• Title/Summary/Keyword: User Connection

Search Result 578, Processing Time 0.025 seconds

Implementation of User Connection Prevention System through LAN Monitoring from Internet Harmful Site (LAN 모니터링을 통한 인터넷 유해 사이트의 사용자 접속 방지 시스템 개발)

  • Park, Hyoung-Bae;Chung, Joong-Soo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.1-7
    • /
    • 1999
  • The Internet is emerging as a powerful tool in the area of information and communication technology. The WWW has been especially contributed to increase the internet demand because of its browser which has "Graphic User Interface". Nowadays number of hosts that supply harmful information such as pornographic materials, and the infringement of human rights is rapidly increased. Access to such materials is very easy. Therefore security system which will protect young users from access to harmful host is needed. This paper presents implementation of user system has database about harmful hosts at the Internet and monitors that the user traffic over LAM get touch with the hosts. The system can not make the user access the harmful host because it can over LAN. The performance analysis on the developed system monitoring the traffic over LAN of Andong university is carried out. The performance analysis of monitoring results satisfies with preventing users from the connection to the internet harmful sites.

  • PDF

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

Cache Algorithm in Reverse Connection Setup Protocol(CRCP) for effective Location Management in PCS Network (PCS 네트워크 상에서 효율적인 위치관리를 위한 역방향 호설정 캐쉬 알고리즘(CRCP)에 관한 연구)

  • Ahn, Yun-Shok;An, Seok;Bae, Yun-Jeong;Jo, Jea-Jun;Kim, Jae-Ha;Kim, Byung-Gi
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.630-632
    • /
    • 1998
  • The basic user location strategies proposed in current PCS(Personal Communication Services) Network are two-level Database strategies. These Databases which exist in the Signalling network always maintain user's current location information, and it is used in call setup process to a mobile user. As the number of PCS users are increasing, this strategies yield some problem such as concentrating signalling traffic on the Database, increasing Call setup Delay, and so on. In this paper, we proposed RCP(Reverse Connection setup Protocol) model, which apply RVC(Reverse Virtual Call setup) algorithm to PCS reference model, and CRCP(Cache algorithm in RCP) model, which adopt Caching strategies in the RCP model. When Cache-miss occur, we found that CRCP model require less miss-penalty than PCS model. Also we show that proposed models are always likely to yield better performance in terms of reduced Location Tracking Delay time.

  • PDF

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A Study of Trajectory Mapping Method as a User Interface Design Tool for Mobile Devices (모바일 기기의 사용자 인터페이스 설계 도구로서 Trajectory Mapping 방법에 관한 연구)

  • Lee, Suk-Won;Myung, Ro-Hae
    • IE interfaces
    • /
    • v.22 no.1
    • /
    • pp.17-25
    • /
    • 2009
  • In mobile device's user interface, menu organization is very important as well as menu structure because small display of mobile device. Menu items should be organized based on user knowledge structure to design user-centered interface. Traditionally, MDS (Multidimensional Scaling) have been most often used to expose users' perceived organization of menu items. But, information that MDS reveals is just relative spatial location of concepts and not relevant to concepts connection. Unlike MDS, Trajectory Mapping explicitly finds users' cognitive links between perceived concepts. This study proposes a Trajectory Mapping technique for eliciting knowledge structure, especially a set of cognitive pathways linking menu items, from end user. With twelve participants, MDS and Trajectory Mapping were conducted using cellular phone's menu items. And user knowledge structure was analyzed through Visual Concept Map that combination of results of MDS and Trajectory Mapping. After then, menu items were organized according to users' perceived organization. Empirical usability test was also conducted. The results of usability test showed that usability, in terms of task performance time, number of errors, and satisfaction, for newly organized interface was significantly improved compare to original interface. The methodology of this study is expected to be applicable to design a user-centered interface. In other words, Trajectory Mapping technique can be used as a design tool of user interface for imposing user knowledge structure on the interface.

