• 제목/요약/키워드: legacy system

검색결과 520건 처리시간 0.025초

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • 제14권12호
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

A Method for Improving Interface Fault Tolerance in the Embedded Software (임베디드 소프트웨어의 인터페이스 결함허용성 향상 기법)

  • Choi, In Hwa;Paik, Jong Ho;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • 제14권1호
    • /
    • pp.31-39
    • /
    • 2013
  • Generally, there can be a interface discrepancy between the legacy hardware and the new software in combining new software component with reused hardware components in the embedded system. This kind of the interface discrepancy may cause various types of faults and also result in declining interface fault tolerance. In this paper we propose a method to improve interface fault tolerance. First of all, the new interface discrepancy fault type which has not been dealt with before is to be defined and next the testing method for generating test paths is proposed by considering the new defined interface discrepancy fault type in this paper. Several tests show that the proposed method detects more fatal faults about 7.9% in comparison with the existing testing method for commercial broadcasting receiver. Since the proposed method can provide software developers with test paths to be available earlier on the software development cycle, in addition, software developers can regard on interface discrepancy fault in advance. Consequently, more efficient test planning can be established to improve the interface fault tolerance.

A Method of Analyzing Sentiment Polarity of Multilingual Social Media: A Case of Korean-Chinese Languages (다국어 소셜미디어에 대한 감성분석 방법 개발: 한국어-중국어를 중심으로)

  • Cui, Meina;Jin, Yoonsun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • 제22권3호
    • /
    • pp.91-111
    • /
    • 2016
  • It is crucial for the social media based marketing practices to perform sentiment analyze the unstructured data written by the potential consumers of their products and services. In particular, when it comes to the companies which are interested in global business, the companies must collect and analyze the data from the social media of multinational settings (e.g. Youtube, Instagram, etc.). In this case, since the texts are multilingual, they usually translate the sentences into a certain target language before conducting sentiment analysis. However, due to the lack of cultural differences and highly qualified data dictionary, translated sentences suffer from misunderstanding the true meaning. These result in decreasing the quality of sentiment analysis. Hence, this study aims to propose a method to perform a multilingual sentiment analysis, focusing on Korean-Chinese cases, while avoiding language translations. To show the feasibility of the idea proposed in this paper, we compare the performance of the proposed method with those of the legacy methods which adopt language translators. The results suggest that our method outperforms in terms of RMSE, and can be applied by the global business institutions.

T-DMB Hybrid Data Service Part 1: Hybrid BIFS Technology (T-DMB 하이브리드 데이터 서비스 Part 1: 하이브리드 BIFS 기술)

  • Lim, Young-Kwon;Kim, Kyu-Heon;Jeong, Je-Chang
    • Journal of Broadcast Engineering
    • /
    • 제16권2호
    • /
    • pp.350-359
    • /
    • 2011
  • Fast developments of broadcasting technologies since 1990s enabled not only High Definition Television service providing high quality audiovisual contents at home but also mobile broadcasting service providing audiovisual contents to high speed moving vehicle. Terrestrial Digital Multimedia Broadcasting (T-DMB) is one of the technologies developed for mobile broadcasting service, which has been successfully commercialized. One of the major technical breakthroughs achieved by T-DMB in addition to robust vehicular reception is an adoption of framework based on MPEG-4 System. It naturally enables integrated interactive data services by using Binary Format for Scene (BIFS) technology for scene description and representation of graphics object and Object Descriptor Framework representing multimedia service components as objects. T-DMB interactive data service has two fundamental limitations. Firstly, graphic data for interactive service should be always overlaid on top of a video not to be rendered out of it. Secondly, data for interactive service is only received by broadcasting channel. These limitations were considered as general in broadcasting systems. However, they are being considered as hard limitations for personalized data services using location information and user characteristics which are becoming widely used for data services of smart devices in these days. In this paper, the architecture of T-DMB hybrid data service is proposed which is utilizing broadcasting network, wireless internet and local storage for delivering BIFS data to overcome these limitations. This paper also presents hybrid BIFS technology to implement T-DMB hybrid data service while maintaining backward compatibility with legacy T-DMB players.

