• Title/Summary/Keyword: WEB Server

Search Result 1,877, Processing Time 0.028 seconds

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

Maintenance of Hazardous Steep Slopes on National Park Trails (국립공원 탐방로 내 위험 급경사지 유지관리 방안 연구)

  • Kim, Hong Gyun;Kim, Tae Ho;Kim, Jae Hak;Kwak, Jae Hwan;Park, Sung Wook;Choi, Soo Won;Song, Young Karb
    • The Journal of Engineering Geology
    • /
    • v.26 no.1
    • /
    • pp.129-142
    • /
    • 2016
  • National parks, which are located mainly in mountainous areas, are always at risk of damage by landslides. The goal of this study is to establish a method for systematically maintaining hazardous steep slopes along trails in national parks. We produced a checklist suitable for each of the 19 national parks nationwide and investigated 183 slopes. The aim of these investigations is to recommend appropriate slope-stability countermeasures, including field investigations and stability analysis. We made preliminary investigations at specific sites, evaluating the slope hazard using specialized equipment such as terrestrial LiDAR. An investment priority formula was developed, and ranking and hazardous grades were calculated as part of a long-term maintenance plan. Finally, to systematically manage dangerous slopes and to house all the field data within one system, we developed the "Slope Maintenance System in National Parks" based on web server that can show various information for slopes.

A Multiple Signature Authentication System Based on BioAPI for WWW (웹상의 BioAPI에 기반한 서명 다중 인증 시스템)

  • Yun Sung Keun;Kim Seong Hoon;Jun Byung Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1226-1232
    • /
    • 2004
  • Biometric authentication is rising technology for the security market of the next generation. But most of biometric systems are developed using only one of various biological features. Recently, there is a vigorous research for the standardization of various biometric systems. In this paper, we propose a web-based authentication system using three other verifiers based on functional, parametric, and structural approaches for one biometrics of handwritten signature, which is conformable to a specification of BioAPI introduced by BioAPI Consortium for a standardization of biometric technology. This system is developed with a client-server structure, and clients and servers consist of three layers according to the BioAPI structure. The proposed neb-based multiple authentication system of one biometrics can be used to highly increase confidence degree of authentication without additional several biological measurements, although rejection rate is a little increased. That is, the false accept rate(FAR) decreases on the scale of about 1:40,000, although false reject rate(FRR) increases about 2.7 times in the case of combining above three signature verifiers. So the proposed approach can be used as an effective identification method on the internet of an open network. Also, it can be easily extended to a security system using multimodal biometrics.

A Case Study on SK Telecom's Next Generation Marketing System Development (SK텔레콤의 차세대 마케팅 시스템 개발사례 연구)

  • Lee, Sang-Goo;Jang, Si-Young;Yang, Jung-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.158-170
    • /
    • 2008
  • In response to the changing demands of ever competitive market, SK Telecom has built a new marketing system that can support dynamic marketing campaigns and, at the same time, scale up to the large volumes of data and transactions for the next decade. The system which employs Unix-based client-server (using Web browser interfaces) architecture will replace the current mainframe-based COIS system. The project, named NGM (Next Generation Marketing ), is unprecedentedly large in scale. However, both managerial and technical problems led the project into a crisis. The application framework that depended on a software solution from a major global vendor could not support the dynamic functionalities required for the new system. In March 2005, SK telecom declared the suspension of the NGM project. The second phase of the project started in May 2005 following a comprehensive replanning. It was decided that no single existing solution could cope with the complexity of the new system and hence the new system would be custom-built. As such. a number of technical challenges emerged. In this paper, we report on the three key dimensions of technical challenges - middleware and application framework, database architecture and tuning, and system performance. The processes and approaches, adopted in building NGM system, may be viewed as "best practices" in the telecom industry. The completed NGM system, now called "U.key System," successfully came into operation on the ninth of October, 2006. This new infrastructure is expected to give birth to a series of innovative, fruitful, and customer-oriented applications in the near future.

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents (디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구)

  • Kim, Yong;Kim, Eun-Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.27-41
    • /
    • 2009
  • With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.

