• Title/Summary/Keyword: Proxy data

Search Result 389, Processing Time 0.024 seconds

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

An Effective Method of Sharing Heterogeneous Components of OPRoS and RTM

  • Salov, Andrey D.;Park, Hong Seong;Han, Soohee;Lee, Dooam
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.755-761
    • /
    • 2014
  • Heterogeneous components have different component models, which prevents such components from sharing the functionalities of other components based on the different models. As one of methods for linking heterogeneous components, this paper suggests a proxy component to construct a bridge between heterogeneous components of OPRoS (Open Platform for Robotic Service) and RTM (Robot Technology Middleware). The proxy component consists of two types of components called Adaptor and Interceptor, via which the heterogeneous components can exchange data and services easily. The proposed method enables adaptor and interceptor components to directly invoke the services of the latter and the former, respectively, in order to exchange data and services on a real-time basis. The proxy component can be implemented for OPRoS and RT (Robot Technology) component models to connect with RT and OPRoS ones, respectively. It is shown through a simple experiment that the proposed method works well for real-time control.

A Modified LRU Page Replacement Policy with LMF for Web Proxy Cache (LMF로 수정된 웹 프락시 캐쉬용 LRU페이지 교체 정책)

  • 이용임;김주균
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.426-433
    • /
    • 2003
  • Management policies of Web Proxy Cache, for the QoS of Web users, are mainly focused on the page replacement and the data consistency policy. But the two subjects have been studied independently to each other regardless of its possibility of cooperation. In this paper, we introduce the performance improvement obtained by adapting the characteristic of LMF used in data consistency policy to LRU, thus taking the better performance synergy as a result of complementary cooperation. Various policies for the management of Web Proxy Cache are in progress, this study can be a way of performance guide to increase cache hit ratio and reduce the transmission overhead of Web Server.

A Study on the Vulnerability Assessment for Agricultural Infrastructure using Principal Component Analysis (주성분 분석을 이용한 농업생산기반의 재해 취약성 평가에 관한 연구)

  • Kim, Sung Jae;Kim, Sung Min;Kim, Sang Min
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.55 no.1
    • /
    • pp.31-38
    • /
    • 2013
  • The purpose of this study was to evaluate climate change vulnerability over the agricultural infrastructure in terms of flood and drought using principal component analysis. Vulnerability was assessed using vulnerability resilience index (VRI) which combines climate exposure, sensitivity, and adaptive capacity. Ten flood proxy variables and six drought proxy variables for the vulnerability assessment were selected by opinions of researchers and experts. The statistical data on 16 proxy variables for the local governments (Si, Do) were collected. To identify major variables and to explain the trend in whole data set, principal component analysis (PCA) was conducted. The result of PCA showed that the first 3 principal components explained approximately 83 % and 89 % of the total variance for the flood and drought, respectively. VRI assessment for the local governments based on the PCA results indicated that provinces where having the relatively large cultivation areas were categorized as vulnerable to climate change.

Climatic Records of Japan : A Historical Overview

  • Yoshino, Masatoshi
    • Atmosphere
    • /
    • v.13 no.2
    • /
    • pp.29-39
    • /
    • 2003
  • Proxy data in the historical period in Japan since the 9th century has been first described and their analyzed fluctuation series were shown. Secondly, the climatic records before and after the Meiji restoration in 1868 were mentioned. Thirdly, available date sets of historical climatic records in Japan are listed. Lastly, published records and tables for Japan during the recent years were overviewed. Some discussion on the climatic records and tables is given as concluding remarks.