A SOA-based Application Model for Building Intelligent Construction Supply Chain Management Framework (지능형 건설물류관리 체계 구축을 위한 SOA 적용 모델 개발)

  • Shin, Tae-Hong;Chin, Sang-Yoon;Yoon, Su-Won;Kwon, Soon-Wook;Kim, Yea-Sang
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 한국건설관리학회 2008년도 정기학술발표대회 논문집
    • /
    • pp.733-737
    • /
    • 2008
  • Construction supply chain management focused on materials in construction industry plays a critical role which controls the success and failure of a project. For the efficiency of construction supply chain management, the framework which provides project participants with the information originated from whole construction logistics steps without the omission and discontinuation of information flow is required. The new management framework that can support this environment is necessary because of setting up the complicated and distributed environment including logistics information management by intelligent equipment, co-working management with pre-framework legacy system and various devices(UMPC and PDA etc.) as the information confirmation and electrical transmission tool between the project participants different from former construction supply chain management environment while recently developing ubiquitous technologies such as RFID/USN and intelligent equipment to support logistics process. Therefore, the objective of this study is to introduce the concept of SOA (Service Oriented Architecture) as an alternative of effective information integration under the complex and distributed environment and to propose the SOA-based application model for building intelligent construction supply chain management framework.

  • PDF

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제35권1A호
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.

Performance of an Efficient Backoff Retransmission Algorithm with a Proactive Jamming Scheme for Realtime transmission in Wireless LAN (재밍 기반의 재전송 방식을 사용한 무선 LAN에서의 효율적인 실시간 트래픽 전송 방안의 성능 분석)

  • Koo Do-Jung;Yoon Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제31권2B호
    • /
    • pp.98-106
    • /
    • 2006
  • In order to provide a realtime transmission over a wireless LAM, we here present a new jamming based retransmission mechanism. In a legacy wireless LAN system, all stations use the binary exponential backoff algorithm to avoid collisions among frames. It is well known that the backoff algorithm causes more collisions as the numbers of active stations increases. This makes transmission of real time traffic hard. In the proposed scheme, when each station senses collisions, it promptly allows to send a jamming signal during a unique jamming window period which is determined by its own channel access count database(CACDB). This jamming windows is chosen not to be overlapped each other by using of CACDB, and thus channel access of another station is prevented. Hereafter the station gets the ownership of the medium when the wireless medium becomes idle after sending the jamming signal and sensing carrier, and then sends frame in medium. In our proposal, repeating collisions is never happened. We here assume that real time traffic use a frame of fixed length in order to make the time for receiving its ACK frame same. Comparing the proposed jamming-based retransmission scheme with the the 802.11 and 802.11e MAC by simulation. one can find that the proposed scheme have advantages in terms of delay, average backoff time, and average number of collisions per frame. One can find that the proposed scheme might be practically applicable to several applications of realtime traffic transmission in wireless LAN systems.

Model Based Approach to Estimating Privacy Concerns for Context-Aware Services (상황인식서비스를 위한 모델 기반의 프라이버시 염려 예측)

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • 제15권2호
    • /
    • pp.97-111
    • /
    • 2009
  • Context-aware computing, as a core of smart space development, has been widely regarded as useful in realizing individual service provision. However, most of context-aware services so fat are in its early stage to be dispatched for actual usage in the real world, caused mainly by user's privacy concerns. Moreover, since legacy context-aware services have focused on acquiring in an automatic manner the extra-personal context such as location, weather and objects near by, the services are very limited in terms of quality and variety if the service should identify intra-personal context such as attitudes and privacy concern, which are in fact very useful to select the relevant and timely services to a user. Hence, the purpose of this paper is to propose a novel methodology to infer the user's privacy concern as intra-personal context in an intelligent manner. The proposed methodology includes a variety of stimuli from outside the person and then performs model-based reasoning with social theory models from model base to predict the user's level of privacy concern semi-automatically. To show the feasibility of the proposed methodology, a survey has been performed to examine the performance of the proposed methodology.

