• Title/Summary/Keyword: Proxy

Search Result 1,307, Processing Time 0.024 seconds

Implementation and Design of Proxy System for Web vulnerability Analysis (웹 취약점 분석을 위한 프락시 시스템의 설계 및 구현)

  • Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1011-1018
    • /
    • 2014
  • Because of the proliferation of web services through web site, web hacking attempts are increasing using vulnerabilities of the web application. In order to improve the security of web applications, we have to find vulnerabilities in web applications and then have to remove. This paper addresses a vulnerability in a web application on existing problems and analyze and propose solutions to the vulnerability. This paper have checked the stability of existing web security solutions and evaluated its suitability through analysis of vulnerability. Also, we have implemented the vulnerability analysis tools for web Proxy system and proposed methods to optimize for resolution of web vulnerabilities.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

Extended Design And Implementation of SIP Proxy Server or Improved Additional Internet Telephony Service (향상된 부가 서비스 지원을 위한 SIP 프락시 서버의 확장 설계 및 구현)

  • 민경주;이종화;강신각;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.875-879
    • /
    • 2002
  • CPL is a technique that serves various additional service in Internet telephony such as call forwarding, call blocking etc. IETF IPTEL working group developed this CPL standard. Users could request various additional services such as call forwarding, call blocking etc. by registering XML scripts to location servers. This paper would describe the design and the implementation skill of SIP proxy server that support these improved functionalities in detail. SIP registrar and SIP proxy server are designed and implemented in Linux platform because this platform serves fast and low cost development environment.

  • PDF

Proxy-based Mobile Syndication with Low Communication Cost (프록시 기반의 저 통신 비용 모바일 신디케이션)

  • Hwang, Ki-Tae;Kim, Nam-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.786-796
    • /
    • 2009
  • Currently, web syndication is usually utilized in desktop environments, but not considering mobile environments. In this paper, we focus on the extension of the desktop based web syndication to the mobile internet. Simply adapting the desktop based web syndication to mobile devices can cause high wireless internet communication cost. We propose PMS(Proxy-based Mobile Syndication) model which achieves low cost mobile syndication. In the PMS model, MWProxy is defined as a proxy server between mobile devices and web sites. It can reduce the communication cost by peeking up modified items from the web sites and reducing the channel size. In this paper, we designed and implemented the PMS system in a mobile phone and evaluated the performance of the PMS system by conducting real experiments using mobile emulators.

Multi-Vector Defense System using Reverse Proxy Group and PMS(Patch Management System) Construction (Reverse Proxy Group과 PMS를 이용한 멀티벡터(Multi-Vector) DDoS 공격 방어시스템 구축 방안)

  • Kim, Min-Su;Shin, Sang-Il;Kim, JongMin;Choi, KyongHo;Lee, Daesung;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.79-86
    • /
    • 2013
  • The objective of DDoS Attacks is to simply disturb the services. In recent years, the DDoS attacks have been evolved into Multi-Vector Attacks which use diversified and mixed attacking techniques. Multi-Vector Attacks start from DDoS Attack and Malware Infection, obtain inside information, and make zombie PC to reuse for the next DDoS attacks. These forms of Multi-Vector Attacks are unable to be prevented by the existing security strategies for DDoS Attacks and Malware Infection. This paper presents an approach to effectively defend against diversified Multi-Vector attacks by using Reverse Proxy Group and PMS(Patch Management Server).

An Effective Method of Sharing Heterogeneous Components of OPRoS and RTM

  • Salov, Andrey D.;Park, Hong Seong;Han, Soohee;Lee, Dooam
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.755-761
    • /
    • 2014
  • Heterogeneous components have different component models, which prevents such components from sharing the functionalities of other components based on the different models. As one of methods for linking heterogeneous components, this paper suggests a proxy component to construct a bridge between heterogeneous components of OPRoS (Open Platform for Robotic Service) and RTM (Robot Technology Middleware). The proxy component consists of two types of components called Adaptor and Interceptor, via which the heterogeneous components can exchange data and services easily. The proposed method enables adaptor and interceptor components to directly invoke the services of the latter and the former, respectively, in order to exchange data and services on a real-time basis. The proxy component can be implemented for OPRoS and RT (Robot Technology) component models to connect with RT and OPRoS ones, respectively. It is shown through a simple experiment that the proposed method works well for real-time control.

