• Title/Summary/Keyword: Unix

Search Result 386, Processing Time 0.029 seconds

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Implimentation of MMS using JNI (JNI를 이용한 MMS 구현)

  • Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.135-145
    • /
    • 2000
  • Manufacturing Message Specification (MMS) is designed as a communication standard protocol, ISO/IEC 9506, on factory automation for messaging between heterogeneous programmable unit controller, PLC, NC, Robot, of different vendors on the networks. MMS is also a standard protocol of OSI reference model application layer, In this paper, we show an implementation of MMS over TCP/IP using ANSI-C programming language on the unix environment, and make java classification using java native interface (NJI) with MMS library. The use of java classification provides a basic environment ot overcome a difficult programming with different MMS application programming interface (MMS-I) which requires a siklled programming technique of graphic user interface (GUI). In this paper, we implement a MMS application program of the automated assembly model for printed circuit board based on WWW which shows the operation, control and monitoring of real manufacturing device (RMD) with web browser providing users for consistent user interface.

  • PDF

Development of Open Land Management Information System(LMIS) Middleware (개방형 토지관리정보체계 미들웨어 개발에 관한 연구)

  • 서창완;백재현;홍성학
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.353-368
    • /
    • 2001
  • Recently central and local governments developed a huge spatial database and system using full-scale Geographic Information System (GIS). But Inconsistent spatial data through duplicated database management drops off in efficiency and confidence of administration. It is difficult to share data because of their unique system and data type. Under these circumstances Ministry of Construction and Transportation (MOCT) has been carrying out Land Management Information System (LMIS) to computerize land administration and policy affairs and to implement land database such as law, spatial, attribute data. A prerequisite mission of LMIS is to develop open system for solving the problem of duplicated data management and data sharing and for supporting various computer environments such as hardware, software, network etc. The purpose of LMIS is to reuse the existing investment resources and to expand the existing system resources. Therefore the purpose of this study is to investigate a method of LMIS operation under the existing circumstances and expansion of the system in the future. To do this, Supporting various DBMS, GIS server, Distributing Computing Platform(Unix, NT Server) is needed. Especially LMIS need to be developed as open system with interoperability to get independence of application from various GIS servers.

  • PDF

Performance Evaluation of I/O Intensive Stress Test in Cluster File System SANiqueTM (집중적인 입출력 스트레스 테스트를 통한 클러스터 파일 시스템 SANiqueTM의 성능평가)

  • Lee, Kyu-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.415-420
    • /
    • 2010
  • This paper describes the design overview of shared file system $SANique^{TM}$ and analyzes the performance evaluation results of I/O intensive stress test based on various cluster file system architectures. Especially, we illustrate the performance analysis for the comparison results between the $SANique^{TM}$ and the Linux file system EXT3 system that is used to generally in Unix world. In order to perform our evaluation, Oracle 10g database system is operated on the top of cluster file system, and we developed the various kinds of testing tools which are compiled by ESQL/C from Oracle. Three types of architectures are used in this performance evaluation. Those are the cluster file system $SANique^{TM}$, EXT3 and the combined architecture of $SANique^{TM}$ and EXT3. In this paper, we present that the results of $SANique^{TM}$ outperforms other cluster file systems in the overhead for providing the true sharing over the connecting server nodes.

Design, Implementation, and Performance Evaluation of an Embedded RDBMS Miracle (Miracle 임베디드 RDBMS 설계, 구현 및 성능 평가)

  • Seo, Nam-Won;Kim, Keong-Yul;Kim, Su-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3227-3235
    • /
    • 2011
  • In this paper, a relational embedded DBMS was designed and a prototype 'Miracle' RDBMS (MDB) was developed. MDB is written in C and works on Unix, Linux and Windows platforms locally. It accesses database through SQL interfaces and API functions and uses $B^+$ tree index. It guarantees ACID in transactions and supports low concurrency control and processes SQL statements on a single table. To evaluate the performance of MDB on an ARM board EZ-S3C6410 and to compare the performance of MDB with that of SQLite, an experiment was carried out to estimate processing times for insertion, selection, update and deletion operations. The result shows that the average times for selections and insertions in MDB were 38.46% and 22.86% faster than those in SQLite, respectively, but the average times for updates and deletions in SQLite were 28.33% and 26.00% faster than MDB, respectively, This experiment shows that fetching data from database and sending data to database in MDB is faster than in SQLite, but $B^+$ tree index is implemented more effectively in SQlite than in MDB.

