• Title/Summary/Keyword: Internet reply

Search Result 47, Processing Time 0.027 seconds

Design and Implementation of Internet Stopper using ARP Spoofing (ARP 스푸핑을 이용한 인터넷 차단기 설계 및 구현)

  • Kim, Soo-Hee;Jung, In-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1565-1568
    • /
    • 2005
  • ARP 스푸핑(spoofing) 란 ARP reply message를 동일 서브넷 상의 호스트들에게 보내어 관리자 컴퓨터가 라우터로 믿게 하는 것을 말한다. 스푸핑에 의해 패킷들이 관리자로 보내지는 상황에서 관리자가 그 패킷들을 본래 라우터로 전달하지 않고 폐기한다면 서브넷 상의 호스트들은 인터넷을 사용할 수 없는 상황이 된다. 본 논문에서는 이러한 방법을 이용하여 인터넷 차단기를 구현하였다. 구현된 인터넷 차단기는 대학교 실습실과 같은 공공의 네트워크 환경에서 필요에 의해 인터넷을 잠시 중단시킬 필요가 있는 경우 간단하게 인터넷 사용을 차단할 수 있다.

  • PDF

Internet comment manipulation and criminal responsibility

  • Lee, Ju-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.6
    • /
    • pp.75-79
    • /
    • 2018
  • The purpose of this paper is to introspect again the role of the criminal law at a time when it is said that numerous criminal and legal discussions are needed to develop the so called "reply manipulation " case that is shaking the nation's political history. The research method considered the literature and precedents discussed in the past, and discussed the issue of subculture abuse caused by the internet, which is a product of convenience and affluence that came with the Forth industrial revolution through criminal law. Through a computer program, a discussion was held on what penalties would be imposed on the criminal law for attempting to manipulate public opinion by manipulating the so-called number of comments or Reaction. Question of whether the criminal law should further emphasize the need for a discussion on the need for a method to strengthen the preventive functions of the criminal law and expand the scope of punishment in order to address new causes of risk that came with the development of science. Without reflecting on whether such as "government-inspired demonstration "would be possible in today's world that was in the public perception of the authoritarian government of the past, it is a problem to see that the political goals of a particular group can be achieved by manipulating comments or creating public opinion on the Internet. The duty of criminal law is to protect the interests of the law. The role of the criminal law should be maintained the self limiting as far as possible in cases of violation or danger of the law. Still, it is a problem that the role of the criminal justice system today is too aggressive and is seen as a top tool rather than a last resort for solving problems. he role of the internet will be expanded further in the Hyper Connected society. To solve these problems, we should look forward to a change in the priority of other laws and policies other than criminal law.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

Emergency Medical Service Network System for Old and Weak Peoples using CDMA (CDMA를 이용한 노약자 응급 의료 네트워크 시스템)

  • Kim, Young-Jong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.60-70
    • /
    • 2007
  • As Republic of Korea community nears to old age society rapidly, various kinds problem about old mans is risen. Can speak that item connected with medical treatment is more serious in the importance aspect among them Therefore, many-sided effort is consisting to ready countermeasure in reply, but economical method is not presented clearly as being realistic yet. Also, medical treatment service that more users through diffusion of fast internet are little more better effort that serve consist. But, in the case of old age, by difficulty of the use, restriction condition happens. In this paper proposed system that is prevailing already and user-friendly can cope curtly in old mans' emergency situation more rapidly and conveniently using mobile phone of CDMA way relatively.

  • PDF

A Study about interception on Hurtfulness Site using Aho-Corasik machine (AC 머신을 이용한 유해 사이트 차단에 관한 연구)

  • 정현수;정규철;김후남;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.541-544
    • /
    • 2004
  • Change is doing our life more conveniently and abundantly by knowledge information society, but side effect and that is happening considerable and gropes solution in reply that did not expect in advance is urgent real condition. It can be called one of representative dysfunction of information-oriented society that human nature is revealed in open state to great many objectionable material and poisonous information such as violence kind that teenagerses who do not grow are gotten abroad through Information network system yet. So, to solve these fallacy, word-weighting process, where several harmful words which can be optained in internet site are discriminance and weighted, is utilized by using AC machine. At the result, the isolation rate of harmful site rose up to 90%, which means this process is greatly efficient.

