• Title/Summary/Keyword: Information Server

Search Result 5,849, Processing Time 0.03 seconds

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

A Study on Application Plan LTE Wireless Network in the Container Terminal Yard (컨테이너터미널 장치장에서 무선네트워크 LTE 적용방안에 관한 연구)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.40 no.1
    • /
    • pp.43-50
    • /
    • 2016
  • Amid of the logistics hub center competition is going to intensifying between the world major port, it is essential to pre-occupied the base in the logistics hub world take advantage of advanced technology of logistics equipment than other ports. In existing container terminal, when container moves the terminal use the omnidirectional and directional antenna in order to exchange data information on the basis of 802.11 wireless network system. Case of loading height of exceeding, the blind sport will occur and a limited frequency channel can't help using in the area. A limited frequency channel usage and nested areas happen to use the closed terminal, it has a great influence to operate the terminal working. In this paper, LTE network is configured provided by the specified company ('L' Corp,.Ltd) and terminal data extracted through LBO (Local Breakout) in the cell site which is configured directly with container terminal operation server. Using this method, container terminal yard equipment operate without overlapping arises with uninterrupted data presented for ways to efficiently. I would suggest both the existing wireless AP LAN configuration of container terminal and new LTE system and applied to the real yard operating devices situations. Through these methods presented comparative the existing network traffic with new constructed LTE configuration. I admired to suggest that wireless network LTE introduction is fundamental factors to get rid of the blind spot, the problem of limited frequency channel and overlapping arises. These essential points can be a continual improving terminal services and more efficient terminal operational management.

Development of Unique Naming Algorithm for 3D Straight Bridge Model Using Object Identification (3차원 직선교 모델 객체의 인식을 통한 고유 명칭부여 알고리즘 개발)

  • Park, Junwon;Park, Sang Il;Kim, Bong-Geun;Yoon, Young-Cheol;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.557-564
    • /
    • 2014
  • In this study, we present an algorithm that conducts an unique naming process for the bridge object through the solid object identification focused on 3D straight bridge model. For the recognition of 3D objects, the numerical algorithm utilizes centroid point, and solid object on the local coordination system. It classifies the object feature set by classifying the objects and members based on the bridge direction. By doing so, unique names, which contain the information about span, members and order of the object, were determined and the suitability of this naming algorithm was examined through a truss bridge model and a bridge model with different coordinate systems. Also, the naming process based on the object feature set was carried out for the real 3D bridge model and then was applied to the module on local server and mobile device for real bridge inspection work. From the comparison of the developed naming algorithm based on object identification and the conventional one based on field inspection, it was shown that the conventional field inspection work can be effectively improved.

Development of Stand-Alone Risk Assessment Software for Optimized Maintenance Planning of Power Plant Facilities (발전설비 최적 정비를 위한 독립형 위험도 평가 소프트웨어 개발)

  • Choi, Woo Sung;Song, Gee Wook;Kim, Bum Shin;Chang, Sung Ho;Lee, Sang Min
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1169-1174
    • /
    • 2015
  • Risk-Risk-based inspection (RBI) has been developed in order to identify risky equipments that can cause major accidents or damages in large-scale plants. This assessment evaluates the equipment's risk, categorizes their priorities based on risk level, and then determines the urgency of their maintenance or allocates maintenance resources. An earlier version of the risk-based assessment software is already installed within the equipment management system; however, the assessment is based on examination by an inspector, and the results can be influenced by his subjective judgment, rather than assessment being based on failure probability. Moreover, the system is housed within a server, which limits the inspector's work space and time, and such a system can be used only on site. In this paper, the development of independent risk-based assessment software is introduced; this software calculates the failure probability by an analytical method, and analyzes the field inspection results, as well as inspection effectiveness. It can also operate on site, since it can be installed on an independent platform, and has the ability to generate an I/O function for the field inspection results regarding the period for an optimum maintenance cycle. This program will provide useful information not only to the field users who are participating in maintenance, but also to the engineers who need to decide whether to extend the lifecycle of the power machinery or replace only specific components.

