• 제목/요약/키워드: Security

Search Result 25,935, Processing Time 0.053 seconds

A Design of Hybrid Implementation Server System for Network Game (네트워크 게임을 위한 하이브리드 분산 서버 시스템 설계에 관한 연구)

  • 배재환
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.455-459
    • /
    • 2003
  • In the great motive power which promotes the Game of future to develop. three main factors focus on 3D Graphics, Network and Virtual Reality. the Network technique as necessary elemental technique in Next-generation on-line game is being researched largely. However, from viewing the features of on-line game, if many users meet in same server, it not only causes heavy load to the server and brings inconvenience to the users, but also increases expense to the service provider and creates a problem which is to put up server or not. A proposal is going to do hybrid distributed system a client hardly depends on server for this paper, and to be able to enjoy a network game through information alternating current between clients. depended on the existing server, and the most message processing did a design in order to achieve between clients. A design way to propose is as follows. Primarily it was done in order proposed a message grade anger process way, and to be able to manage server or a client according to importance of message, and, with the second, did a Client-Server method and a Pear-to-Pear method at the same time, and a chase did efficiency. Third is going to propose other problem solving way by message grade anger in multi-anger and a security section of a message cue.

  • PDF

Internetworking strategy between MANET and WLAN for Extending Hot-Spot of WLAN based on HMIPv6 (HMIPv6를 기반으로 한 무선 랜과 이동 애드 혹 네트워크 간의 인터네트워킹 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.38-48
    • /
    • 2006
  • For extending of hot-spot of WLAN, (2) proposes internetworking scheme between wireless LAN (WLAN) and mobile ad-hoc network (MANET), which employ the same layer-2 protocol with different mode. Compared to internetworking schemes between UMTS (Universal Mobile Telecommunications Systems) and WLAN (3-4), the scheme from (2) has relatively low overhead and latencies because WLAN and MANET are physically and logically similar to each other. However, the mode switching algorithm proposed in r2] for internetworking between WLAN and MANET only considers signal strength and determines handoff, and mobile nodes following a zigzag course in pollution area may perform handoff at short intervals. Furthermore, (2) employs mobile IPv6 (MIPv6) at base, which brings still high delay on handoff and overhead due to signal message exchange. In this paper, we present optimized internetworking scheme between WLAN and MANET, modified from (2). To settle ping-pong handoff from (2), we propose adaptive mode switching algorithm. HMIPv6 is employed for IP connectivity and mobility service in WLAN, which solves some shortcomings, such as high handoff overhead and vulnerable security. For routing in MANET, OLSR is employed, which is a proactive Protocol and has optimally reduced signal broadcasting overhead. OLSR operates with current P protocol compatibly with no change or modification. The proposed internetworking scheme based on adaptive mode switching algorithm shows better performance than scheme from (2).

Effects of Exclusive Agency Listing and Real Estate Information Network System on Real Estate Broker' Trust and Customer' Satisfactions (전속중개계약과 부동산거래정보망제도가 중개업자 신뢰성과 고객만족에 미치는 영향 분석)

  • Choi, Bong-hyun;Moon, Young-kee
    • Journal of Distribution Science
    • /
    • v.4 no.2
    • /
    • pp.123-144
    • /
    • 2006
  • For the property right's protection of the nation, the uncertainty's dissolution and the reliability's security of real estate trade are very important. With the life style's change, the market of real estate becomes diversification, and the level of the real estate trade becomes diversification. But compared with this, the trade system of the real estate has not broken away from the mode in the past yet. To cope with it actively, it needs to review the real estate trade form. Especially, it needs to investigate a plan that can advance the Agency Listing method. The Exclusive Agency Listing and the real estate Information Network System have been the usual system in some advanced countries like America, Japan. It is the system that establishes the real estate brokerage's trade order and encourages the execution for the real estate client's property right's protection and benefit offer. In our country, The Exclusive Agency Listing and the real estate Information Network System were created in the revised real estate brokerage law in 12, 1993. But because of varies of questions, it can not be settled down. So this paper will develop the characteristic factors of the Exclusive Agency Listing and the real estate Information Network System revitalization and examine the mutual relation depends on the factors. And these factors were studied through the proved analysis to the effecting made on the Agency function's consideration and real estate broker' trust and customer satisfaction. So depends on these, the existed value now will present the revitalization plan and political implication about the Exclusive Agency Listing and the real estate Information Network System.

  • PDF

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

The Problems in Digital Watermarking into Intra-Frames of H.264/AVC (H.264-기반 인트라 프레임의 디지털 워터마킹 문제)

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.233-242
    • /
    • 2009
  • This paper intend to show the affect of the intra-prediction on the typical digital watermarking method and the fact that the watermarking method has very low effectiveness when it is performed for the intra-frames of H.264. The target watermarking method was the one for imperceptibility and robustness and was assumed to be performed during the intra-compression process by the H.264 technique. Also this method was assumed to insert watermark data and to extract it for certification if needed. The problem is that the resulting data from the re-engineering of the watermark insertion process to extract the watermark data is different from the one before. We experimentally showed that it stems from the intra-prediction itself. That is, we showed that the resulting image data from only compression without watermarking changes if it is re-compressed by the same conditions as the first compression and it is because the intra-prediction modes as well as the coefficient values change. Also, we applied one blind and one semi-blind watermarking methods to show that the typical attacks after watermarking makes this problem much more serious and lowers the effectiveness of the watermarking method dramatically. Therefore we concluded by considering the experimental data that a typical watermarking method which has been researched so far cannot guarantee the effectiveness of intra-frame watermarking and it is highly required to developed a new kind of methodologies.

