• 제목/요약/키워드: network agents

검색결과 483건 처리시간 0.027초

다양한 연동 구조를 통한 보안 시스템의 성능 비교 (Performance Comparison of Security System with Various Collaboration Architecture)

  • 김희완;서희석
    • 한국컴퓨터산업학회논문지
    • /
    • 제5권2호
    • /
    • pp.235-242
    • /
    • 2004
  • e-비즈니스의 급격한 발전으로 인하여 네트워크 상의 보안이 중요한 이슈로 부각되고 있다. 대표적인 보안 시스템인 침입 탐지 시스템(IDS)은 네트워크 상의 침입 시도를 탐지하는 역할을 수행한다. 현재의 침입은 광범위해지고, 복잡하게 되어 한 침입 탐지 시스템이 독립적으로 네트워크의 침입을 판단하기 어렵게 되었다. 그래서 본 논문에서는 여러 침입 탐지 시스템을 네트워크상에 배치하려고, 이들이 서로 정보를 공유하면서 공격자에 효과적으로 대처하며 침입을 탐지하도록 하였다. 각 에이전트들이 침입을 탐지하기 위한 연동 방법은 블랙 보드 구조(Blackboard Architecture)와 계약망 프로토콜(Contract Net Protocol)을 사용하였다 본 논문에서는 보안 에이전트들이 블랙 보드 구조를 사용한 경우와 계약망 프로토콜을 사용한 경우의 성능을 비교해 효과적인 방법을 제안할 것이다.

  • PDF

Interventions for anesthetic success in symptomatic irreversible pulpitis: A network meta-analysis of randomized controlled trials

  • Sivaramakrishnan, Gowri;Alsobaiei, Muneera;Sridharan, Kannan
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • 제19권6호
    • /
    • pp.323-341
    • /
    • 2019
  • Background: Local anesthetics alone or in combination with adjuncts, such as oral medications, have routinely been used for pain control during endodontic treatment. The best clinical choice amongst the vast numbers of agents and techniques available for pain control for irreversible pulpitis is unclear. This network meta-analysis combined the available evidence on agents and techniques for pulpal anesthesia in the maxilla and mandible, in order to identify the best amongst these approaches statistically, as a basis for future clinical trials. Methods: Randomized trials in MEDLINE, DARE, and COCHRANE databases were screened based on inclusion criteria and data were extracted. Heterogeneity was assessed and odds ratios were used to estimate effects. Inconsistencies between direct and indirect pooled estimates were evaluated by H-statistics. The Grading of Recommendation, Assessment, Development, and Evaluation working group approach was used to assess evidence quality. Results: Sixty-two studies (nine studies in the maxilla and 53 studies in the mandible) were included in the meta-analysis. Increased mandibular pulpal anesthesia success was observed on premedication with aceclofenac + paracetamol or supplemental 4% articaine buccal infiltration or ibuprofen+paracetamol premedication, all the above mentioned with 2% lignocaine inferior alveolar nerve block (IANB). No significant difference was noted for any of the agents investigated in terms of the success rate of maxillary pulpal anesthesia. Conclusion: Direct and indirect comparisons indicated that some combinations of IANB with premedication and/or supplemental infiltration had a greater chance of producing successful mandibular pulpal anesthesia. No ideal technique for maxillary anesthesia emerged. Randomized clinical trials with increased sample size may be needed to provide more conclusive data. Our findings suggest that further high-quality studies are required in order to provide definitive direction to clinicians regarding the best agents and techniques to use for mandibular and maxillary anesthesia for irreversible pulpitis.

TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법 (Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS)

  • 정창렬;윤홍상
    • 한국통신학회논문지
    • /
    • 제31권6C호
    • /
    • pp.651-657
    • /
    • 2006
  • 여기는 본 논문은 이동 에이전트의 안전한 수행을 보장하기 위한 TTS기반의 디지털 서명 실행 인증 기법을 제안한다. 즉 기존의 연구의 문제점인 처리과정에서 발생하는 시스템의 처리속도와 네트워크의 트래픽을 개선한다. 또한 효율적이고 안전한 이동 에이전트의 실행과 무결성을 보장하기 위해 디지털 서명을 이용한다. 디지털 서명은 합성함수와 공개키 기반의 암호화 알고리듬 그리고 해시함수를 이용한 인증서 체인을 한다. 그리고 디지털 서명의 인증서 체인을 이용할 경우, 공격자에 의해서 체인을 끊고 새로운 인증서를 생성하여 삽입하는 공격으로부터 안전하게 보호한다. 또한 공격자에 의해 정직한 호스트를 악의적으로 이용될 수 있는 위협으로부터 보호한다. 그리고 컴퓨터 실험을 통해 인증서 처리에 대한 시스템의 처리속도와 실시간 처리를 분석한다. 이러한 분석을 통해서 시스템의 오버헤드와 네트워크의 트래픽에 대한 효율성을 증명한다.

Integrated Network Management Agents of IMT-2000 based on ASIB Component

  • Park, Soo-Hyun
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -3
    • /
    • pp.1382-1385
    • /
    • 2002
  • By managing various communication networks collectively, Telecommunication Management Network (TMN) has appeared as a concept to aim for the unified and effective communication network operation and maintenance. IMT-2000 and other network such as PSTN, cellular networks and packet witching network that are integrated with IMT-2000 have been developed in different platforms - hardware and operating system, and a same circumstance will happen in the maintenance in the future. Also, it is difficult to approach to the standard for Q3 interface implementation of the agent in TMN system that may occur in the development or the maintenance for the different platform of IMT-2000 and other networks that are integrated with IMT-2000. In order to solve this kind of Problems, this Paper suggests integrated network management agent of IMT-2000 based on the NTS model and Advanced Intelligent Network(AIN).

