• Title/Summary/Keyword: internet addresses

Search Result 232, Processing Time 0.03 seconds

Collaborative security response by interworking between multiple security solutions (보안 솔루션의 상호 연동을 통한 실시간 협력 대응 방안 연구)

  • Kim, JiHoon;Lim, Jong In;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.69-79
    • /
    • 2013
  • Recently, many enterprises are suffering from advanced types of malware and their variants including intelligent malware that can evade the current security systems. This addresses the fact that current security systems have limits on protecting advanced and intelligent security threats. To enhance the overall level of security, first of all, it needs to increase detection ratio of each security solution within a security system. In addition, it is also necessary to implement internetworking between multiple security solutions to increase detection ratio and response speed. In this paper, we suggest a collaborative security response method to overcome the limitations of the previous Internet service security solutions. The proposed method can show an enhanced result to respond to intelligent security threats.

New gTLD Program: Uniform Rapid Suspension System and Trademark Clearinghouse (신규 일반 최상위 도메인의 도입과 통일신속정지제도(URS)에 대한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.113-131
    • /
    • 2011
  • Recently, the Internet Corporation for Assigned Names and Numbers (ICANN) announced the expansion of the number of generic top-level domains (gTLDs) beyond the current 22 gTLDs, and the gTLD Applicant Guidebook for ICANN's new gTLD program is now under consideration for approval. ICANN also introduces a "Trademark Clearinghouse" and the "Uniform Rapid Suspension (URS)" procedure to protect trademarks and expedite dispute resolution and save costs. The Trademark Clearinghouse is a central repository for information to be authenticated, stored and disseminated, pertaining to the rights of the trademark holders. Trademark holders would voluntarily provide data of their trademarks from all over the world, and it would assist a trademark watch service provided by the new gTLD registry for trademark holders and potential domain name registrants. The URS is a part of the new gTLD dispute resolution mechanisms created by ICANN to resolve cybersquatting disputes. A complainant in a URS proceeding must establish three elements that are very similar to the existing UDRP to succeed, but supposedly more expedited and cost efficient. Since the URS provides that it only protects court validated and registered trademarks, it is not clear whether unregistered marks used in commerce are protected under the URS. The URS escalates the complainant's burden of proof from a preponderance of evidence standard under the UDRP to a clear and convincing evidence standard. The notices to a respondent shall be sufficient if the URS Provider sends the notice of Complaint to the addresses listed in the Whois contact information. As registrants who wish to conceal their true identity often subscribe to the privacy/proxy service and the complainant's high rate of success in the UDRP proceeding is relevant to the respondents' default rate, the URS's simple notice requirement would deprive respondents of a fair opportunity to assert their rights over the disputed domain names.

  • PDF

Efficient Parallel IP Address Lookup Architecture with Smart Distributor (스마트 분배기를 이용한 효율적인 병렬 IP 주소 검색 구조)

  • Kim, Junghwan;Kim, Jinsoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.44-51
    • /
    • 2013
  • Routers should perform fast IP address lookup for Internet to provide high-speed service. In this paper, we present a hybrid parallel IP address lookup structure composed of four-stage pipeline. It achieves parallelism at low cost by using multiple SRAMs in stage 2 and partitioned TCAMs in stage 3, and improves the performance through pipelining. The smart distributor in stage 1 does not transfer any IP address identical to previous one toward the next stage, but only uses the result of the previous lookup. So it improves throughput of lookup by caching effects, and decreases the access conflict to TCAM bank in stage 3 as well. In the last stage, the reorder buffer rearranges the completed IP addresses according to the input order. We evaluate the performance of our parallel pipelined IP lookup structure comparing with previous hybrid structure, using the real routing table and traffic distributions generated by Zipf's law.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

A Case Study on the Personalized Online Recruitment Services : Focusing on Worldjob+'s Use of Splunk (개인화된 구직정보서비스 제공에 관한 사례연구 : 월드잡플러스의 스플렁크 활용을 중심으로)

  • Rhee, MoonKi Kyle;Lee, Jae Deug;Park, Seong Taek
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.2
    • /
    • pp.241-250
    • /
    • 2018
  • Online recruitment services have emerged as one of the most popular Internet services, providing job seekers with a comprehensive list of jobs and a search engine. But many recruitment services suffer from shortcomings due to their reliance on traditional client-pull information access model, in manay cases resulting in unfocused search results. Worldjob+, being operated by The Human Resources Development Service of Korea, addresses these problems and uses Splunk, a platform for analyzing machine data, to provide a more proactive and personalised services. It focuses on enhancing the existing system in two different ways: (a) using personalised automated matching techniques to proactively recommend most preferrable profile or specification information for each job opening announcement or recruiting company, (b) and to recommend most preferrable or desirable job opening announcement for each job-seeker. This approach is a feature-free recommendation technique that recommends information items to a given user based on what similar users have previously liked. A brief discussion about the potential benefit is also provided as a conclusion.

