• Title/Summary/Keyword: monitoring agent

Search Result 303, Processing Time 0.024 seconds

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

A Cross-Layer Based Per-Application Mobility Management Platform (Cross-layer 기반 응용 별 이동성 관리를 위한 플랫폼)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • An inevitable trend in the next generation wireless network environments is coexistence of different wireless access networks in a complementary, manner. In addition, mobile devices equipped with multiple air interfaces simultaneously executing diverse applications have been emerging, In such network environment, It is required that a solution for mobile users to seamlessly roam between different access networks as well as to satisfy QoS requirements of each application by efficiently utilizing coexisting various wireless access networks. In this paper, therefore, we propose a mobility management platform based on per-application end-to-end mobility management and cross-layer handover controls. Four core functional modules composing the proposed platform for end user devices are defined: Monitoring Agents, Profile Database, Decision Engine, and IP Agent. We show through simulations that the presented platform provides an improved QoS as it selectively utilizes the best available networks.

Monitoring Differences in Vaginal Hemodynamic and Temperature Response for Sexual Arousal by Different Anesthetic Agents Using an O ptical Probe

  • Jeong, Hyeryun;Seong, Myeongsu;Park, Kwangsung;Kim, Jae Gwan
    • Current Optics and Photonics
    • /
    • v.4 no.1
    • /
    • pp.57-62
    • /
    • 2020
  • The selection of anesthetic agent is important in preclinical studies, since each agent affects the systemic hemodynamics in different ways. For that reason, we hypothesized that different anesthetic agents will result in different vaginal hemodynamic response and temperature during sexual arousal, in an animal model. To validate the hypothesis, animal experiments were performed using female rats with two anesthetic agents widely used in preclinical studies: ketamine and isoflurane. Our previously developed near-infrared-spectroscopy-based probe was used to measure the changes of oxyhemoglobin (OHb), deoxyhemoglobin (RHb), and total hemoglobin (THb) concentrations along with temperature from the animal vaginal wall. As a control, saline was administered to both isoflurane- and ketamine-anesthetized animals, and did not show any significant changes in OHb, RHb, THb, or temperature. However, an administration of apomorphine (APO, 80 ㎍/kg) induced increases of OHb (63 ± 28 μM/DPF), RHb (35 ± 20 μM/DPF), and THb (98 ± 49 μM/DPF) in ketamine-anesthetized animals, while decreases of OHb (52 ± 76 μM/DPF) and THb (38 ± 30 μM/DPF) and an increase of RHb (28 ± 51 μM/DPF) were found in isoflurane-anesthetized animals. The vaginal temperature decreased from the baseline in both ketamine-(0.42℃) and isoflurane-(1.22℃)anesthetized animals. These results confirmed our hypothesis, and suggest that a preclinical study monitoring hemodynamic responses under anesthesia should employ an appropriate anesthetic agent for the study.

Efficient Real Resource Monitoring Methods for Design System Management Function based on TMN (TMN기반의 SMF설계를 위한 효율적인 자원 감시 기법)

  • 정현식;전상훈
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.177-184
    • /
    • 1999
  • GDMO Agent platform based on TMN modeling operating status of network elements and resources to Managed Object as GDMO standard and controled by telecommunication management function requests of manager supporting status of resources. To supporting basic function of these GDMO agent, 13 kinds of system management function has to be implemented. Event-Report-Management function related to all system management functions. The reason that rapidly reporting has been performed as status of resources to manager by continuously communication with real resources. In this paper, a number of approach has been analyzed to communication with real resources for effective event-report management function and we proposed new real resource monitoring schemes of RRMC(Real Resource Message Coordinator) architecture for improving these resulted problem.

