• Title/Summary/Keyword: great firewall

Search Result 5, Processing Time 0.017 seconds

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

A Convergence of Realtime Traffic Shaping and IPS on Small Integrated Security Router (소형 통합보안라우터의 실시간 트래픽쉐이핑과 IPS의 융합)

  • Kim, Doan;Song, Hyunok;Lee, Sungok;Yang, Seungeui;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.454-455
    • /
    • 2019
  • IDC is a server-based facility with a stable line and power supply facility that manages 20 to 30 servers in an efficiently separated rack-level subnetwork. Here, we need a way to efficiently manage servers security, firewall, and traffic on a rack-by-rack basis. If three or five kinds of commercial equipment are adopted to support this, it may be a great burden to the management cost as well as the introduction cost. Therefore, in this paper, we propose a method to implement the five functions in one rack-unit small integrated security router. In particular, IDC intends to integrate traffic shaping and IPS, which are essential technologies, and to propose the utility accordingly.

  • PDF

A Convergence Implementation of Realtime Traffic Shaping and IPS on Small Integrated Security Router for IDC (IDC용 소형 통합보안라우터의 실시간 트래픽쉐이핑과 IPS의 융합 구현)

  • Yang, SeungEui;Park, Kiyoung;Jung, HoeKyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.861-868
    • /
    • 2019
  • Various server-based services such as big data, IoT and artificial intelligence have been made online. As a result, the demand for IDC to support stable server operation is increasing. IDC is a server-based facility with a stable line and power supply facility that manages 20 to 30 servers in an efficiently separated rack-level subnetwork. Here, we need a way to efficiently manage servers security, firewall, and traffic on a rack-by-rack basis. Including traffic shaping capabilities that control routers, firewalls, IPS, and line speeds, as well as VPN technology, a recent interest. If three or five kinds of commercial equipment are adopted to support this, it may be a great burden to the management cost as well as the introduction cost. Therefore, in this paper, we propose a method to implement the five functions in one rack-unit small integrated security router. In particular, IDC intends to integrate traffic shaping and IPS, which are essential technologies, and to propose the utility accordingly.

A Study on Facility Criteria of Small Petrol Stations based on Quantitative Risk Assessment (정량적 위험성 평가에 기반한 간이 주유취급소 시설기준에 대한 연구)

  • Park, Wooin;Ku, Jae-Hyun;Song, Yong-Sun
    • Journal of the Korean Institute of Gas
    • /
    • v.18 no.3
    • /
    • pp.44-52
    • /
    • 2014
  • Small petrol stations have great potential for a wide distribution in metropolitan area in which the land value possesses primary installation cost of the facility. The objective of the present study is to propose appropriate facility regulations of small petrol stations in Korea that can be popularly installed in the future in terms of securing safety in addition to serviceability. The hazard analysis and damage prediction from the possible fire and explosion accidents were performed using a software, PHAST v.6.5. As essential components of the facility regulations proposed in this study, the regulations about the refueling lot, maximum capacity of underground tank, location of fixed refueling facilities, height of firewall for small petrol stations were subsequently compared with those for regular-sized petrol stations.

Mechanism of China's Internet Regulation (중국의 인터넷 통제 메커니즘)

  • Kim, Jin Yong
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.61-84
    • /
    • 2013
  • This article examines how the Chinese government blocks the inflow of undesirable information, focusing on the technical aspect of the control mechanism. Unlike Cuba and North Korea, which regulate the whole Internet, China uses both state-of-the-art technological supervision and labor-intensive physical control due to economic reasons in order to prepare for actors who can threaten the Communist party. The Chinese government will not overlook the inflow of information which can be the link between demonstrations and democratization. This is because stronger protests utilizing information technology will trigger the Chinese government's flexible control based on large scale violation and technology. In this article, we first review the concept of universal internet control involved in internet regulation in nations, and then focus on China's internet censorship and its regulatory control from the '90s to the present. Finally, we analyze how the Chinese government actively controls the internet access by utilizing the relationship dynamics between the central and local governments, depending on protest issue. This thesis will assume that it is difficult for China to become democratized due to its information interception, and search how the government manages the internet.

  • PDF