• Title/Summary/Keyword: IPS system

Search Result 270, Processing Time 0.024 seconds

Effective Implementation ways for Intrusion Prevention System (효과적인 침입방지시스템 구현 참고사항들)

  • 김광훈;이상진
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.72-74
    • /
    • 2002
  • 컴퓨터 기술과 네트워크 기술이 발전함에 따라 많은 네트워크들이 독립성을 가지게 되었고 이에 따라서 그 취약점들을 이용한 공격들도 늘어나고 있다. 이에 따라 침임을 탐지하는 시스템들은 많이 제안되고 제품화되고 있으나 점점 더 침입 탐지뿐만이 아니라 방지할 수 있는 침입탐지시스템의 개발이 간절히 요구되고 있다. 이 논문에서는 표준이 정해져있지 않은 침입방지시스템(IPS: Intrusion Prevention System)의 설계 및 구현시에 필요한 효과적인 방법들을 제시하고 있다.

  • PDF

Fixed point DSP Implementation of the IEEE 802.11a WLAN modem synchronizer (IEEE 802.11a 무선랜 모뎀 동기부의 고정 소수점 DSP 구현)

  • 정중현;이서구;정윤호;김재석;서정욱;최종찬
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.517-520
    • /
    • 2003
  • Orthogonal Frequency Division Multiplexing (OFDM) is a promising technology for high speed multimedia communication in a frequency selective multipath channel. In this paper, Software IPs for the synchronizer of IEEE 802.11a Wireless LAN system are designed and optimized for TI's TMS320C6201 fixed point DSP. As a result of the execution cycles of the target DSP for each functions of the system, an efficient HW/SW partitioning method can be considered.

  • PDF

Laminate veneer restoration using Empress $2^{\circledR}$ system

  • Kim, Myung-Cho;Moon, Joo-Hoon;Cho, Young-Gon
    • Proceedings of the KACD Conference
    • /
    • 2001.05a
    • /
    • pp.233-234
    • /
    • 2001
  • IPS Empress 2 veneer system was advantageous when veneers required bulk or were under load from function and parafunction activity. Practitioners should consider its use for situations that require a stronger veneer material.

  • PDF

MARGINAL FIT OF CELAY/IN-CERAM, CONVENTIONAL IN-CERAM AND EMPRESS 2 ALL-CERAMIC SINGLE CROWNS (Celay/In-Ceram, Conventional In-Ceram, Empress 2 전부도재관의 변연적합도에 관한 비교 연구)

  • Yang, Jae-Ho;Yeo, In-Sung;Lee, Sun-Hyung;Han, Jung-Suk;Lee, Jai-Bong
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.40 no.2
    • /
    • pp.131-139
    • /
    • 2002
  • There have been many studies about marginal discrepancy of single restorations made by various systems and materials. But many of statistical inferences are not definite because of sample size, measurement number, measuring instruments. etc. The purpose of this study was to compare the marginal adaptations of the anterior single restorations made by different systems and to consider more desirable statistical methods in analysing the marginal fit. The in vitro marginal discrepancies of three different all-ceramic crown systems (Celay In-Ceram. Conventional In-Ceram. IPS Empress 2 layering technique) and one control group (PFM) were evaluated and compared. The crowns were made from one extracted maxillary central incisor prepared with a 1mm shoulder margin and $6^{\circ}$ taper walls by milling machine. 10 crowns per each system were fabricated. Measurements or a crown were recorded at 50 points that were randomly selected for marginal gap evaluation. Non-parametric statistical analysis was performed for the results. Within the limits of this study, the following conclusions were drawn: 1 Mean gap dimensions and standard deviations at the marginal opening for the maxillary incisor crowns were $98.2{\pm}40.6{\mu}m$ for PFM, $83.5{\pm}18.7{\mu}m$ for Celay In-Ceram, $104.9{\pm}44.1{\mu}m$ for conventional In-Ceram, and $45.5{\pm}11.5{\mu}m$ for IPS Empress 2 layering technique. The IPS Empress 2 system showed the smallest marginal gap (P<0.05). The marginal openings of the other three groups were not significantly different (P<0.05). 2 The marginal discrepancies found in this study were all within clinically acceptable standards ($100\sim150{\mu}m$). 3. When the variable is so controlled that the system may be the only one, mean value is interpreted to be the marginal discrepancy of a restoration which is made by each system and standard deviation is to be technique-sensitivity of each one. 4. From the standard deviations. the copy-milling technique (Celay/In-Ceram) was not considered to be technique-sensitive in comparison with other methods. 5. Parametric analysis is more reliable than non-parametric one in interpretation of the mean and standard deviation. The sample size of each group has to be more than 30 to use parametric statistics. The level of clinically acceptable marginal fit has not been established. Further studies are needed.