  • PDF

청소년의 사회적 관계망과 역량지각 (Adolescents' Social Network and their Self-Perceived Competence)

  • 최은희;공인숙
    • 대한가정학회지
    • /
    • 제39권11호
    • /
    • pp.63-72
    • /
    • 2001
  • The purpose of this study was to examine the relationship of adolescents'social network and their self-perceived competence. In this study 207 seventh and ninth grade adolescents completed Social Network of Relationships Inventory(NRI) and Self-Perception Profile For Children(SPPC). The data were analyzed by Frequencies, Percentiles, t-test, Cronbach's $\alpha$, Pearson's correlation. Major findings were as follows: 1) Social network of relationships with various social agents made different contributions to the prediction of adolescents'self-perceived competence. 2) In social network of relationships, boys perceived significantly higher than girls for the social support from teacher. In Competence, boys perceived significantly higher than girls for the social acceptance and athletic competence. 3) In social network of relationships, the seventh grader perceived significantly higher than the ninth grader for the social support from mother, father and teacher. In scholastic competence, athletic competence, physical appearance and global self-worth, the seventh grader perceived significantly higher than the ninth grader.

  • PDF

Design of Automatic Warehouse and Inventory control under HMS concept

  • Suesut, Taweepol;Intajag, Sathit;Roengruen, Prapas
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1001-1005
    • /
    • 2004
  • The objective of this paper is to develop the flexible manufacturing system (FMS), which is cooperated with the automatic warehouse and inventory control under holonic manufacturing system (HMS). The HMS is a next wave of manufacturing revolution to deal with dynamic changing. The architecture of HMS is developed for cooperation system between the automatic warehouse agents and the manufacturing agents. This research applies the concept of HMS to develop a distributed control system for automatic warehouse and FMS by industrial network. The parts of prototype manufacturing agents consist of the conveyer system and 3-axises robot that provide the variety patterns in order to work as punch process. Each order of productions depends on the reorder points(RP) of inventory levels. The computation results indicate an improvement by comparing with traditional centralized control.

  • PDF

역추적 에이전트를 이용한 역추적 시스템 설계 및 구현 (Design and Implementation of a Traceback System based on a Traceback Agent)

  • 정종민;이지율;이구연
    • 산업기술연구
    • /
    • 제22권B호
    • /
    • pp.147-153
    • /
    • 2002
  • It is very important to detect and remove original sources of DOS (Denial of Service) attacks or connection oriented/connectionless attacks. In this paper, we implement a traceback system that does not require the reaction of routers and administrators and does not need log data. We bring in a traceback server and traceback agents in each network and use sniffing and spoofing schemes. Finally, the traceback server detects attacking hosts using information transmitted from traceback agents.

  • PDF

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

다중 인공 신경망과 유전적 프로그래밍의 복합적 접근에 의한 공학설계 시스템의 개발 (A Hybrid A, pp.oach to Multiple Neural Networks and Genetic Programming : A Perspective of Engineering Design A, pp.ication)

  • 이경호;연윤석
    • 지능정보연구
    • /
    • 제4권1호
    • /
    • pp.25-40
    • /
    • 1998
  • 본 논문에서는 경사진 의사결정 트리(oblique decision tree)에 의해 몇 개의 영역으로 분할된 입력공간(input space)에서 우수한 성능을 발휘할 수 있도록 유전적 프로그래밍 트리들(genetic programming trees)과 연합된 다중 인공신경망 시스템을 개발하였다. 다중 인공신경망인 지역 에이전트들(local agents)은 불할된 영역을 책임지며, 유전적 프로그래밍 트리들로 구성된 경계 에이전트들 (boundary agents)은 불할된 영역의 경계부분만을 담당하게 된다. 본 연방 에이전트 시스템을 이용하여 설계 초기단계의 정보 제한성을 극복하고, 선박 초기설계 단계에서 선박 중앙부 형상설계를 수행하여 범용 설계 시스템으로서의 유용성을 검증하였다.

  • PDF

Blackboard 기반의 침입탐지 시스템 개발 (Development on Intrusion Detection, Based on Blackboard Architecture)

  • 신우철;최종욱
    • 한국정보처리학회논문지
    • /
    • 제7권2호
    • /
    • pp.454-460
    • /
    • 2000
  • 본 논문에서는 네트워크 환경에서의 외부침입에 대한 효율적인 탐지 구조를 제안하였다. 제안된 탐지구조에서는 각기 고유의 기능과 영역을 갖는 다수의 에이젼트들 사이에 블랙보드 구조를 갖는 협조 에이젼트(Coordination Agent)를 두고 Conflict Resolution 기능과 침입여부 확증 기능을 갖도록 함으로서 False Alarm을 감소시키도록 하였다. 시뮬레이션 결과 단순한 시스템 자원의 접근에도 기존 에이전트 방식은 침입이라는 판단을 내릴 수 있는 반면, 블랙보드 시스템은 에이젼트에 대한 적극적인 질의과정을 통해 최종적인 침입의 여부를 판정함으로써 침입 탐지 시스템의 신뢰도를 높일 수 있는 것으로 판단되었다.

  • PDF