• Title/Summary/Keyword: policy based networking

Search Result 126, Processing Time 0.023 seconds

The Design of Router Security Management System for Secure Networking

  • Jo, Su-Hyung;Kim, Ki-Young;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1594-1597
    • /
    • 2005
  • A rapid development and a wide use of the Internet have expanded a network environment. Further, the network environment has become more complex due to a simple and convenient network connection and various services of the Internet. However, the Internet has been constantly exposed to the danger of various network attacks such as a virus, a hacking, a system intrusion, a system manager authority acquisition, an intrusion cover-up and the like. As a result, a network security technology such as a virus vaccine, a firewall, an integrated security management, an intrusion detection system, and the like are required in order to handle the security problems of Internet. Accordingly, a router, which is a key component of the Internet, controls a data packet flow in a network and determines an optimal path thereof so as to reach an appropriate destination. An error of the router or an attack against the router can damage an entire network. This paper relates to a method for RSMS (router security management system) for secure networking based on a security policy. Security router provides functions of a packet filtering, an authentication, an access control, an intrusion analysis and an audit trail in a kernel region. Security policy has the definition of security function against a network intrusion.

  • PDF

The Windows Push Server System with Smart Device Identifying Fingerprints over IEEE 802.15.4 Protocol (IEEE 802.15.4 통신을 활용한 지문인식 스마트 기기 연동 푸쉬서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.419-425
    • /
    • 2012
  • In these days, the trends of home networking system is implementation of easily configured system with home security of emergency alarm and visitor verification services. In this paper, we implemented push server system based on Arduino of open source physical computation platform to verify visitors for the homes without home networking services. In the suggested system, visitor verification is performed in and out of home, and home access security of the system could be constructed with low-cost price by use of windows push server system and smart devices with alarm operation in corresponding to not allowed access trying.

A Leading-Edge Operation Program of the East Sea Branch, KORDI

  • Jeon, Dong-Chull
    • Ocean and Polar Research
    • /
    • v.28 no.2
    • /
    • pp.209-214
    • /
    • 2006
  • The East Sea Branch (ESB) of KORDI will be launched in 2008. She will take a role of monitoring the sea surface topography and temperature by satellites, short- and long-term sea levels by tide gauges, coastal currents and open-sea circulation by setting up coastal radars and mooring current-meters and acoustic equipments, as well as monitoring nearshore processes, coastal erosion and water pollution. A basic program of coastal zone management will help ocean-policy makers to set up right decisions based upon scientific background of the regional data in the East Sea. Networking among the neighboring countries around the sea will supply more useful information not only for experts but also for ordinary vacationers or fishermen. In order for this program to be successfully settled down during the next decade, it is necessary for a leader to have the right vision to attract more experts from global brain pools and to manage the ESB as a leading-edge observatory in the world. Details about this leading-edge operational program are introduced in the text.

A Cache Policy Based on Producer Popularity-Distance in CCN (CCN에서 생성자 인기도 및 거리 기반의 캐시정책)

  • Min, Ji-Hwan;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.791-800
    • /
    • 2022
  • CCN, which has emerged to overcome the limitations of existing network structures, enables efficient networking by changing the IP Address-based network method to the Content-based network method. At this time, the contents are stored on each node(router) rather than on the top server, and considering the limitation of storage capacity, it is very important to determine which contents to store and release through the cache policy, and there are several cache policies that have been studied so far. In this paper, two of the existing cache policies, producer popularity-based and distance-based, were mixed. In addition, the mixing ratio was set differently to experiment, and we proved which experiement was the most efficient one.

Study on Agent based Internetworking Platform (에이전트 기반 인터네트워킹 플랫폼 연구)

  • 전준현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.314-324
    • /
    • 2004
  • Recently, high-speed internet subscribers have grown continuously, and reached up to 10 millions. But existing network management that is responsible only for user access is confronted with many difficulties, since user access network(xDSL, Cable, B-WILL, and so on) has diversified and value added wired/wireless contents service has developed. In this paper propose the Agent based Inter Networking platform as object-oriented hierarchical system that can provide various service such as access QoS(Quality of Service), customized application service and security service according to user on demand. This system has divided into two parts(user agent and agent management system & local and central management systems). Management system periodically receive status information such as bandwidth, download speed, delay, current service, and so on, and process them, then build a policy based on processed information. According to personal user profile that is generated by this policy, the customized service can be provided for users. And This system adopt the object-oriented modeling in case that system migration and integration, and implement a system that is robust and stable for security through hierarchical server system.