A Study of Web 2.0 Trend & Service View (웹 2.0 전망 및 서비스 동향에 관한 연구)

  • Kim, Seong-Ho;Kim, Heung-Do
    • Journal of Digital Convergence
    • /
    • v.5 no.2
    • /
    • pp.135-154
    • /
    • 2007
  • Web 2.0 is a platform which produce various service offered data from many people and it is activity open space depend on user focused community in diversity web environment. Web 2.0 is simple link structure with web site connectivity in informations such as page to page in other words, it is meaning of developing of semantical and circumstantial connection. The core of web 2.0 is user participation. RSS, Mash-up, UCC are main service of web 2.0 which make user directly participate from center of service offer to center of user manufactured an informations and then they offer re-information to other areas, also user freely express what they want through UCC and blogger. However, recently it comes the argument of skeptic of web 2.0 problem. Thus, In this research I will try to give an right comprehension and will try to have more accurate prediction of web 2.0 with the study of open service of web which is the key of web 2.0 success in a future.

  • PDF

Analyzing User Feedback on a Fan Community Platform 'Weverse': A Text Mining Approach

  • Thi Thao Van Ho;Mi Jin Noh;Yu Na Lee;Yang Sok Kim
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.62-71
    • /
    • 2024
  • This study applies topic modeling to uncover user experience and app issues expressed in users' online reviews of a fan community platform, Weverse on Google Play Store. It allows us to identify the features which need to be improved to enhance user experience or need to be maintained and leveraged to attract more users. Therefore, we collect 88,068 first-level English online reviews of Weverse on Google Play Store with Google-Play-Scraper tool. After the initial preprocessing step, a dataset of 31,861 online reviews is analyzed using Latent Dirichlet Allocation (LDA) topic modeling with Gensim library in Python. There are 5 topics explored in this study which highlight significant issues such as network connection error, delayed notification, and incorrect translation. Besides, the result revealed the app's effectiveness in fostering not only interaction between fans and artists but also fans' mutual relationships. Consequently, the business can strengthen user engagement and loyalty by addressing the identified drawbacks and leveraging the platform for user communication.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Jong-Geun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • In this paper, the possibility of a UE (User Equipment) incarceration attack using RRCRejecet and RRCRelease in 5G SNPN (Standalone Non-Public Network) is analyzed based on the 3GPP standard document. First, the cell selection and reselection procedures of the UE are analyzed, and then the processing process of the false base station and the UE before and after transmission of RRCReject and RRCRelease is analyzed. As a result of the analysis, it is possible that the false base station that transmits a strong signal causes the victim UE to establish an RRC connection to the false base station itself. In addition, if the false base station transmits an RRCReject message without integrity protection in response to the victim UE's attempt to establish an RRC connection, it is determined that the victim UE can continue to stay in the RRC connection attempt process. On the other hand, it is determined that it is impossible to incarcerate the victim UE by inducing an attempt to establish an RRC connection to another false base station using RRCRelease.

Web Service Connection Management Scheme for Seamless Migration of User Workspace in Cloud Computing (클라우드 컴퓨팅에서 사용자 작업환경의 끊김 없는 연계를 위한 웹 서비스 연결 관리 기법)

  • Choi, Min
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.193-202
    • /
    • 2009
  • Cloud computing emerges as a new computing paradigm which targets reliable and customizable services. The term builds on decades of research in virtual machine, distributed and parallel computing, utility computing, and more recently networking, web service, and software as a service. In this paper, we provide a seamless connection migration of web services. This is useful for cloud computing environment in which many client terminals have mobility. With the wireless internet facility, those mobile users can move place to place during internet communication. Therefore, we provide solutions to the two major problems in current virtualization based migration: communication failure problems and connection re-establishment. Communication channel flushing by zero window notification helps to resolve the communication failure problems and TCP port inheritance prevents connection re-establishment errors during socket reconstruction. Thus, our web service migration facility is now able to preserve open network connections, and even for server sockets. This is a highly transparent approach, in that we did not Introduce additional messages for channel flushing and did not make any modification to the TCP protocol stack. Experimental results show that the overhead due to connection migration of web services is almost negligible when compared with time to take the conventional web service migration.