  • PDF

Implementation of TMN-based Performance Proxy Agent for ATM Switching Systems (ATM 교환 시스템을 위한 TMN 기반의 Proxy 성능 관리대행자 구현)

  • 권봉경;김화성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.562-570
    • /
    • 2002
  • The network-wide performance management is crucial for maintaining the quality of network services, which requires the collection and monitoring the performance data at individual network nodes. Most of the public networks, however, are composed of diverse, heterogeneous network nodes that are managed by various types of proprietary management systems with a conventional operator console and embedded management functions, which makes it difficult to implement the integrated performance management systems. Even though the developments of TMN (Telecommunication Management Network) based management systems are being attempted, the little work has been done in performance management area. In this paper, we propose the performance monitoring architecture for ATM switches using the 0₃ object model and describe how to implement the TMN-based performance prosy agent for ATM switching systems. The proposed performance proxy agent provides the TMN standard performance management interfaces by translating the proprietary performance management functions, which eventually leads to network-wide integrated performance management.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Design and Implementation of Dynamic Digital Rights Management System Based on Agent (에이전트 기반의 동적 디지털저작권관리 시스템 설계 및 구현)

  • Lee, Yong-Hyo;Hwang, Dae-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.613-622
    • /
    • 2001
  • As logistic environment of digital resources is rapidly changing, protection of the intellectual property for digital resources has been recognized as one of important issues. Digital Rights Management (DRM) has taken much interests from ISP, authors and publishers of digital content as an integrated approach to create a reliable environment for access and the use of digital resource. In this paper we proposed a dynamic digital rights management system based on adaptive agent theory (ARPA : Adaptive Resource Protection Agent) to address problems facing contemporary DRM approaches : static rights management problem solving and strengthened monitoring/tracking system. We introduced a dynamic mission control scheme to realize dynamic digital rights management. We incorporated adaptive agent theory to implement on-and off-line tracking and protection. Through the implementation of protype system, the process, the process dynamic digital rights protection will be demonstrated.

  • PDF

A Study on the Automatic Monitoring System for the Contact Center Using Emotion Recognition and Keyword Spotting Method (감성인식과 핵심어인식 기술을 이용한 고객센터 자동 모니터링 시스템에 대한 연구)

  • Yoon, Won-Jung;Kim, Tae-Hong;Park, Kyu-Sik
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.107-114
    • /
    • 2012
  • In this paper, we proposed an automatic monitoring system for contact center in order to manage customer's complaint and agent's quality. The proposed system allows more accurate monitoring using emotion recognition and keyword spotting method for neutral/anger voice emotion. The system can provide professional consultation and management for the customer with language violence, such as abuse and sexual harassment. We developed a method of building robust algorithm on heterogeneous speech DB of many unspecified customers. Experimental results confirm the stable and improved performance using real contact center speech data.

Design and Implementation of Remote Monitoring Technology based-on Web-Service for URC Robot (웹 서비스 기반 URC 로봇 원격 모니터링 기술의 설계 및 구현)

  • Im, Sung-Ho;Kim, Joo-Man
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.285-294
    • /
    • 2006
  • In this paper, we propose a new remote control and monitoring technique using web-service technology for URC robot. URC robot needs the architecture which can be applied all over the variety hardware and software platform for supporting the several interface with external world in the ubiquitous environment. In this paper, web-service technology is preferentially deliberated how to adopt into the embedded environment and the remote control and monitoring technology based on web-service technology for URC robot is designed and implemented as to support the interaction with agent programs. It has been carried out through simulating and implementing this technology into the target robot called NETTORO and proved its practical worth.

  • PDF

Distributed System Architecture Modeling of a Performance Monitoring and Reporting Tool (분산 시스템의 성능 모니터링과 레포팅 툴의 아키텍처 모델링)

  • Kim, Ki;Choi, Eun-Mi
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.69-81
    • /
    • 2003
  • To manage a cluster of distributed server systems, a number of management aspects should be considered in terms of configuration management, fault management, performance management, and user management. System performance monitoring and reporting take an important role for performance and fault management. In this paper, we present distributed system architecture modeling of a performance monitoring and reporting tool. Modeling architecture of four subsystems are introduced: node agent, data collection, performance management & report, and DB schema. The performance-related information collected from distributed servers are categorized into performance counters, event data for system status changes, service quality, and system configuration data. In order to analyze those performance information, we use a number of ways to evaluate data corelation. By using some results from a real site of a company and from simulation of artificial workload, we show the example of performance collection and analysis. Since our report tool detects system fault or node component failure and analyzes performances through resource usage and service quality, we are able to provide information for server load balancing, in short term view, and the cause of system faults and decision for system scale-out and scale-up, in long term view.

  • PDF