  • PDF

Real-Time Variable Speed Limits for Urban Freeway (도시고속도로를 위한 실시간 가변 속도 제한)

  • Jo, Young-Tae;Jung, In-Bum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제16권10호
    • /
    • pp.962-974
    • /
    • 2010
  • Recently, the convergence of information technology with bio-technology, nano-technology or other technologies has been creating a new paradigm. In a field of transportation, the intelligent transport systems which is a convergence of intelligent technologies and transportation systems have been studied. The Variable Speed Limit(VSL), is one of ITS technologies, is thought to improve safety and efficiency of transportation while controlling speed limit based on road conditions. Legacy studies have considered only one station for VSL algorithm. However, it is not appropriate for an urban freeway installed with many stations. In this paper, new algorithm is proposed to not only enhance effectiveness of VSL based on cooperation of stations but also reflect road conditions within 30 seconds. The proposed algorithm consists of 4 steps: the first is a "searching bottleneck station" step, the second is a "calculating a size of congestion" step, the third is a "calculating the number of controlled stations" step, the final is a "calculating VSL" step. This algorithm guarantees improved safety and minimum additional travel time. The travel time should be considered because drivers would against the VSL algorithm when the proposed algorithm occurs additional travel time. In our experiments, microscopic traffic simulator VISSIM is selected to perform a modeling work. The results show that proposed algorithm provides the improved safety and minimum increase of travel time.

Status of Kim Goeng-pil in History of Korean Confucianism (한국유학사에서의 김굉필(金宏弼)의 위상)

  • Choi, Young-sung
    • The Journal of Korean Philosophical History
    • /
    • 제41호
    • /
    • pp.9-38
    • /
    • 2014
  • Hanhweon-dang Kim Goeng-pil(1454~1504) sublimated ethics whose lead was opened up by Jeong Mong-ju in late Goryeo as one scholarly tendency. Kim Goeng-pil was called 'the father of ethics in Joseon' and has been respected as a model of ethicist for 400 years since then. Following Kim Goeng-pil, Confucian scholars of Joseon cultivated perseverance through Xiaoxue and the perseverance was sublimated to Confucian scholars' energy and then that of state, which served as driving force to keep the national legacy. Kim Goeng-pil suggested how to study with Xiaoxue and sought moral human beings and ethically ideal societies based on strong practicability which is required in Xiaoxue. Individuals' cultivation and social reform are not at a different dimension. Spirit of 'self-cultivation' that Kim Goeng-pil himself demonstrated advanced to pursuit of ethical, ideal state when reaching a level of Jo Kwang-jo. Kim Goeng-pil thought that teaching in Xiaoxue could be achieved through 'Gyeong (敬, respect).' It is the key of Neo-Confucianism in Joseon to control one's mind through the cultivating method of 'Gyeong.' Kim Goeng-pil settled Joseon's Confucianism as 'practical ethics(心學).' Before Kim Goeng-pil, no scholars had well presented the aspects of practical ethics. After King Myeongjong and Seonjo, Confucianism in Joseon worked as the cornerstone of practical ethics. Since mid-17th century, the system of practical ethics had been firmly established with focus on 'Gyeong. Literary men of Kim Goeng-pil and scholars they fostered led the academic and political world of Joseon after mid-16th century. They played the lead in Sarim faction's(士林派) ruling after King Seonjo came to throne. The very foundation which sublimated Joseon to the ethically ideal state and made the Dynasty a 'state of Sarim' was actually laid by Kim Goeng-pil.