• Title/Summary/Keyword: Distributed Security

검색결과 928건 처리시간 0.029초

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권7호
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

철도용 연료전지 및 유도급전을 이용한 Hybrid system 연구 (The Study of Hybrid system using FC and IPT for Railway system)

  • 한경희;이병송;박현준;권삼영;백수현
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 추계학술대회 논문집 전기기기 및 에너지변환시스템부문
    • /
    • pp.218-220
    • /
    • 2008
  • Urban air quality, including carbon-dioxide emissions, and national energy security are related issues affecting the rail industry and transportation sector as a whole. They are related by the fact that (in the United States) 97-98% of the energy for the transport sector is based on oil, and more than 60% is imported. A fuelcell locomotive combines the environmental advantages of a catenary-electric locomotive with the higher overall energy efficiency and lower infrastructure costs of a diesel-electric. Catenaryelectric locomotives, when viewed as only one component of a distributed machine that includes an electricity-generating plant and transmission lines, are the least energy-efficient locomotive type. The natural fuel for a fuelcell is hydrogen, which can be produced from many renewable energies and nuclear energy, and thus a hydrogen-fuelcell locomotive will not depend on imported oil for its energy supply. This paper proposes a base models of Hybrid fuel cell/IPT railway vehicle power system, the necessary of this research.

  • PDF

스마트 공간을 위한 참여 제어 시스템의 설계 및 구현 (Design and Implementation of Admission Control System in Smart Space)

  • 양종필;심미선;신원;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제9권3호
    • /
    • pp.342-352
    • /
    • 2006
  • 오늘날 컴퓨팅 환경은 유비쿼터스로 변화하고 있다. 유비쿼터스 컴퓨팅 환경은 사용자들이 언제 어디서나 컴퓨팅 자원에 접근할 수 있는 스마트 공간(Smart space)으로 실현될 것이다. 그러나 스마트 공간내의 자원들에게 사전에 신뢰받지 못한 상태의 사용자들이 안전하게 자원들에 접근하기 위해서는 사용자들과 자원들 사이에 안전한 신뢰 관계를 형성하기 위한 기법이 요구된다. 본 논문에서는 유비쿼터스 컴퓨팅 환경에서의 신뢰 관계 형성을 위하여 기존에 제안된 분산된 신뢰(Distributed trust) 기법의 "악의적 권한 위임"과 "위임권한 취소"에 대한 보안 문제점을 지적하고, 보안성이 개선된 새로운 참여 제어 시스템을 제안한 후 이를 구현한다.

  • PDF

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제18권7호
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

행정기관 SNS 이용의 결정요인 (The Determinants of the Usage of Government Institutions' SNS)

  • 손달호;유성필
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제24권3호
    • /
    • pp.95-114
    • /
    • 2015
  • Purpose: This study was tried to investigate a structural relationship among key impacting factors and usage in SNS of government institutions. It was designed to research the processing property of SNS, the emotional property of SNS, and the service property of SNS for the SNS usage. Based on the research framework from the relationships among intrinsic SNS characteristics, social psychological characteristics, and the attitude of government institutions' SNS, the empirical research model and the hypotheses were established. Design/methodology/approach: Data for empirical study were collected from 453 of total distributed 500 by the structured questionnaire survey with SNS users of government institutions. The analysis was performed from effective 432 data, and the sample was mainly consisted of men, the thirty-old, and salesmen. Findings: The results showed that the emotional and service properties in intrinsic characteristics of SNS have a significantly positive effect to the value perception and the security variable in social psychological characteristics has a significant positive effects to the trust. Finally, the value perception has positive effects on both trust and use intention of government institutions' SNS. Meaning of these results is that intrinsic SNS characteristics, social psychological characteristics, and the attitude of government institutions' SNS have a significant effect on SNS usage.

