2002
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Group. Bid to certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, acquire public key from DNS server by chain (CertPath) between realms by certification and Key exchange way that provide service between realms applying X.509, DS/DNS of PKINIT base. In order to provide regional services, Certification and key exchange between realms use Kerberos symmetric method and Session connection used Directory service to connection X.509 is designed using an asymmetric method. By efficient TGT (Ticket Granting Ticket) exchange and reusability of ticket, A Design of Kerberos system that have effect and simplification of certification formality that reduce overload on communication.

  • PDF

Method of Preventing DDoS Using Proxy Server Group and Dynamic DNS (Proxy Server Group과 Dynamic DNS를 이용한 DDoS 방어 구축 방안)

  • Shin, Sang Il;Kim, Min Su;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.101-106
    • /
    • 2012
  • As the existing strategy of preventing DDoS(Distributed Denial of Service) attacks has limitations, this study is intended to suggest the more effective method of preventing DDoS attacks which reduces attack power and distributes attack targets. Currently, DDoS attacks have a wide range of targets such as individuals, businesses, labs, universities, major portal sites and financial institutions. In addition, types of attacks change from exhausting layer 3, network band to primarily targeting layer 7. In response to DDoS attacks, this study suggests how to distribute and decrease DDoS threats effectively and efficiently using Proxy Server Group and Dynamic DNS.

Multiple Source Modeling of Low-Reynolds-Number Dissipation Rate Equation with Aids of DNS Data

  • Park, Young-Don;Shin, Jong-Keun;Chun, Kun-Go
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.392-402
    • /
    • 2001
  • The paper reports a multiple source modeling of low-Reynolds-number dissipation rate equation with aids of DNS data. The key features of the model are to satisfy the wall limiting conditions of the individual source terms in the exact dissipation rate equation using the wall damping functions. The wall damping functions are formulated in term of dimensionless dissipation length scale ι(sup)+(sub)D(≡ι(sub)D($\upsilon$$\xi$)(sup)1/4/$\upsilon$) and the invariants of small and large scale turbulence anisotropy tensors. $\alpha$(sub)ij(=$\mu$(sub)i$\mu$(sub)j/$\kappa$-2$\delta$(sub)ij/3) and e(sub)ij(=$\xi$(sub)ij/$\xi$-2$\delta$(sub)ij/3). The model constants are optimized with aids of DNS data in a plane channel flow. Adopting the dissipation length scale as a parameter of damping function, the applicabilities of $\kappa$-$\xi$ model are extended to the turbulent flow calculation of complex flow passages.

  • PDF

Study on Recursive DNS Composition Model Using Tunneling Technic for IPv6 Network Transition (IPv6 망 전이를 위해 터널링 기술을 이용한 Recursive DNS 구성 모델 연구)

  • Kim, Jin-Seok;Seo, Yu-Hwa;Lee, Ki-Young;Shin, Yong-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.334-337
    • /
    • 2006
  • 현재 전 세계는 IPv4 주소 자원의 고갈에 대비한 IPv6의 도입을 위해 국가 차원의 전략적인 노력을 기울이고 있으며, 이에 따라 IPv4망에서 IPv6망으로의 안정적인 전이를 위한 상호 운영기술이 지속적으로 개발되고 있다. 이러한 기술을 적용하기 위한 다양한 응용 프로그램의 운영을 위해서 IPv6 기반의 DNS 기술은 그 핵심적인 요소라 할 수 있다. 그러나 현재 IPv4로 이루어져 있는 환경에서 바로 IPv6 환경으로의 변경이 어렵기 때문에 IPv6 네트워크 환경으로의 전이 과정에서 발생되는 IPv4와 IPv6의 네트워크의 공존 환경에서 트래픽을 안정적으로 전달하기 위한 기술이 필요하게 되었다. 이런 IPv4와 IPv6 상호 운용 기술을 이용하여 본 논문에서는 IPv4와 IPv6가 혼재한 망에서 안정적인 IPv6 Recursive DNS을 구성하기 위하여 상호 운용 기술 중 터널링 기술을 이용한 IPv6 Recursive DNS 구성 방안을 제시하여 혼재한 IPv4 와 IPv6 DNS를 운영하기 위한 구성모델을 제안한다.

  • PDF

Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method (DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계)

  • Kim, Kwang-Sup;Park, Young-Gil;Ro, Soong-Hwan;Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1955-1962
    • /
    • 2012
  • Recently the flow of information security has become a user-centered change. This is mostly breach of security by the normal and abnormal entering harmful files during user internet. Therefore, we would like to design security system that breach of security can be prevented in advance to improve using the reliability of DNS and system control in this paper. In other words, we would like to suggest method can be block randomly to access the site which information security system of user-centric is breached harmful files infected in user computer.