Policy on Promoting Venture Business based on Patent and Technology in Metro Taejon and Chungcheong Area (대전 .충청지역 특허기술기반 벤처산업의 육성방안)

  • 이영덕
    • Journal of Korea Technology Innovation Society
    • /
    • v.2 no.2
    • /
    • pp.309-325
    • /
    • 1999
  • If we want to overcome the current IMF-guarded economic situations as early as possible and to change the present industry structure to the new knowledge-based structure, it is a great necessity to increase the capability of technology innovation as a key factor of the international competitiveness, and to establish the infrastructure of venture business for increasing utilization of technologly and patent. Even though there has been a great increase in application and enrollment of the Industrial Property Rights (i.e. IPRs) including patent recently, the number of unused IPRs are increasing progressively every year (for example, the ratio of unused patent is about 60% in 1997), and illegal use of patent and dependance on the foreign patent are increasing sharply. This paper will suggest policy on nurturing venture business for increasing utilization of the unused IPRs, including technology transaction strategy and link strategy of the high-tech industries between metro Taejon and Chungcheong Area.

  • PDF

The Effects of Global and Artistic Competence on the Intention of Start-up (글로벌 역량과 예술적 역량이 창업 의도에 미치는 영향)

  • Um, Hyemi;Zhang, Shengnan
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.57-71
    • /
    • 2021
  • As the global economy becomes globalized, there is a growing demand for nurturing talent to enhance the competitiveness of individuals and countries. Studying abroad is one of the ways of education to gain high qulaity education and skills, and get closer to the local market, the international market. This study sought to define the factors of global competence and artistic competence for foreign students in Korea, and to clarify the impact of global competence and artistic capacity on the intention of start-up, networking behavior, mediating and regulating effects of social support. The results of the empirical analysis of Chinese students studying in Korea in this study are as follows. First, three sub-factors (knowledge, skill, attitude) of global competency have been shown to have a positive influence on networking behavior. Second, three sub-factors (expression, creativity, media) of artistic competence were having a positive impact on networking behavior. Third, networking behavior has been confirmed to have a positive effect on the intention of start-up. Fourth, the results showed that social support regulates the relationship between networking behavior and start-up intent. Fifth, it was confirmed that networking behavior has the effect of mediating global capabilities and intention to start a business. This study is meaningful in verifying that the networking behavior of students studying abroad plays a positive role in the intention of starting a business by studying the intention of students to adapt to the new social culture, educational environment in foreign countries.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

New Media-Informatization Policy and Problems of Developmentalism in Korea (뉴미디어-정보화 정책과 개발주의 패러다임의 문제)

  • Kim, Pyung-Ho
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.231-253
    • /
    • 2006
  • Based on the development of IT(information technology), the explosive diffusion and growth of the new media and services in Korea has attracted keen international attention. The construction of IT infrastructure driven by the proactive social informatization policy of the government has also been spectacular. Korea has persistently pursued strong 'new media-informatization policy' with three main objectives in mind: 1)Industrial-economic value creation; 2)socio-cultural value creation; and 3)building of the knowledge society-knowledge state. But its consequence is rather paradoxical. While its performance is excellent in terms of quantity growth of industry and technology, quality development of society, culture and knowledge creation is lagging far behind. This paradoxical outcome originates, not from any simple policy error, but from a structural problem inherent in new media-informatization policy in Korea which has long been captured by developmentalism. In order for Korea to harvest the reward of strong new media-informatization infrastructure, it needs to institute a policy structure based on a knowledge IT strategy such as research and development of core and patent technologies, design and production of quality contents, networking knowledge bases of society, etc.

  • PDF