• Title/Summary/Keyword: event service

Search Result 741, Processing Time 0.028 seconds

A Fast Authentication Method using Hash Value for Realtime Communication in Mobile IPv6 network (모바일 IPv6에서 실시간 통신을 위해 해쉬 값을 적용한 빠른 인증 기법)

  • Kang Hyung-Mo;Mun Young-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.113-120
    • /
    • 2006
  • A node of mobile IPv6 moving foreign networks needs authentication process to support right services against from security threat. AAA is a trust infrastructure that authenticates, authorizes, and accounts nodes receiving a network service. And Mobile IPv6 Working Group recommends use of AAA infrastructure to authenticate mobile nodes. Event though AAA infrastructure provides strong authentication functions, it should exchange a lot of messages to authenticate mobile nodes every movement. The exchange of lots of messages causes latency and it is interfered with realization of real-time communication. This paper proposes an authentication method of improved speed using hash value of mobile node to reduce authentication latency. Directly after movement, a mobile node applying a Proposed method uses extended existing security authentication for a while and deletes the establishment latency of new security authentication. Performance evaluation of a proposed method verifies the efficiency through the analysis of cost comparison with other methods. The conclusion of performance evaluation is that the proposed method gets more 25% performance improvement than a general method when a mobile node moves another subnet.

Synchronization of the Train PIS using the reference clock and development of a subtitle authoring tool (레퍼런스 클럭을 이용한 객차 PI 시스템 동기화 및 자막 편집기 개발)

  • Kim, Jung-Hoon;Jang, Dong-Wook;Han, Kwang-Rok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.1-10
    • /
    • 2007
  • This paper describes the development of a network-based passenger information system(PIS) which provides the convenience of the passenger of the train and heightens the effect of the subtitle service, the advertising and the shelter guidance broadcasting against the urgent event. The existing system uses VGA signal distributor in order to broadcast information with image and subtitle and voice guidance. In this paper we improve the existing system by applying the UDP and TCP/IP protocol and use a reference clock to solve a data loss and synchronization problem which occurs in this case. We also developed an XML-based subtitle authoring tool which can edit and play the subtitles with various 3D to improve the automatic guidance broadcasting and advertisement effect according to the operation schedule of the train. The system performance was evaluated through a simulation.

  • PDF

A Study on Problem Identification and Diagnosis from Virtual Network (가상 네트워크 망으로부터 문제점 식별 및 진단에 관한 연구)

  • Kim, Jeong-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.67-78
    • /
    • 2010
  • Various services such as IPTV, VoIP, multimedia over IP, on-line payment, on-line game, etc. were made possible due to the rapid advance of the network. In order to provide secure and seamless services over the network, the Internet service providers are performing continuous network monitoring using NMS. The main function of NMS is to perform a diagnosis to identify the potential causes of failure from event messages. In this paper, a simulation tool, named as NetDoctor, is presented which is capable of identifying and diagnosing the potential problems in the virtual network, before the network model is constructed. In NetDoctor, a series of various and artificial failure is imposed on the virtual network, and it was analyzed if NetDoctor could identify the problems. The experimental results on virtual network show that the developed tool is very effective in identifying and diagnosing the problems. The presented simulation tool can be used in the design of robust network.

Analyzing Effects on Firms' Market Value of Personal Information Security Breaches (개인정보 유출이 기업의 주가에 미치는 영향)

  • Kim, JeongYeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2013
  • With the increases of requirement for user identification in Internet services, we should let the service companies know my personal information. If the shared personal information with them are used in not-allowed area or delivered to un-authorized persons, we may have practical harms in several fields such as financial related operations. Korean Government has introduced new management method for personal information, but it is not hard to find the personal information management issues from Korean news papers. The proper measurement should be delivered to related companies to help them to decide investment for security. This paper review the indirect measurement method of demages by check the stock prices of related company for personal information management issue. We check the relationship between change of stock price and the information management issue. The result shows there are no changes in stock market. Korean government added strong regulations for personal information management though. To prevent further personal information issues, we should recognize the indirect damages properly and let the company pay higher reparations for any personal information abuse.

The Ideologies and the Systems of the Healthy Family Act (건강가정기본법의 이념과 체계)

