• Title/Summary/Keyword: Internet Address

Search Result 887, Processing Time 0.026 seconds

Agent-based Investigation of Business Information from Internet Shopping Malls (에이전트 기반의 인터넷쇼핑몰 사업자신원정보 조사)

  • Sung, Nahk-Hyun
    • Information Systems Review
    • /
    • v.6 no.1
    • /
    • pp.53-66
    • /
    • 2004
  • In Korea, The Consumer Protection Law in Electronic Commerce, which came into effect in July 2002, forced internet shopping malls to provide a minimum of 7 forms of business information, including the name of the business, the name of the representative, geographical address, telephone number, fax number, e-mail address, and business license number, so that consumers could easily identify them. To investigate the shopping malls which do not provide their business information, can lead to confidence in the electronic commerce environment. To investigate the completeness of the business information with the internet shopping malls, this paper proposes the methods of gathering URLs of internet shopping malls, of extracting business information attributes, and an architecture of the agent system. Information extraction in our research is based on synonyms and indicator words of the attributes. With the experiment we showed that the accuracy of our agent system to find out the right business information is 89.3%.

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

Survey on Data Consolidation Issue in the Internet and Corresponding Research (인터넷 데이터 집중화 문제와 대응연구 동향)

  • Jung, H.Y.;Koh, N.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.123-132
    • /
    • 2019
  • The Internet is evolving into a fundamental social infrastructure, similar to electricity and water. In particular, the role of the Internet is becoming more critical as the global digital transformation infrastructure of the 4th industrial revolution. Based on this trend, we note that the Internet is monopolized by a few large organizations even though it was originally designed as a purely distributed system. In this paper, we have reviewed the domination trends, especially in terms of data consolidation. In addition, we have summarized the corresponding research activities from the Internet Society, EU Horizon-2020, and Decentralized web. Further, this paper proposes an approach to address the data consolidation issue from the Korean perspective.

Implementation of TCP/IP Network Address Translation and Port Network Address Translation (TCP/IP 주소 및 포트 변환 기능 구현에 관한 연구)

  • 고문준;민상원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.463-465
    • /
    • 1999
  • 인터넷으로 연결된 모든 장치는 각 나라마다 정해진 권위기관으로부터 고유한 IP 주소를 할당 받게 되는데, 현재 Internet Network Center(Inter NIC)라는 조직에서 이를 전체적으로 관장하고 있다. 최근 인터넷 사용이 급속히 확산되면서 인터넷을 이용하는 모든 장치에 고유 IP 주소를 할당하게 될 경우 고유 주소 체계의 사용 가능한 IP 주소 고갈이라는 문제에 직면하게 되었다. 그러나 이러한 문제는 내부 근거리 통신망(LAN)과 인터넷 상에 IP 주소를 변환시켜 주는 역할을 하는 네트워크 주소 변환(NAT: Network Address Translation) 기능을 이용하여 보완할 수 있다. 본 연구에서는 사설망 사용자의 인터넷 접속을 제공하는 것으로 기존 라우터에 NAT 기능을 적용하여 라우터가 보유한 공인 주소를 각 사용자가 공유하여 인터넷 접속을 제공하는 것으로 기존 라우터에 NAT 기능을 적용하여 라우터가 보유한 공인 주소를 각 사용자가 공유하여 인터넷 접속을 시도하는 것으로 사설망의 IP주소를 공인된 인터넷 주소로 변환시켜 외부로 전송하므로써 가능하다. 또한, 주소 변환 과정으로 사설망에서 사용하는 IP주소가 NAT 기능으로 IP주소가 변경되어 외부 침입자가 사설망의 존재를 알 수 없어 침입을 막는 간접적인 방화벽 기능도 수행한다.

  • PDF

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

A Study of Internet Address Collision Detection Method (인터넷 주소 충돌 감지에 관한 연구)

  • 위선정;임영희;이태헌;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.545-547
    • /
    • 2004
  • Currently possibility of the change of seal computer it increases geometrical progression and the general individuals the knowledge which is special regarding the ip are using the flow child blood which it Provides without from the isp enterprise. But most of the case peon of the school which uses the fixation child blood or the company because is not the knowledge against a TCP/IP address is not oneself at deliberation or real income and it will use the TCP/IP address of the different user and the network whole it will paralyze, the original user will not be able to use the network and it makes. With information where address information where the network administrator present time after data base anger one uses address information of the civil official objective personal computers and network systems of the watch inside in the dictionary is stored will be same from the dissertation which it sees hereupon and the web which it will yell it leads and packet it detects, the use of the TCP/IP address which goes wrong in the user and it notifies the method which is the possibility of closing the paralysis of the network system which it follows in the IP address fringe land due to a deliberation or a real income to sleep it presents it does.

  • PDF

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • v.4 no.4
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

A design and Realization of IP address Protocol collision detection system (IP 주소 프로토콜 충돌 검출시스템 설계 및 연구)

  • 유상민;황태희
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.624-627
    • /
    • 2002
  • In this thesis, a method of solving the IP(Internet Protocol) address collision problem on the Web browser in the TCP/IP based on LAN(Local Area Network). These days a number of computers are increasing in geometrical progression, but general users who are not experts are lack of the knowledge about TCP/IP address, and they may use not only their own but also other users' TCP/IP addresses by mistake or intentionally. For the more they may use IP address which is the same as network equipments and then the situation will cause the whole network to be disturbed. As the result it may be happened that not only the original users' network but also the whole users' one do not operate properly in the LAN.

  • PDF

A design and Realization of IP address Protocol collision detection system (IP 주소 프로토콜 충돌 검출시스템 설계 및 연구)

  • 유상민;황태희
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.916-919
    • /
    • 2002
  • In this thesis, a method of solving the IP(Internet Protocol) address collision problem on the Web browser in the TCP/IP based on LAN(Local Area Network).These days a number of computers are increasing in geometrical progression, but general users who are not experts are lack of the knowledge about TCP/IP address, and they may use not only their own but also other users' TCP/IP addresses by mistake or intentionally. For the more they may use IP address which is the same as network equipments and then the situation will cause the whole network to be disturbed. As the result it may be happened that not only the original users'network but also the whole users' one do not operate properly in the LAN.

  • PDF