A Study on the necessity of Open Source Software Intermediaries in the Software Distribution Channel (소프트웨어 유통에 있어 공개소프트웨어 중개자의필요성에 대한 연구)

  • Lee, Seung-Chang;Suh, Eung-Kyo;Ahn, Sung-Hyuck;Park, Hoon-Sung
    • Journal of Distribution Science
    • /
    • v.11 no.2
    • /
    • pp.45-55
    • /
    • 2013
  • Purpose - The development and implementation of OSS (Open Source Software) led to a dramatic change in corporate IT infrastructure, from system server to smart phone, because the performance, reliability, and security functions of OSS are comparable to those of commercial software. Today, OSS has become an indispensable tool to cope with the competitive business environment and the constantly-evolving IT environment. However, the use of OSS is insufficient in small and medium-sized companies and software houses. This study examines the need for OSS Intermediaries in the Software Distribution Channel. It is expected that the role of the OSS Intermediary will be reduced with the improvement of the distribution process. The purpose of this research is to prove that OSS Intermediaries increase the efficiency of the software distribution market. Research design, Data, and Methodology - This study presents the analysis of data gathered online to determine the extent of the impact of the intermediaries on the OSS market. Data was collected using an online survey, conducted by building a personal search robot (web crawler). The survey period lasted 9 days during which a total of 233,021 data points were gathered from sourceforge.net and Apple's App store, the two most popular software intermediaries in the world. The data collected was analyzed using Google's Motion Chart. Results - The study found that, beginning 2006, the production of OSS in the Sourceforge.net increased rapidly across the board, but in the second half of 2009, it dropped sharply. There are many events that can explain this causality; however, we found an appropriate event to explain the effect. It was seen that during the same period of time, the monthly production of OSS in the App store was increasing quickly. The App store showed a contrasting trend to software production. Our follow-up analysis suggests that appropriate intermediaries like App store can enlarge the OSS market. The increase was caused by the appearance of B2C software intermediaries like App store. The results imply that OSS intermediaries can accelerate OSS software distribution, while development of a better online market is critical for corporate users. Conclusion - In this study, we analyzed 233,021 data points on the online software marketplace at Sourceforge.net. It indicates that OSS Intermediaries are needed in the software distribution market for its vitality. It is also critical that OSS intermediaries should satisfy certain qualifications to play a key role as market makers. This study has several interesting implications. One implication of this research is that the OSS intermediary should make an effort to create a complementary relationship between OSS and Proprietary Software. The second implication is that the OSS intermediary must possess a business model that shares the benefits with all the participants (developer, intermediary, and users).The third implication is that the intermediary provides an OSS of high quality like proprietary software with a high level of complexity. Thus, it is worthwhile to examine this study, which proves that the open source software intermediaries are essential in the software distribution channel.

  • PDF

Design and Implementation of a WML Converter and WML Editor for Automatic Generation of Wireless Internet Content (무선 인터넷 컨텐츠의 자동 생성을 위한 WML 변환기와 WML 편집기의 설계 및 구현)

  • Jeon Yun-Ju;Choi Eun-Hye;Jung Hyun-Suk;Cho Hyeyoung;Lee Minsoo;Yong Hwan-Seung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.309-318
    • /
    • 2005
  • In order to present wireless Internet users with previously created HTML contents and applications, it is essential to research and develop the technology to efficiently convert HTML documents into documents and further provide a way to edit the WML documents. This paper describes the design and development of a WML converter and WML editor The WML converter can convert HTML pages in real time into WML documents that are suitable for the WAP environment. The WML editor enables creation and modification of WML documents in a WYSIWYG fashion. These tools enable the previous services based on HTML documents to be easily adapted to the wireless environment. The developed WML converter can be installed on a proxy server to support real time conversion of Web contents. It is superior to other converters in terms of the various image formats it supports and the improvements on the conversion of the link and frame tags. Users can continuously browse via links and also view frames. Automatic dividing of large WML documents into WML cards md user defined conversion rules are also supported. The WML editor is also integrated with the converter and provides an integrated WYSIWYG environment for creating, converting and publishing WML documents.

A study on the methodology for the automatic semantic web service composition problem (자동적인 시맨틱 웹 서비스 구성문제를 위한 방법론에 관한 연구)