  • PDF

A Study on Comparison of Open Application Programming Interface of Securities Companies Supporting Python

  • Ryu, Gui Yeol
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.97-104
    • /
    • 2021
  • Securities and investment services had the most data per company on the average, and used the most data. Investors are increasingly demanding to invest through their own analysis methods. Therefore, securities and investment companies provide stock data to investors through open API. The data received using the open API is in text format. Python is effective and convenient for requesting and receiving text data. We investigate there are 22 major securities and investment companies in Korea and only 6 companies. Only Daishin Securities Co. supports Python officially. We compare how to receive stock data through open API using Python, and Python programming features. The open APIs for the study are Daishin Securities Co. and eBest Investment & Securities Co. Comparing the two APIs for receiving the current stock data, we find the main two differences are the login method and the method of sending and receiving data. As for the login method, CYBOS plus has login information, but xingAPI does not have. As for the method of sending and receiving data, Cybos Plus sends and receives data by calling the request method, and the reply method. xingAPI sends and receives data in the form of an event. Therefore, the number of xingAPI codes is more than that of CYBOS plus. And we find that CYBOS plus executes a loop statement by lists and tuple, dictionary, and CYBOS plus supports the basic commands provided by Python.

Design and Implementation of Web Browser for Classroom Instruction (교실 수업을 위한 웹 브라우저의 설계 및 구현)

  • Koo, Duk-Hoi
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.1
    • /
    • pp.139-146
    • /
    • 2005
  • Classroom of latest primary school and secondary school is taking advantage of web activity in instruction. Must use web browser compulsorily to take advantage of web, classroom of our country is using Internet Explorer web browser that offer in Microsoft mostly. This web browser can say that necessary function is very lacking in primary school and secondary school classroom instruction by thing for ordinary people. Thus, to solved lacking, this study presented inconvenient of Internet Explorer web browser that use in existing. And searched improvement plan in reply. Also, embodied web browser that actuality practical use is possible reflecting this in design. Web browser that embody confirmed that satisfaction which is excellent through spot application is. To be more efficient and utilizes as class effectively, this web browser may be beaconed to primary school and secondary school teacher and students of our country.

  • PDF

An Efficient Resource Discovery Mechanism based on Distributed Location Information in Pure P2P Environments (순수 P2P 환경에서 분산된 위치 정보를 이용한 자원 검색 기법)

  • Kim In-suk;Kang Yong-hyeog;Eom Young Ik
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.573-581
    • /
    • 2004
  • Recently, the rapid growth of Internet technology and the deployment of high speed networks make many kinds of multimedia services possible. Preexisting multimedia services are designed based on the client/server model which has the problems such as the network failure and the low speed communication due to the high load on the central server. In order to solve these problems, peer-to-peer networks are introduced and expanded through Internet environments. In this paper, we propose a pure peer-to-peer network based resource discovery mechanism for multimedia services. In the proposed scheme, each host maintains the location information of resources which are recently requested by other hosts as well as that oi the replicas of local resources. The proposed scheme has the faster response time and incurs the smaller traffic than the preexisting discovery schemes in pure peer-to-peer network environments. Also, by decentralizing the location information and differentiating the reply path, our proposed scheme can solve the search result loss problem that occurs when the network is unsettled.

Classification of Query E-Mail Using Neural Network (신경망을 이용한 사용자 질의 전자 메일 분류)

  • 변영철;홍영보
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.438-449
    • /
    • 2004
  • More and more users are using the query e-mail according to the increment of use of internet. The operator of internet site desires the users to check the FAQ and Q&A contents first before sending the query e-mail to the operator However the users try to get the solution for a problem easily by simply sending a query e-mail. Therefore the increment of query e-mail is inevitable, and the site operator is suffering from too heavy loads and spending too much time and cost to reply the query e-mail. In this paper, we are proposing an efficient method of classifying the query e-mail of users automatically by using a neural network. To verify the reasonability of our work, the query e-mails of KORNET are used as the test data, which is actually gathered in KT. A total of 210 learning data and 280 test data were used to test the performance of the proposed approach. From the experiments we got the encouraging result from the view point of application in real life. The proposed approach satisfied the request of users who wanted rapid response for their query e-mail.

  • PDF

A Content Analysis of Digital Audience Replies to Video Advertising Types: Focused on Viral Video and Cable Broadcasting Advertisement (영상광고 유형별 디지털 이용자의 댓글 내용분석에 관한 연구: 바이럴 동영상 광고와 케이블 방송광고를 중심으로)

  • Ji, Won-Bae;Kim, Woon-Han
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1303-1312
    • /
    • 2018
  • The study analyzed the evaluation of the advertisement effect by the score and the method of the advertisement comments in ad evaluation in online site, 'TVCF'. The results are as follows. First, Internet viral advertisement showed higher number of ad comments and higher evaluation of advertisement effect than cable broadcasting advertisement. Second, the results of analysis of the difference of advertisement evaluation according to ad types and digital user characteristics showed that women are more positive than men toward both cable broadcasting and internet viral advertisement.