• Title/Summary/Keyword: Internet Infrastructure

Search Result 913, Processing Time 0.027 seconds

Internet Security Readiness: The Influence of Internet Usage Level and Awareness on Internet Security Readiness Capital, Skill, and Actual Uptake/Use of Infrastructure

  • Ryoo, Jung-Woo;Park, Eun-A
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.33-50
    • /
    • 2011
  • In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.

Autonomous, Scalable, and Resilient Overlay Infrastructure

  • Shami, Khaldoon;Magoni, Damien;Lorenz, Pascal
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.378-390
    • /
    • 2006
  • Many distributed applications build overlays on top of the Internet. Several unsolved issues at the network layer can explain this trend to implement network services such as multicast, mobility, and security at the application layer. On one hand, overlays creating basic topologies are usually limited in flexibility and scalability. On the other hand, overlays creating complex topologies require some form of application level addressing, routing, and naming mechanisms. Our aim is to design an efficient and robust addressing, routing, and naming infrastructure for these complex overlays. Our only assumption is that they are deployed over the Internet topology. Applications that use our middleware will be relieved from managing their own overlay topologies. Our infrastructure is based on the separation of the naming and the addressing planes and provides a convergence plane for the current heterogeneous Internet environment. To implement this property, we have designed a scalable distributed k-resilient name to address binding system. This paper describes the design of our overlay infrastructure and presents performance results concerning its routing scalability, its path inflation efficiency and its resilience to network dynamics.

An Assessment of ICT Infrastructure, Deployment and Applications in the Science and Technology (S&T) Research Institutions in Ghana

  • Kwafoa, Paulina Nana Yaa;Entsua-Mensah, Clement
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.11 no.1
    • /
    • pp.29-48
    • /
    • 2021
  • The paper discusses the ICT infrastructure as far as the availability of (computers, local or wide area networks, Internet connectivity and its reliability, size of the bandwidth and its optimization, etc.) in the S&T research institution. It also examined the profile of the research scientists and looked at the type of ICT infrastructure that is available for their use as well as the reliability of the Internet connectivity within these research institutions. It looked at the broadband capacities of the research institutions and the ICT capabilities in respect of the technical and managerial support back-up that are available to the research institutions. The study used the survey research method with a questionnaire as well as personal observation to gather the data. From the data gathered, it was realized that the internet connectivity and the size of the bandwidth that the R&D institutions subscribed to differed significantly. Again, the extent to which the research scientists were able to access the internet in their respective institutions depended on the quality of the local network in place. Generally, the investments in ICT were made for different management objectives, and these were meant to facilitate the generation of new knowledge as well as make measurable improvements in R&D activities.

Advanced approach to information security management system utilizing maturity models in critical infrastructure

  • You, Youngin;Oh, Junhyoung;Kim, Sooheon;Lee, Kyungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4995-5014
    • /
    • 2018
  • As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.

Telecommunications Infrastructures and Services Development and Challenges in Nepal

  • Shrestha, Surendra;Adhikari, Dilli Ram
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.27-36
    • /
    • 2017
  • The world's unique geographical, multilingual, multiethnic, multiracial and multi religious Himalayan country Nepal has more than 100 years history on telephony service and it has been formulating appropriate policy and regulation for the adoption of new technology, introducing the competitive market environment for the overall development of Information and Communication Technology (ICT) infrastructures and application of ICT service and tools for socio-economic transformation. The Nepalese market seems to be continuously growing and having huge demand of mobile telephony and internet subscriptions trend. The ICT infrastructure development in difficult geographical area is quite challenging and thus operators are focusing mobile telephony and mobile internet services. Nepal has been doing its best effort on formulating policy and regulation, adoption key strategies for ICT sector development and at the same time joining hands with international and regional bodies such as ITU, SAARC etc for ICT sector development. Due to geographical diversity, policy and regulatory barriers in some extent, power supply constraints and low affordability from customers on ICT tools and services, Nepal has been facing challenges on ICT infrastructure development. However, the national statistics on ICT, Networked Readiness Index and ICT Development Index show that Nepal has done quite good progress and is keeping its pace on ICT development despite the these challenges. Moreover, there seems to be quite uncovered market segments on internet service and big opportunity on ICT sector development in Nepal in the days to come.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

A Hybrid Software Defined Networking Architecture for Next-Generation IoTs

  • Lee, Ahyoung;Wang, Xuan;Nguyen, Hieu;Ra, Ilkyeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.932-945
    • /
    • 2018
  • Everything in the world is becoming connected and interactive due to the Internet. The future of interactive smart environments such as smart cities, smart industries, or smart farms demand high network bandwidth, high network flexibility, and self-organization systems without costly hardware upgrades, and they provide a sustainable, scalable, and replicable smart environment backbone infrastructure. This paper presents a new Hybrid Software-Defined architecture for integrating Internet-of-Things technologies that are essential technologies for smart environments. It combines a software-defined networking infrastructure and a real-time distributed network framework with an advanced optimization to enable self-configuration, self-management, and self-adaption for providing seamless communication and efficiently managing a vast number of smart heterogeneous devices.

Survey on Data Consolidation Issue in the Internet and Corresponding Research (인터넷 데이터 집중화 문제와 대응연구 동향)

  • Jung, H.Y.;Koh, N.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.123-132
    • /
    • 2019
  • The Internet is evolving into a fundamental social infrastructure, similar to electricity and water. In particular, the role of the Internet is becoming more critical as the global digital transformation infrastructure of the 4th industrial revolution. Based on this trend, we note that the Internet is monopolized by a few large organizations even though it was originally designed as a purely distributed system. In this paper, we have reviewed the domination trends, especially in terms of data consolidation. In addition, we have summarized the corresponding research activities from the Internet Society, EU Horizon-2020, and Decentralized web. Further, this paper proposes an approach to address the data consolidation issue from the Korean perspective.

A STUDY OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON GOVERNMENT INFRASTRUCTURE

  • Kim, Suk-Jin;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.55-65
    • /
    • 2016
  • Distributed Denial of service attack is one of the major threats nowadays especially to the government infrastructure that give huge impact to the reputation and interrupt the services and resource. Our survey start with brief introduction about DDoS attacks, we illustrate the trends and incident happened at government from various countries. We then provide an extensive literature review on the existing research about implication, types of attacks and initiative to defence against the DDoS attacks. Our discussion aims to identify the trends in DDoS attacks, in depth impact of DDoS attacks to government infrastructure, classification of attacks and techniques against the attacks. And we will use for a fire fight safety and management.

A Coordinated Heuristic Approach for Virtual Network Embedding in Cloud Infrastructure

  • Nia, Nahid Hamzehee;Adabi, Sepideh;Nategh, Majid Nikougoftar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2346-2361
    • /
    • 2017
  • A major challenge in cloud infrastructure is the efficient allocation of virtual network elements on top of substrate network elements. Path algebra is a mathematical framework which allows the validation and convergence analysis of the mono-constraint or multi-constraint routing problems independently of the network topology or size. The present study proposes a new heuristic approach based on mathematical framework "paths algebra" to map virtual nodes and links to substrate nodes and paths in cloud. In this approach, we define a measure criterion to rank the substrate nodes, and map the virtual nodes to substrate nodes according to their ranks by using a greedy algorithm. In addition, considering multi-constraint routing in virtual link mapping stage, the used paths algebra framework allows a more flexible and extendable embedding. Obtained results of simulations show appropriate improvement in acceptance ratio of virtual networks and cost incurred by the infrastructure networks.