  • 조희금;박미석
    • Journal of Families and Better Life
    • /
    • v.22 no.5
    • /
    • pp.331-344
    • /
    • 2004
  • Korean society recently realized the needs for a system that may effectively prevent and/or resolve different family problems caused by the rapidly changing modem society. In order to carry out this objectives. The Healthy Family Act has been legislated and is to be enforced from the 1st of January, 2005. Legislating the law is a means to establish an administrative and institutional structure that may bring in the total welfare system centered around family, so as to promote healthy families in our society. This is also a land marking event that has shifted the paradigm from the welfare system focusing on individual protection to the total welfare system based upon family units. Hence, this study is to examine the specific concepts of 'healthy family,' which is the goal of The Healthy Family Act, and thus to propose the objectives of the law by analysing the institutional system of it. The Healthy Family Act, which consists of major 37 items of 5 chapters with supplementary provisions, aims at the five ideals as follows. The first is to promote the healthy family which is the basis of individual welfare and well-to-do society. The second is to emphasize the importance of family and to provide total service system for family unit. The third is to establish the family value which supports gender-equality and democracy. The fourth is to reinforce the governmental support for independence and cooperation of family. And the fifth is to promote the in-advance and precautionary support for family problems. The law also includes administrative methods for Strong Families Center, different projects and programs for promoting healthy families, roles of Healthy Family Specialist and means to cultivating them, and the policies to specifically carry out the ideas of the law. It is now important to recognize that the development of nation is based on the healthy families and to put much effort in carrying out the ideas and goals of The Healthy Family Act.

A Study on Implementation of Fraud Detection System (FDS) Applying BigData Platform (빅데이터 기술을 활용한 이상금융거래 탐지시스템 구축 연구)

  • Kang, Jae-Goo;Lee, Ji-Yean;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.19-24
    • /
    • 2017
  • The growing number of electronic financial transactions (e-banking) has entailed the rapid increase in security threats such as extortion and falsification of financial transaction data. Against such background, rigid security and countermeasures to hedge against such problems have risen as urgent tasks. Thus, this study aims to implement an improved case model by applying the Fraud Detection System (hereinafter, FDS) in a financial corporation 'A' using big data technique (e.g. the function to collect/store various types of typical/atypical financial transaction event data in real time regarding the external intrusion, outflow of internal data, and fraud financial transactions). As a result, There was reduction effect in terms of previous scenario detection target by minimizing false alarm via advanced scenario analysis. And further suggest the future direction of the enhanced FDS.

An Empirical Study on the Role of Korean Banks' Information Production (국내 은행의 정보생산 역할에 관한 실증 연구)

  • Kim, Dae-Sik;Lee, Jae-Hyun;Lee, Joon-Haeng
    • The Korean Journal of Financial Management
    • /
    • v.27 no.1
    • /
    • pp.157-180
    • /
    • 2010
  • We try to check empirically whether the Korean banks produce valuable information for the firms listed in KOSDAQ. The sample covers 164 KOSDAQ firms which disclosed long-term bank loans for the period of October 2004 and March 2006. The result shows no abnormal stock returns from bank loan disclosures while the bond issuance indicates a negative abnormal return. In addition, when we control the effect of different debt levels of sample firms, we could not find any statistically significant effect of all types of borrowings. Results suggest that bank borrowings do not convey any favorable information on stock return and, as a result, bank loan is just one of several financing tools rather than a special event conveying good news for the firm under asymmetric information situation.

  • PDF

A Publish Subscribe Information Exchange Model and A Novel Matching Algorithm for Navy Shipboard Systems (해군 함정 컴퓨팅 체계 정보교환을 위한 Publish Subscribe 모델 기반 아키텍처 및 매칭 알고리즘)

  • Kim, Hong-Jae;Oh, Sang-Yoon
    • The KIPS Transactions:PartA
    • /
    • v.18A no.5
    • /
    • pp.181-192
    • /
    • 2011
  • Information superiority is an essential factor in modern warfare and it can be archived by efficient information exchange between systems. Various computing systems are installed on the today's navy vessels. However, it is hard to improve interoperability and efficiency of information exchange since the configurations of installed systems are varying. The military standard and commercial standard are mix-used between systems. In this paper, we propose an information exchange architecture based on Pub/Sub model as a communication middleware to improve interoperability as well as enhancing scalability. We also propose a novel tree matching algorithm to improve a performance of PubSub broker. In the proposed algorithm, each tree nodes have information about predicates of subscription that can reduce event matching time. The performance evaluation results show our proposed algorithm reduces time for matching predicates compare with other algorithms.

Safety Monitoring System of Structures Using MEMS Sensor (MEMS 센서기반의 구조물의 안전 모니터링 시스템)

  • Lim, Jaedon;Kim, Jungjip;Hong, Dueui;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1307-1313
    • /
    • 2018
  • In recent years, there have been frequent occurrences of collapsing buildings and tilting accidents due to frequent earthquakes and aging of buildings. Various methods have been proposed to prevent disasters on these buildings. In this paper, we propose a system that provides an indication of anomalous phenomena such as collapse and tilting of buildings by real-time monitoring of IoT(Internet of Things) based architectural anomalies. The MEMS sensor is based on the inclinometer sensor and the accelerometer sensor, transmits the detected data to the server in real time, accumulates the data, and provides the service to cope when the set threshold value is different. It is possible to evacuate and repair the collapse and tilting of the building by warning the occurrence of the upper threshold event such as the collapse and tilting of the building.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.