Determinants of Default Risks and Risk Management: Evidence from Rural Banks in Indonesia

  • PUSPITASARI, Devy Mawarnie;FEBRIAN, Erie;ANWAR, Mokhammad;SUDARSONO, Rahmat;NAPITUPULU, Sotarduga
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.497-502
    • /
    • 2021
  • This study aims to investigate the determinants of default risk of rural banks in East Java, Indonesia. The method used is descriptive verification and logistic regression analysis. The data used is secondary in the form of monthly annual financial reports of rural banks in East Java during the period 2009-2018. From the results, it was shown that net interest margin (NIM) as a proxy of market risk, non-performing loan (NPL) as a proxy of credit risk, operation efficiency as a proxy of operational risk and return on assets (ROA) as a proxy of profitability have a significant influence on default risk. Meanwhile, the loan to deposit (LDR) ratio as a proxy of liquidity risk has no significant influence on default risk. Banks need to implement risk management and meet the capital adequacy requirements of regulators so that they are resistant to risk, and also, compliant with bank governance to be able to produce high returns for rural banks have an impact on sustainability and its existence. The ability to identify setbacks in bank conditions and the ability to distinguish between healthy and problematic banks will enable to anticipate default banks.

A Development of Web Proxy for the Satellite Communication (위성통신을 위한 웹 프록시 개발)

  • Jeon, Sung-Yoon;Kim, Geun-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1403-1412
    • /
    • 2013
  • In the maritime ships or airplanes, users should utilize the satellite channel in orer to use web service. However, the satellite channel is costly and does not give users satisfied response time. In the ship, the users may receive plenty of extra data when they obtain internet news. The extra data may be unnecessary image and advertise. Therefore, they should pay unnecessary data usage charges as well. In this paper, we suggest a proxy model that solves the problem of cost and speed. The proposed proxy reduces the of data through the satellite link by image and advertising blocking, caching, image re-requesting functions. It's performance was tested by a real satellite communication.

Playback Quantity-based Proxy Caching Scheme for Continuous Media Data (재생량에 기반한 연속미디어 데이터 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Im, Eun-Ji;Jeong, Gi-Dong
    • The KIPS Transactions:PartB
    • /
    • v.9B no.3
    • /
    • pp.303-310
    • /
    • 2002
  • In this paper, we propose a proxy caching scheme that stores a portion of a continuous media object or an entire object on the Internet. The proxy stores the initial fraction of a continuous media object and determines the optimal size of the initial fraction of the continuous media object to be cached based on the object popularity. Under the proposed scheme, the initial latency of most clients and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Considering the characteristics of continuous media, we also propose the novel popularity for the continuous media objects based on the amount of the data of each object played by the clients. Finally, we have performed trace-driven simulations to evaluate our caching scheme and the popularity for the continuous media objects. Through these simulations, we have verified that our caching scheme, PPC outperforms other well-known caching schemes in terms of BHR, DSR and replacement and that popularity for the continuous media objects based on the amount of the playback data can enhance the performance of caching scheme.

Leveraging Proxy Mobile IPv6 with SDN

  • Raza, Syed M.;Kim, Dongsoo S.;Shin, DongRyeol;Choo, Hyunseung
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.460-475
    • /
    • 2016
  • The existing Proxy Mobile IPv6 suffers from a long handover latency which in turn causes significant packet loss that is unacceptable for seamless realtime services such as multimedia streaming. This paper proposes an OpenFlow-enabled proxy mobile IPv6 (OF-PMIPv6) in which the control of access gateways is centralized at an OpenFlow controller of a foreign network. The proposed OF-PMIPv6 separates the control path from the data path by performing the mobility control at the controller, whereas the data path remains direct between a mobile access gateway and a local mobility anchor in an IP tunnel form. A group of simple OpenFlow-enabled access gateways performs link-layer control and monitoring activities to support a comprehensive mobility of mobile nodes, and communicates with the controller through the standard OpenFlow protocol. The controller performs network-layer mobility control on behalf of mobile access gateways and communicates with the local mobility anchor in the Proxy Mobile IPv6 domain. Benefiting from the centralized view and information, the controller caches the authentication and configuration information and reuses it to significantly reduce the handover latency. An analytical analysis of the proposed OF-PMIPv6 reactive and proactive handover schemes shows 43% and 121% reduction in the handover latency, respectively, for highly utilized network. The results gathered from the OF-PMIPv6 testbed suggest similar performance improvements.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.