IDS Performance on MANET with Packet Aggregation Transmissions (패킷취합전송이 있는 MANET에서 IDS 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.695-701
    • /
    • 2014
  • Blackhole attacks having a unauthorized change of routing data will cause critical effects for transmission performance. The transmission performance will be improved to the a certain level by using or having IDS(Intrusion Detection System)/IPS(Intrusion Prevention System) as countermeasures to blackhole attacks. In this papar, the effects of IDS to ene-to-end performance of packet aggregation transmission are analyzed on MANET(Mobile Ad-hoc Network) with IDS under blackhole attacks. MANET simulator based on NS-2 is used to analyze performance parameters as MOS, connection ratio, delay and packet loss rate as standard performance parameters, an another performance factor which is suggested in this paper. VoIP(Voice over Internet Protocol) traffics, one of voice services, is used for performance analysis. A suggestion for IDS implementation on MANET with packet aggregations under blackhole is shown as one of results.

Implementation of a 3D Graphics Hardwired T&L Accelerator based on a SoC Platform for a Mobile System (SoC 플랫폼 기반 모바일용 3차원 그래픽 Hardwired T&L Accelerator 구현)

  • Lee, Kwang-Yeob;Koo, Yong-Seo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.9
    • /
    • pp.59-70
    • /
    • 2007
  • In this paper, we proposed an effective T&L(Transform & Lighting) Processor architecture for a real time 3D graphics acceleration SoC(System on a Chip) in a mobile system. We designed Floating point arithmetic IPs for a T&L processor. And we verified IPs using a SoC Platform. Designed T&L Processor consists of 24 bit floating point data format and 16 bit fixed point data format, and supports the pipeline keeping the balance between Transform process and Lighting process using a parallel computation of 3D graphics. The delay of pipeline processing only Transform operation is almost same as the delay processing both Transform operation and Lighting operation. Designed T&L Processor is implemented and verified using a SoC Platform. The T&L Processor operates at 80MHz frequency in Xilinx-Virtex4 FPGA. The processing speed is measured at the rate of 20M Vertexes/sec.

Selection of Light Character for Marking with Lights on Offshore Wind Farms (해양풍력발전단지 표지등광의 등질선정에 관한 연구)

  • Yang, Hyoung-Seon
    • Journal of Navigation and Port Research
    • /
    • v.38 no.2
    • /
    • pp.105-110
    • /
    • 2014
  • Korean government sets up a goal that jumps up to the third ranked powerful nation of offshore wind in the world until 2020 and announced "The plan for 2.5-gigawatt wind farm off the south-west coast by 2019". Such above, according to green energy policy, offshore wind farms(OWF) will be increased continuously. The development of OWF should be taken account of wind volume as well as marine traffic environment. Specially aids to navigation of OWF play a significant role in preventing collision between vessels navigating near waters and structures. For purpose of distinguishing OWF, IALA recommendations define installation of lights on SPS and IPS. However, there is no mention of light character that plays important role in identification of lights as marking offshore wind farm. Also the research on selection of proper light character has been insufficient state. Therefore in this paper, we analyzed internal and external regulations concerned marking with light on SPS and IPS in OWF. And suggested patterns and rhythms of light having not only easily recognized feature but also no confusion with other light of aids to navigation. The proposed light characters were verified by simulation, and the results were analysed that synchronism flickering of "Fl Y(4) 12s(SPS)" and "Fl Y 6s(IPS)" would be useful in combination of both lights.