Design and Implementation of an IP-based Fixed VoIP Emergency System (IP-기반 고정형 VoIP 긴급통화 시스템 설계 및 구현)

  • Ko, Sang-Ki;Chon, Ji-Hun;Choi, Sun-Wan;Kang, Shin-Gak;Huh, Mi-Young
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.245-252
    • /
    • 2008
  • An emergency service over Voice over IP (VoIP) network is an essential condition, like the existing telecommunication services. To support for the emergency services, standardization works have been performed. The National Emergency Number Association (NENA) has been developing the framework and procedures for an emergency service for Non-IP based network, rather than protocols. In contrast, the Internet Engineering Task Force (IETF) has been only focused on end-to-end IP-based emergency calls. The NENA architecture is incompatible with the IETF protocols. To solve the problem, we design and implement a SIP-based VoIP emergency system by adopting the NENA architecture and by applying IETF protocols, for both IP-based Pubic Safety Answering Point (PSAP) and PSTN-based PSAP. It is implemented and tested under UNIX environment.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

A Study for the Implementation of the DICOM Toolkit Software (DICOM 툴킷 소프트웨어 구현에 관한 연구)

  • Shin Dong Kyu;Kim Dong Youn;Kim Dong Sun
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.6 s.81
    • /
    • pp.481-486
    • /
    • 2003
  • This paper describes the implementation of the toolkit software for the DICOM. the international standards of medical imaging. Well known toolkits do not have the functions related to imaging or ported to Windows OS after developed at UNIX OS or do not have mechanism for the speed and memory management or have complicated structure comes from DICOMI complexity. The toolkit introduced in this paper was designed for the hospital environments. It handles mass images at Windows based PC system. supports multi-threading to enhance the efficiency. supports every functions in Object Oriented Programming style needed at clinical application which makes the rapid development of the DICOM related applications. The results says that the toolkit can display 50 CT, 50 MR, 10 CR and 10 DX images in 12 seconds and occupy small quantity of physical memory at usual PC system.

Genderless Trends in Modern Fashion (현대 패션에 나타난 젠더리스 경향)

  • Yan, Xin;Kim, Hyun-Joo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.499-512
    • /
    • 2022
  • The purpose of this study was to first look at genderless concepts that are different from Unix, and by grasping the trend of genderless clothes in modern fashion and examining their characteristics, we looked at genderless trends and characteristics in modern fashion. To this end, this study conducted a theoretical review and collection case analysis through domestic and foreign literature and fashion websites. Based on this, the characteristics of genderless clothes expressed in the collection were derived by analyzing designs with strong genderless tendencies in modern collections. As a result of the study, genderless fashion in modern collections could be derived from three visible results: innovation, rebellion, and future-oriented. In addition, modern genderless fashion contains various needs for mental gender and physiological gender, not simply physiological gender, and this is seen by interacting with the current social phenomenon in which gender distinction becomes ambiguous. Understanding and studying the genderless phenomenon, which has become a cultural phenomenon and popularity, hopes that many follow-up studies related to genderless clothes will be conducted in the future.

A study on the Construction of Remote Status Display Software for Soft-RAID system of Linux based Server (리눅스 기반 서버의 소프트-RAID 시스템용 원격 상태 표시 소프트웨어의 구성에 관한 연구)

  • Na, Won-Shik;Lee, Hyun-Chang
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.97-102
    • /
    • 2019
  • In this paper, we propose a method to remotely intuitively identify faults found in storage devices in soft-RAID used in a server system composed of Linux. To do this, we analyze the principle and problem of fault reporting method in the soft-RAID system of Linux OS and suggest the state of storage devices in remote Internet Home-page. The proposed method consists of a method of displaying images on the Internet home-page, so that it can be arranged freely when creating a home-page, and the image data is composed of external files, so it is bery convenient to edit and replace images In order to verify the effectiveness of the proposed method, we have confirmed that the state of each storage device can be confirmed at a long distance without any major addition to the Home-page configuration.