• 제목/요약/키워드: internet service provider

검색결과 361건 처리시간 0.022초

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

Trustworthy Service Discovery for Dynamic Web Service Composition

  • Kim, Yukyong;Choi, Jong-Seok;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1260-1281
    • /
    • 2015
  • As the number of services available on the Web increases, it is vital to be able to identify which services can be trusted. Since there can be an extremely large number of potential services that offer similar functionality, it is challenging to select the right ones. Service requestors have to decide which services closelysatisfy their needs, and theymust worry about the reliability of the service provider. Although an individual service can be trusted, a composed service is not guaranteed to be trustworthy. In this paper, we present a trust model that supports service discovery and composition based on trustworthiness. We define a method to evaluate trust in order to discover trustworthy services. We also provide a method to perform trust estimation for dynamic service composition, and we present results of two experiments. The proposed model allows for service requestors to obtain the most trustworthy services possible. Our mechanism uses direct and indirect user experience to discover the trustworthiness of the services and service providers. Moreover, composing services based on quantitative trust measurements will allow for consumers to acquire a highly reliable service that meet their quality and functional requirements.

망 중립성 이슈에서 ISP 사업자의 전송 차등화와 수직계열화에 대한 연구 (The study for the differentiation of transmission and vertical integration of Internet Service Provider over the issue of network neutrality)

  • 이재호;변동식;김희경
    • 한국언론정보학보
    • /
    • 제62권
    • /
    • pp.200-222
    • /
    • 2013
  • 최근의 망 중립성 논쟁은 전송 차등화와 그에 따른 비용정산으로 전환되고 있으며, 이와 같은 현상은 수직 계열화된 네트워크 사업자가 경쟁 사업자를 배제하기 위한 전략이라는 주장이 제기되고 있다. 이와 같은 맥락에서 본 연구는 네트워크 사업자의 전송 차등화 사례를 분석하고, IX 시장에서 수직 계열화된 네트워크 사업자의 문제점을 검토했다. 연구결과 전송 차등화 현상은 향후 OTT나 스마트TV 응용 프로그램과 같이 범용 망을 사용하는 콘텐츠에 대한 차별화 현상을 가중시킬 것으로 전망되며, 관련법에서는 이와 같은 문제를 해결할 수 있는 방법이 애매한 것으로 나타났다. 더욱이 ISP 시장에서 수직 계열화되어 있고, 상업적으로 운영되는 IPS 사업자들은 경쟁 사업자를 차별하고 이와 같은 현상은 관련법에서도 노골적으로 명시되고 있는 것으로 나타났다.

  • PDF

인터넷 최대 접속 속도의 제한이 서비스 제공자의 수입과 서비스 가격의 결정에 미치는 영향 (The Impact of Access Rate Regulation on ISP Revenue and Pricing)

  • 이승호;서승우
    • 전자공학회논문지
    • /
    • 제50권2호
    • /
    • pp.11-19
    • /
    • 2013
  • 인터넷 서비스 제공자들은 차등화 서비스를 제공하기 위한 정책적인 수단으로, 혹은 일부 악의적인 사용자들로 인한 회선의 독점적 사용을 막기 위한 수단으로 각 사용자의 최대 데이터 전송 속도를 일정 수준 이하로 제한하고 있다. 이 논문에서는 이러한 최대 접속 속도의 제한이 서비스 제공자의 수입과 서비스 가격 결정에 미치는 영향을 분석하고자 한다. 우리는 먼저 최대 접속 속도의 제한을 고려한 현실적인 인터넷의 서비스 품질 모델을 제안하고, 각 사용자에 대한 최대 접속 속도의 제한이 사용자들의 서비스 가입 결정에 어떻게 영향을 미치는 지 분석한다. 또한 그에 따라 변화하는 서비스 제공자의 수입이 안정성을 보장 받기 위한 조건을 유도하여, 수입을 최대화하기 위한 가격 결정 방법을 최적화 문제로 나타낸다.

An Efficient Service Function Chains Orchestration Algorithm for Mobile Edge Computing

  • Wang, Xiulei;Xu, Bo;Jin, Fenglin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4364-4384
    • /
    • 2021
  • The dynamic network state and the mobility of the terminals make the service function chain (SFC) orchestration mechanisms based on static and deterministic assumptions hard to be applied in SDN/NFV mobile edge computing networks. Designing dynamic and online SFC orchestration mechanism can greatly improve the execution efficiency of compute-intensive and resource-hungry applications in mobile edge computing networks. In order to increase the overall profit of service provider and reduce the resource cost, the system running time is divided into a sequence of time slots and a dynamic orchestration scheme based on an improved column generation algorithm is proposed in each slot. Firstly, the SFC dynamic orchestration problem is formulated as an integer linear programming (ILP) model based on layered graph. Then, in order to reduce the computation costs, a column generation model is used to simplify the ILP model. Finally, a two-stage heuristic algorithm based on greedy strategy is proposed. Four metrics are defined and the performance of the proposed algorithm is evaluated based on simulation. The results show that our proposal significantly provides more than 30% reduction of run time and about 12% improvement in service deployment success ratio compared to the Viterbi algorithm based mechanism.

