• Title/Summary/Keyword: Virtual ID

Search Result 50, Processing Time 0.029 seconds

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.

Mail Image Filtering Method for Use of Virtual ID (Virtual ID 사용을 위한 유사한 우편 영상 추출 방법)

  • Park Sang-Cheol;Jeong Chang-Boo;Son Hwa-Jeong;Kim Soo-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.817-820
    • /
    • 2004
  • 우편물을 배달하기 위해서 집배원은 오전 시간의 대부분을 이용하여 배달 경로에 따라 우편물을 정렬한다. 우리나라의 자동화 시스템은 순로구분의 전단계까지만 수행하는데 그치고 있으나 외국의 순로 구분 자동화 시스템은 바코드나 사용자 태그를 이용하여 순로구분을 수행한다. 본 논문에서는 영상 기반특징과 인식 기반 특징인 Virtual ID 사용을 위한 우편 영상 검증의 과정으로 처리 속도를 향상 시킬 수 있도록 유사한 영상 혹은 동일 DM 발송 우편 영상을 추출해 내는 2가지 방법을 제안한다. 첫째는 영상 기반 특징을 추출하여 신경망을 사용하고, 두 번째는 우편 영상의 문자열의 Bound Box를 추출하여 이들의 겹침정도를 이용하여 유사성을 판별한다. 실험을 통해 제안한 두가지 방법이 유용함을 입증하였다.

  • PDF

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

Analysis of the Flow of a Circular Nozzle using a slant Hot-Wire (단일 경사열선을 이용한 원형노즐의 유동해석)

  • Chung, Wui-Jun;Oh, Sang-Han
    • The KSFM Journal of Fluid Machinery
    • /
    • v.12 no.2
    • /
    • pp.17-23
    • /
    • 2009
  • The program using $C/C^{++}$ which could calculate 3-D velocities from data of the flowfield obtained by a slant hot-wire has been developed. The characteristic of the exit flowfield of a circular nozzle with a curved surface was investigated. From the result, the inward-flow was verified at adjacent layers near the boundary of the exit flowfield of a circular nozzle in Id and outward-flow was sensed gradually from down-flow of Id. Similarity of the nondimensional velocity profile properlly could be obtained except near Id and the virtual origin reasonably could be obtained.

Isolation Schemes of Virtual Network Platform for Cloud Computing

  • Ahn, SungWon;Lee, ShinHyoung;Yoo, SeeHwan;Park, DaeYoung;Kim, Dojung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2764-2783
    • /
    • 2012
  • Network virtualization supports future Internet environments and cloud computing. Virtualization can mitigate many hardware restrictions and provide variable network topologies to support variable cloud services. Owing to several advantages such as low cost, high flexibility, and better manageability, virtualization has been widely adopted for use in network virtualization platforms. Among the many issues related to cloud computing, to achieve a suitable cloud service quality we specifically focus on network and performance isolation schemes, which ensure the integrity and QoS of each virtual cloud network. In this study, we suggest a virtual network platform that uses Xen-based virtualization, and implement multiple virtualized networks to provide variable cloud services on a physical network. In addition, we describe the isolation of virtual networks by assigning a different virtualized network ID (VLAN ID) to each network to ensure the integrity of the service contents. We also provide a method for efficiently isolating the performance of each virtual network in terms of network bandwidth. Our performance isolation method supports multiple virtual networks with different levels of service quality.

Design of Location Recognition and ID Identification for NFT Reports in Metaverse-based Field_study Trip (메타버스기반 체험학습 NFT보고서의 위치인식과 ID식별 설계)

  • Mingoo Kang
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.38-44
    • /
    • 2023
  • In this paper, a blockchain-based platform of NFT(Non-Fungible Token) reports was proposed to ensure the reliable performance contents of field study trip. It is possible to identify and manage the personal multi biomeric authentication user ID of activity records for students in a mobile IP-based metaverse with the linkage of extended reality(XR). At this time, many quests and incentives of platform are provided to induce students to experience smart and fun field studying facilities by linking real trip experiences and virtual extended_reality studies in the metaverse interworking.

A Study on the Dynamic Characteristics of the Coil Forming Machine for AC Motor (AC모터 코일포밍머신의 동특성에 대한 연구)

  • Jeong, Sang-Hwa;Song, Suk;Choi, Seok-Hwan
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2003.10a
    • /
    • pp.159-163
    • /
    • 2003
  • In recent days, as the efficiency of electronic home applications become higher, that of the driving AC motor become higher. On this reason, the demand fir high capacity coil firming machine is increasing. Since the coil forming is not simply related with the only capacity of hydraulic cylinder, the development of a newer coil firming machine which has new filming mechanism new driving method, new filming tool, and new specification is required. In this paper, the virtual prototype which have new mechanism is developed. This prototype is tested and experimented on PC with the same condition as actual. The results from the virtual experiment is applied to the actual design process.

  • PDF

Basic MOFI Testbed Implementation for Host ID-based Communication (호스트 ID 기반 통신을 위한 기본 MOFI 테스트베드 구축)

  • Jung, Whoi-Jin;Min, Seok-Hong;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.17-27
    • /
    • 2011
  • In recent years, the interest and research for Future Internet are rapidly increasing. In domestic, MOFI (Mobile Oriented Future Internet) is proposed as one architecture of Future Internet. MOFI is a data transmission architecture which provides a mobility, name-based communication and routing scalability. In this paper we implement a basic MOFI testbed that supports HID-based communication, and verify the feasibility of HID-based communication through experimentation of general service such as PING and WWW service. We used "VirtualBox" as a virtual machine and implement a packet processing and a HCP header addition and translation function using "Click Modular Router".

A Study of Memory Information Collection and Analysis in a view of Digital Forensic in Window System (윈도우 시스템에서 디지털 포렌식 관점의 메모리 정보 수집 및 분석 방법에 관한 고찰)

  • Lee Seok-Hee;Kim Hyun-Sang;Lim JongIn;Lee SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.87-96
    • /
    • 2006
  • In this paper, we examine general digital evidence collection process which is according to RFC3227 document[l], and establish specific steps for memory information collection. Besides, we include memory dump process to existing digital evidence collection process, and examine privacy information through dumping real user's memory and collecting pagefile which is part of virtual memory system. Especially, we discovered sensitive data which is like password and userID that exist in the half of pagefiles. Moreover, we suggest each analysis technique and computer forensic process for memory information and virtual memory.

Overlay Multicast for node of Management in Multi-layer (다중 계층 노드관리를 위한 오버레이 멀티캐스트)

  • Lee, Bum-Jae;Chi, Sam-Hyun;Lee, Kang-Whan
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.623-624
    • /
    • 2008
  • Overlay Multicast Routing Algorithm operates flexibly according to the various limited condition and environment of the MANET. Because of this Algorithm have maintenance and transmission of the network to use virtual Overlay ID. This paper proposes the method to give node ID considering attribute of node. If it uses ID considering attribute of node, it will improve routing speed.

  • PDF