Review of Diverse IP Mobility Fast Handover Mechanisms and Suggestion of New Fast Handover Proxy Mobile IPv6 Mechanism (다양한 IP 이동성 고속 핸드오버 기법 분석 및 새로운 고속 핸드오버 Proxy Mobile IPv6 기법 제안)

  • Kim, Pyung-Soo
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.165-177
    • /
    • 2009
  • This paper reviews diverse IP mobility and fast handover mechanisms for seamless Internet services. Especially, fast handover mechanisms for the Proxy Mobile IPv6( PMIPv6) are categorized according to their approaches. Then, a new fast handover PMIPv6(FH-PMIPv6) mechanism is proposed using only L3 signaling message exchange. In the proposed FH-PMIPv6 mechanism, only local mobility anchor(LMA) exchanges L3 signaling messages with mobility access gateways(MAGs) for the fast handover operation. That is, inter-MAG signalling messages are not required for the fast handover operation. Therefore, unlike existing fast handover mechanisms, two relevant neighbouring MAGs need not set up the security association(SA) to protect fast handover related signaling messages and share SA related information. Moreover, the L3 triggering message is defined newly by standard ICMPv6 to trigger promptly the proposed mechanism. Analysis and comparison of the handover latency are performed for the proposed mechanism and existing mechanisms, which shows that the proposed FH-PMIPv6 mechanism has the favorable performance.

A Modified LRU Page Replacement Policy with LMF for Web Proxy Cache (LMF로 수정된 웹 프락시 캐쉬용 LRU페이지 교체 정책)

  • 이용임;김주균
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.426-433
    • /
    • 2003
  • Management policies of Web Proxy Cache, for the QoS of Web users, are mainly focused on the page replacement and the data consistency policy. But the two subjects have been studied independently to each other regardless of its possibility of cooperation. In this paper, we introduce the performance improvement obtained by adapting the characteristic of LMF used in data consistency policy to LRU, thus taking the better performance synergy as a result of complementary cooperation. Various policies for the management of Web Proxy Cache are in progress, this study can be a way of performance guide to increase cache hit ratio and reduce the transmission overhead of Web Server.

An XML Proxy Cache System for XML Documents with Update Locality in Shipbuilding Information Management System (조선정보관리시스템에서의 갱신의 지역편중성을 갖는 XML문서를 위한 XML 프록시 캐쉬 시스템)

  • Kim Nak Hyun;Lee Dong-Ho;Choi Il-Hwan;Kim Hyoung-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.393-400
    • /
    • 2005
  • XML makes it possible to query the information created and managed different applications, which is impossible if expressed in other structure or language. In using shipbuilding information management system, there is inefficiency in storing and querying such a large XML document in XDBox. XML proxy cache system is suggested to improve that. In this paper, we suggests XML proxy cache system with thought of update locality found in using shipbuilding information management system.

The Design of Proxy Peer Algorithm based on DHT for Effective Resource Searching on JXTA Network Environments (JXTA 네트워크 환경에서 효율적인 자원 검색을 위한 DHT 기반프락시 피어 알고리즘 설계)

  • Lee, Gwang;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1486-1492
    • /
    • 2007
  • Searching distributed resources efficiently is very important in distributed computing environments like P2P. But distributed resource searching may have system overheads and take a lot of time in proportion to the searching number, because distributed resource searching has to circuit many peers for searching information. In this paper, we design a proxy peer algorithm based on DHT(Distributed Hash Table) for efficient distributed resource searching in JXTA network environments. By containing the rendezvous information in proxy peer and searching a rendezvous peer firstly which has higher hit ratio, we can reduce the searching number and minimize system overheads.