Development of the video-based smart utterance deep analyser (SUDA) application (동영상 기반 자동 발화 심층 분석(SUDA) 어플리케이션 개발)

  • Lee, Soo-Bok;Kwak, Hyo-Jung;Yun, Jae-Min;Shin, Dong-Chun;Sim, Hyun-Sub
    • Phonetics and Speech Sciences
    • /
    • v.12 no.2
    • /
    • pp.63-72
    • /
    • 2020
  • This study aims to develop a video-based smart utterance deep analyser (SUDA) application that analyzes semiautomatically the utterances that child and mother produce during interactions over time. SUDA runs on the platform of Android, iPhones, and tablet PCs, and allows video recording and uploading to server. In this device, user modes are divided into three modes: expert mode, general mode and manager mode. In the expert mode which is useful for speech and language evaluation, the subject's utterances are analyzed semi-automatically by measuring speech and language factors such as disfluency, morpheme, syllable, word, articulation rate and response time, etc. In the general mode, the outcome of utterance analysis is provided in a graph form, and the manger mode is accessed only to the administrator controlling the entire system, such as utterance analysis and video deletion. SUDA helps to reduce clinicians' and researchers' work burden by saving time for utterance analysis. It also helps parents to receive detailed information about speech and language development of their child easily. Further, this device will contribute to building a big longitudinal data enough to explore predictors of stuttering recovery and persistence.

Construction of web-based Database for Haliotis SNP (웹기반 전복류 (Haliotis) SNP 데이터베이스 구축)

  • Jeong, Ji-Eun;Lee, Jae-Bong;Kang, Se-Won;Baek, Moon-Ki;Han, Yeon-Soo;Choi, Tae-Jin;Kang, Jung-Ha;Lee, Yong-Seok
    • The Korean Journal of Malacology
    • /
    • v.26 no.2
    • /
    • pp.185-188
    • /
    • 2010
  • The Web-based the genus Haliotis SNP database was constructed on the basis of Intel Server Platform ZSS130 dual Xeon 3.2 GHz cpu and Linux-based (Cent OS) operating system. Haliotis related sequences (2,830 nucleotide sequences, 9,102 EST sequences) were downloaded through NCBI taxonomy browser. In order to eliminate vector sequences, we conducted vector masking step using cross match software with vector sequence database. In addition, poly-A tails were removed using Trimmest software from EMBOSS package. The processed sequences were clustered and assembled by TGICL package (TIGR tools) equipped with CAP3 software. A web-based interface (Haliotis SNP Database, http://www.haliotis.or.kr) was developed to enable optimal use of the clustered assemblies. The Clustering Res. menu shows the contig sequences from the clustering, the alignment results and sequences from each cluster. And also we can compare any sequences with Haliotis related sequences in BLAST menu. The search menu is equipped with its own search engine so that it is possible to search all of the information in the database using the name of a gene, accession number and/or species name. Taken together, the Web-based SNP database for Haliotis will be valuable to develop SNPs of Haliotis in the future.

Broadcast Method based on Data Access Frequencies and Semantic Relationships in Mobile Computing Environments (이동컴퓨팅 환경에서 데이타의 접근빈도 및 시맨틱 관계를 고려한 방송 방법)

  • 최성환;정성원;이송이
    • Journal of KIISE:Databases
    • /
    • v.30 no.5
    • /
    • pp.476-493
    • /
    • 2003
  • Data broadcast is an effective data transmission method from a data base server to numerous mobile clients due to the restrictions on mobile environment such as low wireless communication bandwidth and energy shortage of mobile devices. There are various broadcast methods based on clients' data access frequencies or semantic relationship of data. The broadcast schedule based only on the access frequencies does not consider semantic relations of data, so that when a client needs to access a series of semantically related data, the client has to listen to the wireless channel for a long time. On the other hand, the broadcast schedule based only on semantic relationship of data makes data access time longer when clients highly request specific data which are not semantically related but frequently accessed. In this paper, we present an efficient data broadcast method based on not only data access frequencies but also semantic relationship to improve mobile clients' query response time. The new hybrid broadcast method we propose creates a data broadcast schedule according to the data access frequencies and then the schedule is adjusted to reflect semantic relationship of data. We show our method is efficient by experimental performance analysis.