IMS 네트워크에 웹기반 IPTV 콘텐츠 사업자 접속 방식 및 특성 (Interconnecting Methods of Web based IPTV Contents Provider to IMS and Its Characteristics)

  • 김현지;한치문
    • 대한전자공학회논문지TC
    • /
    • 제47권6호
    • /
    • pp.49-57
    • /
    • 2010
  • 인터넷을 통한 TV 서비스는 다양한 형태로 나타나지만, 금후 IMS 기반 IPTV 서비스를 제공하는 형태가 유력한 방식 중 하나이다. 따라서 IMS 기반 IPTV 시스템에 인터넷을 중심으로 하는 웹기반 IPTV 사업자가 IMS 기반 IPTV 가입자에게 서비스를 제공하는 방법에 대해 연구한다. 웹기반 콘텐츠 사업자를 IMS 기반 IPTV에 접속 가능한 3가지 방안을 제시한다. 그 중 하나는 IMS의 I-CSCF에 접속할 때, DNS 서버 및 HSS 서버를 이용하는 2가지 방식, 다른 방안으로는 IMS의 S-CSCF에 접속되어 서비스를 제공하는 방식이다. 그리고 제시한 3가지 방식의 특성 평가를 위해, 인터넷 중심의 웹기반 콘텐츠 사업자를 수용에 따라 발생하는 트래픽 특성과 각 방식별로 트래픽 모델에 대해서도 분석한다. 이를 기본으로 시뮬레이션 모델을 통해 제안한 3방식에 대해 세션 설정지연 시간을 분석하고, CSCF에 Gateway AS을 매개로하여 서비스를 제공하는 방식이 세션 설정 지연 특성 관점에서 가장 우수함을 분명히 한다. 또 IPTV 시스템의 전송 프로토콜 및 다중화 방법에 대해 간단히 설명한다.

A Case Study on Partnership Types between Network Operators & Netflix: Based on Corporate Investment Model

  • Minzheong, Song
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권1호
    • /
    • pp.14-26
    • /
    • 2020
  • We categorize partnership types between network operators and a global video streaming or over-the-top service provider, Netflix from 2011 to the first quarter 2018. The options are based on the integration of over-the-top (OTT), Netflix with pay TV and telecommunication operators in the form of carrier billing, access to over-the-top (OTT) via devices or the development of their tariff plans. Options of the Type 3, 'cooperation' or the Type 4, 'agreement' entails a kind of the technical involvement between two partners and commercial agreement. The types of partnership are evolving from one to others. Some partnerships have characteristics of more than one type. The majority of technical or service integration cooperation of Type 3 entail bundling and marketing promotion of Type 2 and Type 1. Similarly, the 'agreement' of Type 4, co-branded or white-label service initiative entail tariff or device user interface (UI) integration of the 'cooperation' of Type 3 and joint marketing initiatives of Type 1.

The design of AAA server for Wireless LAN with 802.1x

  • Ham, Young-Hwan;Chung, Byung-Ho
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -3
    • /
    • pp.1944-1947
    • /
    • 2002
  • The importance of security in WLAN(Wireless LAN) service is very critical, so IEEE organization has made the IEEE 802.1x standard. The IEEE 802.1x standard uses the EAP as authentication protocol which requires AAA(Authentication, authorization, and Accounting) server for authentication & accounting. for the reliable and scalable AAA service, the Diameter protocol has more advanced characteristics than existing radius protocol. So the Diameter protocol can be used for WLAN service provider who has large scale WLAN system and a large number of subscriber. This paper proposes the design of Diameter AAA server for the authentication and accounting of WLAN system which is adopting IEEE 802.1x standard.

  • PDF

관광 산업을 위한 XML 기반의 Mobile Agent를 이용한 공급 사슬 관리 (Supply Chain Management Based on XML and Mobile Agent for Tourism Industry)

  • 이동철;최덕원
    • 산업경영시스템학회지
    • /
    • 제25권2호
    • /
    • pp.84-91
    • /
    • 2002
  • The progress of information technology triggered the rapid progress of tourism industry and the industry has now grown to be the biggest and the highest value added producing industry. Tourism industry is characterized by its high information dependency and is subject to the frequent changes of schedule. Therefore, dynamic cooperations between the service provider and the service agent is essential. One of the latest trend in information technology is the popular adoption of XML as the standard means of document exchange in the internet environment. This paper proposes a supply chain management system which enhances the productivity and customer satisfaction in the tourism industry by exploiting the exchange of information in XML among the tourism society, which consists of the producer, the agents, and the consumer. This Paper is especially addressed to the applicability of e-SCM for the productivity enhancement in the tourism industry, which is known as the leading service industry in the internet environment.

Implementing Onetime Password based Access Control System for Secure Sharing Service

  • Kang, Namhi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권3호
    • /
    • pp.1-11
    • /
    • 2021
  • Development of ICT technologies leads exponential growth of various sharing economy over the last couple of years. The intuitive advantage of the sharing economy is efficient utilization of idle goods and services, but there are safety and security concerns. In this paper, we propose a onetime password based access control system to support secure accommodation sharing service and show the implementation results. To provide a secure service to both the provider and the user, the proposed system issues a onetime access password that is valid only during the sharing period reserved by the user, thereafter access returns to the accommodation owner. Especially, our system provides secure user access by merging the two elements of speaker recognition using voice and a one-time password to open and close the door lock. In this paper, we propose a secure system for accommodation sharing services as a use-case, but the proposed system can be applicable to various sharing services utilizing security-sensitive facilities.