Analysis and Improvement for Manual to Protect Mountain Disaster in Urban Area (도심지 토사재해 예방을 위한 기존 매뉴얼 분석과 개선 방안)

  • Song, Byungwoong;Baek, Woohyun;Yoon, Junghwan;Sim, Oubae
    • Journal of the Korean GEO-environmental Society
    • /
    • v.16 no.7
    • /
    • pp.43-53
    • /
    • 2015
  • More than 70 percent of the Korean territory consists of mountain area so development of mountain district is essential to urbanize continuously. Thus, technological developments for risk factors and standards and manuals must be needed to prevent mountain disaster. Risk Management Manual should be made and operated in government legislation related to national disaster, but there is still no Emergency Management Standard Manual and Emergency Response-Practical Manual to prevent mountain disaster. This study suggests the improvement plans that are legislated but not established cleary in the field of disaster in urban area. The main items are like as 1) adaptable standard and practical manual to prevent mountain disaster in urban area, 2) reinforcement between managing department and interagency vertically and horizontally in central and local government organization, 3) Personal SOP (Standard Operating Procedure) not EOP (Emergency Operation Plan), 4) considering 13 items selected by Ministry of Public Safety and Security, 5) schematization with personal action plan, 6) check list to do in the event of mountain disaster, and 7) regular practice per quarter.

A Calculation of Compression Index of the South Coast Soft Clay Utilizing Field Measurement (계측자료를 활용한 남해안 연약 점성토의 압축지수 산정)

  • Lee, Changouk;Park, Choonsik;Kwon, Hyeonjin;Kim, Jonghwan
    • Journal of the Korean GEO-environmental Society
    • /
    • v.16 no.6
    • /
    • pp.23-30
    • /
    • 2015
  • This study analyzed degree of disturbance, using specimens by laboratory test with large block specimens and piston samplers collected from the Korea's two typical soft ground districts: South coast Gwangyang and Yangsan. To assess the characteristics of compression index of laboratory test incurred by disturbance, the compression index of laboratory test was compared with the back analysis compression index resulting from the analysis of the measured settlement. The analysis of specimen disturbance of the laboratory test results with the piston specimens of the two districts found that the qualities of most specimens were poor and the settlement predicted by the laboratory test compression index was underestimated. The analysis of test material taken from nearby areas proved that the disturbance degrees of large block specimens were lower than that of the piston specimens. The hyperbolic method, Hoshino method, Asaoka method, and ${\sqrt{S}}$ method, all of which are predictive methods using measured settlement, were employed to reach a conclusion that reliabilities of each predictive method except predictive material of a few points were the same. To compensate the disturbance effects on compression index of the piston specimens, we suggested a new modification formula that estimates compression index of piston specimens, using Schmertmann's corrected compression index, and back analysis compression index from the analysis of predictive settlement.

Performance Ability after CPR Education of the ground workers in an airport (공항 지상 근무자의 심폐소생술 수행능력)

  • Shin, Ji-Hoon
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.3
    • /
    • pp.29-40
    • /
    • 2009
  • Objective : This study is an experimental study which is designed to examine the differences between knowledge and self-confidence before and after theory education(CPR PPT material) based on guidelines of CPR and emergency cardiac treatment of American Heart Association(AHA, 2005) and video self-instruction program for the general public by Korean Association of Cardiopulmonary Resuscitation(KACPR), trace CPR performance ability after CPR and AED education and investigate the accuracy of artificial respiration and chest compression, and know the difference in CPR performance abilities including AED. Methods : Subjects of this study include ground crews and staffs at M airport in G province equipped with emergency equipments for CPR according to Art. 47, Sec. 2 of Emergency Medical Law, airport police, rent-a-cops, security guard, quarantine officer, custom officer, and communication, electricity, civil engineering, facility management staff, airport fire fighting staff, air mechanic, traffic controller, and airport management team among airport facility management staffs. They were given explanation of necessity of research and 147 of 220 subjects who gave consent to this research but 73 who were absent from survey were excluded were used as subjects of this study. of 147 subjects, there were 102 men and 45 women. Results : 1) Knowledge score of CPR was $6.18{\pm}0.87$ before instruction and it was increased to $15.12{\pm}1.78$ after instruction, and there was statistically significant difference. 2) Self-confidence score in CPR was $3.16{\pm}0.96$ before instruction and it was increased to $7.05{\pm}0.75$ after instruction, and there was statistically significant difference. 3) Total average score in CPR performance ability after instruction was 7.46 out of 9, performance ability was highest in confirmation of response as 144(97.95%), follwed by request of help as 140(95.25%) and confirmation of respiration as 135(91.83%), and lowest in performing artificial respiration twice(gross elevation of chest) as 97(65.98%). Accuracy of artificial respiration(%) was $28.60{\pm}16.88$ and that of chest compression(%) was $73.10{\pm}22.16$. 4) Performance ability of AED after instruction showed proper performance in power on by 141(95.91%) and attaching pad by 135(91.83%), hand-off for analyzing rhythm showed 'accuracy' in 115(78.23%) and 'non-performance' in 32(21.77%), delivery of shock and hand-off confirmation showed 'accuracy' in 109(74.14%) and 'inaccuracy' in 38(25.86%), and beginning chest compression immediately after AED was done by 105(71.42%).

  • PDF

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

Counter Measures by using Execution Plan Analysis against SQL Injection Attacks (실행계획 분석을 이용한 SQL Injection 공격 대응방안)

  • Ha, Man-Seok;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.76-86
    • /
    • 2016
  • SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.