Direct Numerical Simulation of Turbulent Heat Transfer to Fluids at Supercritical Pressure Flowing in Vertical Tubes (직접수치모사를 이용한 수직원형관내 초임계압 유체의 난류 열전달 특성 연구)

  • Bae, Joong-Hun;Yoo, Jung-Yul;Choi, Hae-Cheon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.11
    • /
    • pp.1302-1314
    • /
    • 2004
  • Turbulent heat transfer to $CO_2$ at supercritical pressure flowing in vertical tubes is investigated using direct numerical simulation (DNS). A conservative space-time discretization scheme for variable-density flows at low Mach numbers is adopted in the present study to treat steep variations of fluid properties at supercritical pressure just above the thermodynamic critical point. The fluid properties at these conditions are obtained using PROPATH and used in the form of tables in the simulations. The buoyancy influence induced by strong variation of density across the pseudo-critical temperature proved to play a major role in turbulent heat transfer at supercritical state. Depending on the degree of buoyancy influence, turbulent heat transfer may be enhanced or significantly deteriorated, resulting in local hot spots along the heated surface. Based on the results of the present DNS combined with theoretical considerations, the physical mechanism of this local heat transfer deterioration is elucidated.

DNS and Analysis on the Interscale Interactions of the Turbulent Flow past a Circular Cylinder for Large Eddy Simulation (원형 실린더를 지나는 난류 유동장의 직접수치해석과 큰 에디모사를 위한 스케일 간 상호작용 연구)

  • Kim, Taek-Keun;Park, No-Ma;Yoo, Jung-Yul
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.1801-1806
    • /
    • 2004
  • Stochastic nature of subgrid-scale stress causes the predictability problem in large eddy simulation (LES) by which the LES solution field decorrelates with field from filtered directnumerical simulation (DNS). In order to evaluate the predictability limit in a priori sense, the information on the interplay between resolved scale and subgrid-scale (SGS) is required. In this study, the analysis on the inter-scale interaction is performed by applying tophat and cutoff filters to DNS database of flow over a circular cylinder at Reynolds number of 3900. The effect of filter shape is investigated on the interpretation of correlation between scales. A critique is given on the use of tophat filter for SGS analysis using DNS database. It is shown that correlations between Karman vortex and SGS kinetic energy drastically decrease when the cutoff filter is used, which implies that the small scale universality holds even in the presence of the large scale coherent structure.

  • PDF

Multiphase turbulence mechanisms identification from consistent analysis of direct numerical simulation data

  • Magolan, Ben;Baglietto, Emilio;Brown, Cameron;Bolotnov, Igor A.;Tryggvason, Gretar;Lu, Jiacai
    • Nuclear Engineering and Technology
    • /
    • v.49 no.6
    • /
    • pp.1318-1325
    • /
    • 2017
  • Direct Numerical Simulation (DNS) serves as an irreplaceable tool to probe the complexities of multiphase flow and identify turbulent mechanisms that elude conventional experimental measurement techniques. The insights unlocked via its careful analysis can be used to guide the formulation and development of turbulence models used in multiphase computational fluid dynamics simulations of nuclear reactor applications. Here, we perform statistical analyses of DNS bubbly flow data generated by Bolotnov ($Re_{\tau}=400$) and LueTryggvason ($Re_{\tau}=150$), examining single-point statistics of mean and turbulent liquid properties, turbulent kinetic energy budgets, and two-point correlations in space and time. Deformability of the bubble interface is shown to have a dramatic impact on the liquid turbulent stresses and energy budgets. A reduction in temporal and spatial correlations for the streamwise turbulent stress (uu) is also observed at wall-normal distances of $y^+=15$, $y/{\delta}=0.5$, and $y/{\delta}=1.0$. These observations motivate the need for adaptation of length and time scales for bubble-induced turbulence models and serve as guidelines for future analyses of DNS bubbly flow data.

Hacking Countermeasures for Wireless Internet Service (무선 인터넷 서비스를 위한 해킹 대응 방안)

  • Kook, Jung Gak;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.79-90
    • /
    • 2016
  • Wireless internet service is an important factor to support all industries. In order to connect and use the smart phones or the laptop via a wireless Internet connection, it has been increasing the hacking risks associated with it. As information spills through the DNS address modulation of the Internet router, hacking threats through a wireless router is present. In this paper, we are dealing with the hacking technique utilizing the overall vulnerability of a wireless LAN. We analyzed the need for the wireless LAN security through WEP encryption algorithm and the improved encryption algorithm. In addition, we presented a countermeasure against these hacking technologies which is WEP Crack using wireless vulnerability hacking technology, DDoS attacks, DNS Spoofing.