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

TCAM Partitioning for High-Performance Packet Classification (고성능 패킷 분류를 위한 TCAM 분할)

  • Kim Kyu-Ho;Kang Seok-Min;Song Il-Seop;Kwon Teack-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.91-97
    • /
    • 2006
  • As increasing the network bandwidth, the threat of a network also increases with emerging various new services. For a high-performance network security, It is generally used that high-speed packet classification methods which employ hardware like TCAM. There needs an method using these devices efficiently because they are expensive and their capacity is not sufficient. In this paper, we propose an efficient packet classification using a Ternary-CAM(TCAM) which is widely used device for high-speed packet classification in which we have applied Snort rule set for the well-known intrusion detection system. In order to save the size of an expensive TCAM, we have eliminated duplicated IP addresses and port numbers in the rule according to the partitioning of a table in the TCAM, and we have represented negation and range rules with reduced TCAM size. We also keep advantages of low TCAM capacity consumption and reduce the number of TCAM lookups by decreasing the TCAM partitioning using combining port numbers. According to simulation results on our TCAM partitioning, the size of a TCAM can be reduced by upto 98$\%$ and the performance does not degrade significantly for high-speed packet classification with a large amount of rules.

The Design and Implementation of Web Agents for vCard Service in Mobile Enviromnent (모바일 환경에서 vCard 서비스를 위한 웹 에이전트의 설계 및 구현)

  • Yun, Se-Mi;Jo, Ik-Seong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.477-486
    • /
    • 2002
  • vCard that is the electronic business card automates the exchange of personal information typically found on a traditional business card. vCard information contains not only simple text, but also graphics and multimedia data like pictures, company logos, Web addresses, and so on. This paper describes the design and implementation of Web-based vCard agent system for exchanging vCard, an electronic business card and searching another user's vCard in mobile phone environment. In today's business environment, such as that this information is typically exchanged on business cards. Our web agent system in this paper connect web server which provide vCard service and search, edit vCard information displayed by web browser of mobile phone and exchange vCard with another user through internet. Considering characteristics of wireless devices that have limited storage space, It also saves constructed XML documents that include user's informations in a web server and solves the security problem by exchanging not personal data or XML but encrypted directory name where XML document exits as exchanging vcard.

Implementation of Two-way Data Link using the Thuraya Geostationary Orbit Satellite (Thuraya 정지궤도 위성을 이용한 양방향 데이터 링크 구현)

  • Jang, Won-Chang;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.333-338
    • /
    • 2019
  • Satellite communication is not used by many people like mobile communication, but it is a necessary technology for public service and communication services, such as providing the Internet in military, disaster, remote education and medical services, island areas, and infrastructure vulnerable areas. However, most communication modems have problems with two-way communication with server as IP addresses are assigned to floating IP that change every time they communicate with the network. In this paper, we used the Raspberry Pi as the controller of the terminal device to communicate the network through the satellite modem and the PPP protocol, and to solve the problem of the modem with the floating IP, we used the text message function of the satellite modem. Through this process, two-way data links using the Thuraya geostationary orbit satellite were implemented.

A Study on Securing Global Big Data Competitiveness based on its Environment Analysis (빅데이터 환경 분석과 글로벌 경쟁력 확보 방안에 대한 연구)

  • Moon, Seung Hyeog
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.361-366
    • /
    • 2019
  • The amount of data created in the present intelligence information society is beyond imagination. Big data has a great diversity from every information via SNS and internet to the one created by government and enterprises. This various data is close at hand having infinite value as same as crude oil. Big data analysis and utilization by data mining over every areas in the modern industrial society is getting more important for finding useful correlation and strengthening forecasting power against the future uncertainty. Efficient management and utilization of big data produced by complex modern society will be researched in this paper. Also it addresses strategies and methods for securing overall industrial competitiveness, synergy creation among industries, cost reduction and effective application based on big data in the $4^{th}$ industrial revolution era.