• Title/Summary/Keyword: Management of server system

Search Result 1,340, Processing Time 0.044 seconds

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

A System for Change Management of Sensor Network Applications based on Version Synchronization (버전동기화 기반의 센서 네트워크 응용 소프트웨어 변경 관리 시스템의 구축 사례)

  • Kim, Jae-Cheol;Kim, Ju-Il;Chong, Ki-Won;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.16A no.2
    • /
    • pp.125-134
    • /
    • 2009
  • This paper proposes a change management system of sensor network applications based on version synchronization that supports to effectively manage defect correction of applications, change of functions for applications or improvement of applications without suspending the sensor network. The proposed change management system consists of the NADE which is an application development environment, the Node Management Server, and the Node Agent. NADE is an Eclipse-based development environment for developing applications which are installed into nodes. NADE is also connected with CVSNT which is a version management tool and performs application version management using the CVSNT. Node Management Server manages nodes to maintain latest versions of applications by synchronizing versions of applications which are performed on the nodes with the versions of applications which are developed in the NADE. Node Agent which is loaded into the node periodically sends the version information of the application to the server, and stores and updates the version information of the application. Through the proposed change management system, applications of nodes are automatically updated when versions of applications are changed by correcting defects, changing functions or improving applications. Therefore, the user can effectively manage the execution of sensor network system without suspending or delaying the sensor network. Also, visibility of change management for sensor network applications will be improved.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

The Windows Push Server System with Smart Device Identifying Fingerprints over IEEE 802.15.4 Protocol (IEEE 802.15.4 통신을 활용한 지문인식 스마트 기기 연동 푸쉬서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.419-425
    • /
    • 2012
  • In these days, the trends of home networking system is implementation of easily configured system with home security of emergency alarm and visitor verification services. In this paper, we implemented push server system based on Arduino of open source physical computation platform to verify visitors for the homes without home networking services. In the suggested system, visitor verification is performed in and out of home, and home access security of the system could be constructed with low-cost price by use of windows push server system and smart devices with alarm operation in corresponding to not allowed access trying.

Remote Monitoring and Control of PLC Using TCP/IP Communication (TCP/IP 통신을 이용한 PLC 원격 감시 및 제어)

  • 고덕현;이순걸
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.140-143
    • /
    • 2000
  • This research presents new type of remote monitoring and control solution of PLC that can be used bi-directional and efficient management of factory automation through internet. This system has client/server architect for information handling between PLC and remote computer where a user can control and monitor target PLC. Actually the authors redirect RS232C connection between PLC and server computer into Internet connection between PLC and remote client computer using supplied PLC tool program So user feel like in front of PLC panel when he operates remote PLC through Internet. Each client/server program is constructed with Java language for security. In this paper the internet-based remote control system was proposed and proved validity by being applied to redirection of PLC control for factory automation.

  • PDF

A Study on the Development of Hard Disk Recoder and Remote Control Using Embedded Linux (임베디드 리눅스를 이용한 하드디스크 레코더 및 원격 제어 구현에 관한 연구)

  • Park, Seung-Ho;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2429-2431
    • /
    • 2004
  • In this paper, we have designed a remote controlable HDR System using all embedded linux board. The system is composed of three parts - a HDR System, a PC client program for remote control and a Nameserver for registering and aquisition of the IP address. The system is built in an embedded board using a linux kernel. With the Linux the system can support networking and file system for a hard disk management In addition, the system embeds a web-server and a ftp-server for remote manipulation and file transfer. And the hardwares of the system are controlled by the linux device driver mechanism. MPEG1/2 technique is used to compress TV tuner signal and external analog video/audio signal. And compressed data is stored in a hard disk. The data stored in the system is accesable through lan or internet. And RTP protocol is used to enable the system to service live stream of instant video/audio input.

  • PDF

Design and Implementation of a Distant Intelligent Tutoring System based on the Client/Server Model (Client/Server 모델에 바탕을 둔 지능형 원격 교육 시스템의 설계와 구현)

  • 정대동;우종호;신동석
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.7
    • /
    • pp.92-105
    • /
    • 1997
  • In this paper, we design andimplement a prototype of the distant ITS (Intelligent tutoring system): English tutor which is running on the information superhighway. It is designed for the purpose of teaching the english conversation effectively to the students whose mother tongues are not english. The tutor could chosse appropriate tutoring strategies and teach the students effectively according to the contents of the student model. And also it is based on the remote data management client/Server model and implemented on SPARC station and pentium PC using oracle 7.3 and power Builder 5.0.

  • PDF

A Study on Home Telemetering System using Power Line Communication (전력선 통신을 이용한 가정용 원격 검침 시스템에 관한 연구)

  • Yu Yung-Ho;Shin Il-Sik
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.6
    • /
    • pp.678-684
    • /
    • 2005
  • In this Paper telemetering system for home automation is Proposed and implemented. Proposed and developed systems are composed with a home server and a few clients which send metering data of gas electric power water and home security to home server using power line communication. Management computer located in office of apartment complex collects all kinds of measured home data from each home server with multi drop communication by UDP Protocol A simple ASK method is used for power line communication Collected data from each home can be used for issuing the bill of each house and web service. The experiments were carried out under laboratory environment using various kinds of electric home appliances to ascertain the performance.

Implementation of MPEG-4 System for Video on Demand Services (Video on Demand 서비스를 위한 MPEG-4 시스템 구현)

  • 최승철;김남규;최석림
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.225-228
    • /
    • 2001
  • We describe the implementation of MPEG-4 Systems for Video on Demand services. We discuss the issues in implementint MPEG-4 Systems, specially Object Description and Elementary stream management(Buffer control, Synchronization). The file-server pump the multiplexed streams to the client through the DMIF. Interaction between server and client is done with User Command(play, pause, stop, fast foward, ...). Stream data are multiplexed off-line. In advance, the file-server read multiplexed streams and pumps it to MPEG-4 terminal(client). Our system can be used in various application not only Video on Demand services, but also Internet broadcasting, remote surveillance, mobile communication, remote education, etc.

  • PDF