• Title/Summary/Keyword: Safe Network

Search Result 600, Processing Time 0.026 seconds

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Intelligent Safe Network Technology for the Smart Working Environments based on Cloud (클라우드 기반 스마트 사무환경 구축을 위한 지능형 세이프 네트워크 기술)

  • Kim, Seok-Hoon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.345-350
    • /
    • 2014
  • According to the necessity of smart working with various mobile devices, and the increasing services based on the converged infrastructures such as Cloud, Wearable Computing, Next Generation Wired/Wireless Mobile Networks, the network reliability has been one of the most important things. However, the research related to the network reliability is still insufficient. To solve these problems, we propose the ISNTC (Intelligent Safe Network Technology based on Cloud), which uses the safe network technique based on SDN, to be adopted to the smart working environments. The proposed ISNTC guarantees secure data forwarding through the synchronized transmission path and timing. We have verified the throughput which outperformed the existing techniques through the computer simulations using OPnet.

Using GIS to Find the Best Safe Route between Khartoum and Arqin-Crossing

  • Mumdouh M.M Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.43-52
    • /
    • 2023
  • The paper aims to clarify how to make a decision using geographic information systems and how to choose the best route between two cities to suit the expectations of the driver and his sense of safety and comfort on the road. Use a special model for network analysis, where the network analysis tool relied on the following data (maximum speed of the road - number of intersections - road width - peak period) in choosing the best safe path. The paper concluded that the best safe route for refugees between the cities of Khartoum - Arqin crossing is ( Khartoum - Shendi - Atbara - Meroe - Abu Hamad - Wadi Halfa). We advise all GIS users to use the theories of spatial analysis when creating a new model.

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric (하이퍼레저 패브릭을 이용한 화물차 디지털 운행기록 단말기의 안전운행 보상시스템 구현)

  • Kim, Yong-bae;Back, Juyong;Kim, Jongweon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.47-56
    • /
    • 2022
  • The safe driving reward system aims to reduce the loss of life and property by reducing the occurrence of accidents by motivating safe driving and encouraging active participation by providing direct reward to vehicle drivers who have performed safe driving. In the case of the existing digital tachograph, the goal is to limit dangerous driving by recording the driving status of the vehicle whereas the safe driving reward system is a support measure to increase the effect of accident prevention and induces safe driving with financial reward when safe driving is performed. In other words, in an area where accidents due to speeding are high, direct reward is provided to motivate safe driving to prevent traffic accidents when safe driving instructions such as speed compliance, maintaining distance between vehicles, and driving in designated lanes are performed. Since these safe operation data and reward histories must be managed transparently and safely, the reward evidences and histories were constructed using the closed blockchain Hyperledger Fabric. However, while transparency and safety are guaranteed in the blockchain system, low data processing speed is a problem. In this study, the sequential block generation speed was as low as 10 TPS(transaction per second), and as a result of applying the acceleration function a high-performance network of 1,000 TPS or more was implemented.

A Study on interative device authentication mechanism in the home network system (홈네트워크 시스템의 양방향 기기 인증 메커니즘에 관한 연구)

  • Baek Sang-Joon;Lee Sung-Jin;Bae Sung-Ho;Oh Sei-Wong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.502-506
    • /
    • 2005
  • Applying wireless mode to an existing wired home network system, the users became to use services of home network conveniently in their home. In order to construct a safe network in home network system, it needs user authentification and interactive authentification to mobile devices. In this paper, we propose an interactive authentification mechanism in order to make a safe home network system in mobile environment.

  • PDF

40-TFLOPS artificial intelligence processor with function-safe programmable many-cores for ISO26262 ASIL-D

  • Han, Jinho;Choi, Minseok;Kwon, Youngsu
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.468-479
    • /
    • 2020
  • The proposed AI processor architecture has high throughput for accelerating the neural network and reduces the external memory bandwidth required for processing the neural network. For achieving high throughput, the proposed super thread core (STC) includes 128 × 128 nano cores operating at the clock frequency of 1.2 GHz. The function-safe architecture is proposed for a fault-tolerance system such as an electronics system for autonomous cars. The general-purpose processor (GPP) core is integrated with STC for controlling the STC and processing the AI algorithm. It has a self-recovering cache and dynamic lockstep function. The function-safe design has proved the fault performance has ASIL D of ISO26262 standard fault tolerance levels. Therefore, the entire AI processor is fabricated via the 28-nm CMOS process as a prototype chip. Its peak computing performance is 40 TFLOPS at 1.2 GHz with the supply voltage of 1.1 V. The measured energy efficiency is 1.3 TOPS/W. A GPP for control with a function-safe design can have ISO26262 ASIL-D with the single-point fault-tolerance rate of 99.64%.

A Study on the Establishment and Revitalization Measures of International Safe Community -Based on Samcheok in Gangwondo- (국제안전도시 구축 및 활성화 방안에 관한 연구 -강원도 삼척시를 중심으로-)

  • Cho, Han-Sug;Shin, Ho-Joon;Baek, Min-Ho
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.339-346
    • /
    • 2013
  • In this study, the summary and characteristics of WHO International Safe Community are examined and the activities for the establishment of safe city were analyzed targeting Samcheok City in Gangwon-do which prepares for the certification of the International Safe Community. And, based on the result, this study intends to present the direction of establishment and development of international safe city to improve the regional safety. First, for the establishment of safe city, measures and programs for vulnerable classes and accidential forms in the area must be developed and operated continuously. Second, continuous and systematic activities must be done by establishing combined network between regional government association and relative organ and resident association in the area. Third, public policies for establishing safe city so as to improve regional safety, such as enactment of relative si/do ordinance, etc, must be prepared so as to operate it systematically. Finally, through the various activities by establishing international network, education, publicity activities and various informations must be acquired.

Safe-Tunneling Zone using election the reliable agent in VANET (VANET 환경에서 신뢰적인 에이전트 선출을 이용한 Safe-Tunneling Zone)

  • Oh, Ha-Na;Kim, A-Ran;Shin, Young-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.371-374
    • /
    • 2010
  • 본 논문은 Vehicular Ad-hoc Network(VANET)환경에서 V2V간의 신뢰적 통신을 지원하기 위해 Safe-Tunneling Zone을 제안한다. 기존의 무선 환경에서는 신뢰적인 경로산출을 위해 ARAN에서 제안된 hop-by-hop 인증을 사용하여 신뢰성은 충족되나 많은 시간과 자원을 소비하는 단점이 있다. 그러나 본 논문에서 제안한 Safe-Tunneling Zone은 송 수신 하고자하는 차량이 각각 신뢰적 에이전트를 선택하고, 선택된 에이전트는 서로의 ID, Rn을 바탕으로 생성된 세션키를 교환함으로서 상호간의 인증을 수행한다. 이와 같이 본 논문에서는 Safe-Tunneling Zone을 통해 기존의 신뢰적 경로 산출 기법보다 수행과정 절차의 간소화, 자원소비 감소, 종단 간의 신뢰적 경로를 통한 데이터의 기밀성 또한 제공 가능하도록 한다.

  • PDF