  • Yang, Jin-Hyuk;Lee, Kang-Chan;Kim, Sung-Han;Min, Jae-Hong;Chung, In-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.2265-2268
    • /
    • 2002
  • 인터넷 사용자들의 기하급수적인 증가와 웹 페이지의 폭발적인 증가로 인하여 정보공유를 위한 인터넷에서 효율적으로 원하는 정보를 발견하고 이용하기에 매우 힘든 상황에 처해있다. 따라서, 이러한 문제점들을 근본적으로 해결하기 위한 노력의 일환으로 기계가 이해하고 추론할 수 있는 시맨틱 웹이 등장하였다. 시맨틱 웹과 관련된 여러 가지 기술들 중 시맨틱 웹 서비스는 사용자에게 현재의 인터넷 환경에서 제공할 수 있는 서비스보다 향상된 고품질의 서비스를 제공하는 것을 목적으로 삼고 있다. 이러한 시맨틱 웹 서비스는 웹 서비스의 발견, 실행 및 구성으로 구성된다. 본 논문에서는 시맨틱 웹 서비스를 자동화하기 위한 노력의 일환으로서 시맨틱 웹에서 웹 서비스를 구성하는 문제에 대하여 언급한다. 시맨틱 웹 서비스 구성문제는 사용자의 요구사항을 충족시키기 위하여 다양한 웹 서비스들을 조합하는 문제이다. 그러나, WSFL, X-LANG 및 BPEL4WS 그리고, DAML-S와 같은 웹 서비스 구성문제에 대한 일련의 노력들에서는 사용자 요구사항에 대한 검증이나 서비스의 품질에 대한 사항들을 확인 및 제공할 수 있는 방법들이 없다. 따라서, 본 논문에서는 시맨틱 웹 서비스 구성문제와 관련된 상기와 같은 문제점들을 해결할 수 있는 방법론을 제시한다. 본 논문에서 제시된 방법론에서는 시맨틱 웹 구성문제를 제약만족문제로 변환함으로써 제약만족문제에 있어 늘리 알려진 다양한 알고리즘들을 활용할 수 있는 장점들이 있을 뿐만 아니라 사용자들의 요구사항에 대한 검증과 서비스의 품질을 확인할 수 있는 장점들이 있다.의 위상변화에 대한 적응성을 높일 수 있도록 한다. SQL Server 2000 그리고 LSF를 이용하였다. 그리고 구현 환경과 구성요소에 대한 수행 화면을 보였다.ool)을 사용하더라도 단순 다중 쓰레드 모델보다 더 많은 수의 클라이언트를 수용할 수 있는 장점이 있다. 이러한 결과를 바탕으로 본 연구팀에서 수행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나

  • PDF

Development and Performance Test of Gas Safety Management System based on the Ubiquitous Home (u-home 가스안전관리시스템 개발 및 성능시험)

  • Park, Gyou-Tae;Lyu, Geun-Jun;Kim, Young-Gyu;Kim, Yeong-Dae;Jee, Cha-Wan;Kwon, Jong-Won;Kim, Hie-Sik
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.3
    • /
    • pp.13-20
    • /
    • 2011
  • In this paper, we proposed a system to raise gas safety management by using the wireless communication module and intelligent gas safety appliances. Our designed systems configure a micom-gas meter, an automatic extinguisher, sensors, and a wallpad. A micom-gas-meter monitors gas flow, gas pressure, and earthquake. An automatic fire extinguisher checks gas(combustible) leaks and temperature of $100^{\circ}C$ and $130^{\circ}C$. Sensors measure smoke and CO gas. In our novel system, a micom-gas meter cut off inner valve with warnings, an automatic fire extinguisher cut off middle valve and spray extinguishing materials, and sensors generate signals for smoke and CO when occurring gas risk. Gas safety appliances and sensors takes safety measures, and transmit those signal to a wallpad. The wallpad again transmit signal like events to a control server. Users can connect web pages for gas safety through B-ISDN and control and manage them. We hereby devised scenarios for gas safety and risk management, and demonstrated their effectiveness through experiments.

IoT based Mobile Smart Monitoring System for Solar Power Generation (IoT 기반 모바일 스마트 태양광 발전 모니터링 시스템)

  • Lee, Jaejin;Kim, Kihun;Park, Soovin;Byun, Hyoungjune;Shim, Kyusung;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.55-64
    • /
    • 2017
  • In this paper, we propose and implement an IoT based mobile smart monitoring system in the view point of safety inspection for solar power generation. The main features and contributions of proposed system are as follows. First, the proposed system model can evaluate periodically in the view point of safety inspection the conditions of the system and structure of solar power generation. Second, the proposed system automatically re-processes the measurement data of the system and structure for solar power generation and save it into database. Third, using the re-processed and saved information, the proposed system can provide the monitoring information with webpage form to both administrator and owner of solar power generation system, thus they can measure and confirm directly in the view point of safety inspection the conditions of the solar generation structure without visiting those places. Fourth, the provided web pages for the monitoring of solar power generation can be accessed regardless of the system structures. The performance evaluations of the proposed system show that the proposed monitoring system can save efficiently the data received from the sensors installed in the structure of solar power generation into the data base in the collecting server. And the proposed system can support that both administrator and user of solar power generation system access webpage in real time without considering places by using mobile phone and desktop computer and obtain the information for the conditions of the system and structure of solar power generation with graph forms.