Design and Evaluation of a Buffering Patching Technique for VOD Systems (주문형 비디오 시스템을 위한 버퍼링 패칭 기법의 설계 및 평가)

  • 하숙정;배인한
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.10
    • /
    • pp.523-532
    • /
    • 2003
  • Video on Demand(VOD) services cause high resource consumption in a video seuer, because multimedia are characterized by continuous playback, a high bandwidth requirement, and long playback duration. Patching has been proposed to save the network I/O bandwidth of a video server. To achieve true VOD, patching uses multicasting to share video streams, thereby providing immediate VOD services to users without any service latency. A communication channel is used to either multicast the entire video as a regular channel or multicast only the leading portion of a video as a Patching channel. This paper Proposes a buffering patching technique that divides regular channels, as used in patching, into sub-regular channels and regular channels to shorten the holding time of the channels. In the proposed technique, the last portion of video data, corresponding to the size of the buffering window, is not transferred by sub-regular channels, but rather downloaded and buffered in the user buffer from the latest regular channel. When simulations were performed to compare the performance of the proposed technique with that of conventional patching, the results indicated that the proposed technique was superior in terms of the defection rate, average service latency, and fairness, although the amount of video data buffered at each user station was higher than that with patching.

AS B-tree: A study on the enhancement of the insertion performance of B-tree on SSD (AS B-트리: SSD를 사용한 B-트리에서 삽입 성능 향상에 관한 연구)

  • Kim, Sung-Ho;Roh, Hong-Chan;Lee, Dae-Wook;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.157-168
    • /
    • 2011
  • Recently flash memory has been being utilized as a main storage device in mobile devices, and flashSSDs are getting popularity as a major storage device in laptop and desktop computers, and even in enterprise-level server machines. Unlike HDDs, on flash memory, the overwrite operation is not able to be performed unless it is preceded by the erase operation to the same block. To address this, FTL(Flash memory Translation Layer) is employed on flash memory. Even though the modified data block is overwritten to the same logical address, FTL writes the updated data block to the different physical address from the previous one, mapping the logical address to the new physical address. This enables flash memory to avoid the high block-erase cost. A flashSSD has an array of NAND flash memory packages so it can access one or more flash memory packages in parallel at once. To take advantage of the internal parallelism of flashSSDs, it is beneficial for DBMSs to request I/O operations on sequential logical addresses. However, the B-tree structure, which is a representative index scheme of current relational DBMSs, produces excessive I/O operations in random order when its node structures are updated. Therefore, the original b-tree is not favorable to SSD. In this paper, we propose AS(Always Sequential) B-tree that writes the updated node contiguously to the previously written node in the logical address for every update operation. In the experiments, AS B-tree enhanced 21% of B-tree's insertion performance.

A Design and Implementation of A Robot Client Middleware for Network-based Intelligent Robot based on Service-Oriented (지능형 네트워크 로봇을 위한 서비스 지향적인 로봇 클라이언트 미들웨어 설계와 구현)

  • Kwak, Dong-Gyu;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Network-based intelligent robot is connected with network system, provides interactions with humans, and carries out its own roles on ubiquitous computing environments. URC (Ubiquitous Robot Companion) robot has been proposed to develop network-based robot by applying distributed computing techniques. On URC robot, it is possible to save the computing power of robot client by environments, has been proposed to develop robot software using service-oriented architecture on server-client computing environments. The SOMAR client robot consists of two layers - device service layer and robot service layer. The device service controls physical devices, and the robot service abstracts robot's services, which are newly defined and generated by combining many device services. RSEL (Robot Service Executing Language) is defined in this paper to represent relations and connections between device services and robot services. A RESL document, including robot services by combining several device services, is translated to a programming language for robot client system using RSEL translator, then the translated source program is compiled and uploaded to robot client system with RPC (Remote Procedure Call) command. A SOMAR client system is easy to be applied to embedded systems of host/target architecture. Moreover it is possible to produce a light-weight URC client robot by reducing workload of RSEL processing engine.