Multimedia Presentation Authoring and Virtual Collaboration in Medicine

  • Hong, Chul-Eui
    • Journal of information and communication convergence engineering
    • /
    • 제8권6호
    • /
    • pp.690-696
    • /
    • 2010
  • Web-based virtual collaboration is increasingly gaining popularity in almost every area in our society due to the fact that it can bridge the gap imposed by time and geographical constraints. However, in medical field, such collaboration has been less popular than other fields. Some of the reasons were timeliness, security, and preciseness of the information they are dealing with. In this paper, we are proposing a web-based distributed medical collaboration system called Virtual Collaboration System for Medicine (VCSM) for medical doctors that meet the needs. The proposed system consists of two parts - multimedia presentation and recordable virtual collaboration. The former supports synchronized multimedia presentation using Synchronous Multimedia Integration Language (SMIL.) It allows synchronization of the contents of a PowerPoint presentation file and a video file. The presentation may be provided to the participants before the discussion begins. Next, in the virtual collaboration stage, participants can use text along with associated symbols during the discussion over the presented medical images. The symbols such as arrows or polygons can be set or removed dynamically to represent areas of interest in digital images using so called layered architecture that separates image layer from annotation layer. XML files are used to record participants' opinions along with the symbols over some particular images

Grid 기반 PACS 설계 및 구현 (Design and Implementation of Grid-based PACS)

  • 김정수;이세열;박진섭;이봉환
    • 인터넷정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.143-156
    • /
    • 2008
  • 그리드 기반의 PACS는 원격의 PACS 간 의료 이미지 데이터 전송 및 협업, 원격진단, 가상병원과 같은 향상된 의료정보서비스 제공을 가능하게 한다. 본 논문에서는 Grid-PACS를 구현하여 지금까지 PACS에서 요구되어 왔던 스토리지의 안전성과 확장성을 보장하기 위한 가상 대용량 스토리지를 구현하였다. 대용량의 작업처리가 가능한 그리드 기반 서비스 시스템은 기존의 PACS에서 제공하는 파일 전송 방식보다 안정되고 전송 시간 측면에서 향상된 성능을 보였다. 본 연구 결과는 병원간 PACS 데이터 관리 및 전송에 있어서 효율성을 제고할 수 있는 분야에 적용 가능하다.

  • PDF

ObjectPeerWork : 공유 객체 모델 기반의 피어투피어 어플리케이션 개발을 위한 프레임워크 (ObjectPeerWork : Framework for the Development of Peer-to-Peer Applications based on Shared Object Model)

  • 강운구;왕창종
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제7권6호
    • /
    • pp.630-640
    • /
    • 2001
  • 본 논문에서는 공유 객체 모델 기반의 P2P(Peer-to-Peer) 애플리케이션을 개발하기 위한 프레임워크인 ObjectPeerWork를 설계 및 구현한다. 공유 객체 모델은 자원 관리 기능들을 자원에 포함시킴으로써 관리를 위한 컴퓨팅 파워의 저하를 막고, 보안 문제를 개선함으로써 공유 자원에 대한 신뢰도를 향상시킬 수 있다. 또한, 공유 객체 모델은 분산 컴포넌트 기반의 요청 중계 관리자 및 모듈 컨테이너를 통하여 확장이 가능한 모델이다. 이러한 공유 객체 모델에 기만한 ObjectPeerWork는 일반적인 P2P 모델의 문제점들을 개선하여 기업 내 정보시스템 구축과 컴퓨팅 파워의 분산 및 자원의 효율적인 관리를 가능하게 하는 프레임워크이다.

  • PDF

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권12호
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

수중음향기법을 이용한 용담호의 어류 분포특성 연구 (Hydroacoustic Survey of Fish Distribution and Aggregation Characteristics in the Yongdam Reservoir, Korea)

  • 이형빈;이경훈;김성훈;김인옥;강돈혁
    • 한국수산과학회지
    • /
    • 제47권6호
    • /
    • pp.1055-1062
    • /
    • 2014
  • Hydroacoustic surveys were conducted for spatio-temporal distribution and size estimation of fish in the Yongdam reservoir, Korea, from April to July 2014. Acoustic data were collected along acoustic transects using a 120 kHz scientific echosounder. The received acoustic data were the in situ acoustic target strength (dB) and nautical area scattering coefficient ($m^2/mile^2$). Data on fish behavioral patterns and size were collected using a DIDSON acoustic camera at stationary stations. Fish were mainly distributed in the center channel and close to the outer Yongdam reservoir. Acoustic density of fish in the summer season were higher than in the spring season. The seasonal vertical distribution pattern of fish aggregations may be strongly related to the vertical temperature structure. The size distribution of fish obtained from an acoustic camera correlated well with the acoustic size of fish from an echosounder.