Hardware Design for JBIG2 Encoder on Embedded System (임베디드용 JBIG2 부호화기의 하드웨어 설계)

  • Seo, Seok-Yong;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.182-192
    • /
    • 2010
  • This paper proposes the hardware IP design of JBIG2 encoder. In order to facilitate the next generation FAX after the standardization of JBIG2, major modules of JBIG2 encoder are designed and implemented, such as symbol extraction module, Huffman coder, MMR coder, and MQ coder. ImpulseC Codeveloper and Xilinx ISE/EDK program are used for the synthesis of VHDL code. To minimize the memory usage, 128 lines of input image are processed succesively instead of total image. The synthesized IPs are downloaded to Virtex-4 FX60 FPGA on ML410 development board. The four synthesized IPs utilize 36.7% of total slice of FPGA. Using Active-HDL tool, the generated IPs were verified showing normal operation. Compared with the software operation using microblaze cpu on ML410 board, the synthesized IPs are better in operation time. The improvement ratio of operation time between the synthesized IP and software is 17 times in case of symbol extraction IP, and 10 times in Huffman coder IP. MMR coder IP shows 6 times faster and MQ coder IP shows 2.2 times faster than software only operation. The synthesized H/W IP and S/W module cooperated to succeed in compressing the CCITT standard document.

k-Interest Places Search Algorithm for Location Search Map Service (위치 검색 지도 서비스를 위한 k관심지역 검색 기법)

  • Cho, Sunghwan;Lee, Gyoungju;Yu, Kiyun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.4
    • /
    • pp.259-267
    • /
    • 2013
  • GIS-based web map service is all the more accessible to the public. Among others, location query services are most frequently utilized, which are currently restricted to only one keyword search. Although there increases the demand for the service for querying multiple keywords corresponding to sequential activities(banking, having lunch, watching movie, and other activities) in various locations POI, such service is yet to be provided. The objective of the paper is to develop the k-IPS algorithm for quickly and accurately querying multiple POIs that internet users input and locating the search outcomes on a web map. The algorithm is developed by utilizing hierarchical tree structure of $R^*$-tree indexing technique to produce overlapped geometric regions. By using recursive $R^*$-tree index based spatial join process, the performance of the current spatial join operation was improved. The performance of the algorithm is tested by applying 2, 3, and 4 multiple POIs for spatial query selected from 159 keyword set. About 90% of the test outcomes are produced within 0.1 second. The algorithm proposed in this paper is expected to be utilized for providing a variety of location-based query services, of which demand increases to conveniently support for citizens' daily activities.

A High Performance IPS Based on Signature Hashing (시그너처 해싱에 기반한 고성능 침입방지 시스템)

  • Wang, Jeong-Seok;Kwon, Hui-Ung;Jung, Yun-Jae;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.489-494
    • /
    • 2007
  • 침입방지 시스템(IPS, Intrusion Prevention System)은 인라인모드(in-line mode)로 네트워크에 설치되어, 네트워크를 지나는 패킷 또는 세션을 검사하여 만일 그 패킷에서 공격이 감지되면 해당 패킷을 폐기하거나 세션을 종료시킴으로서 외부의 침입으로부터 네트워크를 보호하는 시스템을 의미한다. 침입방지 시스템은 크게 두 가지 종류의 동작을 수행한다. 하나는 이미 알려진 공격으로부터 방어하는 시그너처 기반 필터링(signature based filtering)이고 다른 하나는 알려지지 않은 공격이나 비정상 세션으로부터 방어하는 자기 학습 기반의 변칙 탐지 및 방지(anomaly detection and prevention based on selflearning)이다. 시그너처 기반 필터링에서는 침입방지시스템을 통과하는 패킷의 페이로드와 시그너처라고 불리는 공격 패턴들과 비교하여 같으면 그 패킷을 폐기한다. 시그너처의 개수가 증가함에 따라 하나의 들어온 패킷에 대하여 요구되는 패턴 매칭 시간은 증가하게 되어 패킷지연 없이 동작하는 고성능 침입탐지시스템을 개발하는 것이 어렵게 되었다. 공개 침입방지 소프트웨어인 SNORT를 위한 여러 개의 효율적인 패턴 매칭 방식들이 제안되었는데 시그너처들의 공통된 부분에 대해 한번만 매칭을 수행하거나 한 바이트 단위 비교대신 여러 바이트 비교 동작을 수행함으로써 불필요한 매칭동작을 줄이려고 하였다. 본 논문에서는 패턴 매칭 시간을 시그너처의 개수와 무관하게 하기 위하여 시그너처 해싱 기반에 기반한 고성능 침입방지시스템을 제안한다.

  • PDF