• 제목/요약/키워드: proxy response

검색결과 48건 처리시간 0.019초

A Development of Web Proxy for the Satellite Communication (위성통신을 위한 웹 프록시 개발)

  • Jeon, Sung-Yoon;Kim, Geun-Hyung
    • Journal of Korea Multimedia Society
    • /
    • 제16권12호
    • /
    • pp.1403-1412
    • /
    • 2013
  • In the maritime ships or airplanes, users should utilize the satellite channel in orer to use web service. However, the satellite channel is costly and does not give users satisfied response time. In the ship, the users may receive plenty of extra data when they obtain internet news. The extra data may be unnecessary image and advertise. Therefore, they should pay unnecessary data usage charges as well. In this paper, we suggest a proxy model that solves the problem of cost and speed. The proposed proxy reduces the of data through the satellite link by image and advertising blocking, caching, image re-requesting functions. It's performance was tested by a real satellite communication.

Similarity-based Caching Replacement Loss Minimization in Wireless Mobile Proxy Systems (무선 모바일 프록시 시스템에서 유사도 기반의 캐싱 손실 최소화)

  • Lee, Chong-Deuk
    • Journal of Advanced Navigation Technology
    • /
    • 제16권3호
    • /
    • pp.455-462
    • /
    • 2012
  • The loss due to caching replacement in the wireless mobile proxy caching structure has a significant effect on streaming QoS. This paper proposes a similarity-based caching loss minimization (SCLM) for minimizing the loss caused by the caching replacement. The proposed scheme divides object segments, and then it performs the similarity relation about them. Segments that perform the similarity relation generates similarity relation tree (SRT). The similarity is an important metric for deciding a relevance feedback, and segments that satisfy these requirements in the cache block for caching replacement. Simulation results show that the proposed scheme has better performance than the existing prefix caching scheme, segment-based caching scheme, and bi-directional proxy scheme in terms of QoS, average delayed startup ratio, cache throughput, and cache response ratio.

A Study on the Agreement and Bias between Parents' Proxy report and Self-report of People with Developmental Disabilities (발달장애인 부모의 대리 의사표시의 정합도와 편향에 관한 연구)

  • Chun, Dong-il;Jeon, Ji-Hye
    • Journal of Convergence for Information Technology
    • /
    • 제9권5호
    • /
    • pp.201-209
    • /
    • 2019
  • The purpose of this study is to analyze whether parents with developmental disabilities are well represented by the persons with developmental disabilities. Analysis data is based on the data from the Survey on Disability Survey in 2014. We analyzed the consistency and biases of the parent's proxy respondents' opinions by the degree of agreement between the contents of the person with developmental disabilities and the value of items that the parents answered on behalf of the development disabled. First, the parents' proxy respondents responded well to the actual situation such as life satisfaction for the developmental disabled, while the parental proxy respondents showed the positive bias to overestimate the cost items and the negative bias to recognize the discrimination. Second, in relation to independent living, the majority of the parents of the developmental disabled respondents had a high agreement with the developmental disabled person. However, about 5 ~ 10% of the parents' proxy respondents seem to have a tendency to distort the independent living policy by preferring non-standard housing types, unlike those with developmental disabilities. Based on this, it was proposed that the respondents should be able to receive the answers of the possible parties in the future research on desire and independent living related intention toward the developmental disabled, and the research on the matching of the proxy response is needed in a multidimensional manner.

A Wireless Internet Proxy Server Cluster with Enhanced Distillation and Cashing Functions (압축과 캐싱 기능을 향상한 무선 인터넷 프록시 서버 클러스터)

  • Kwak, Hu-Keun;Hwang, Jae-Hoon;Chung, Kyu-Sik
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(1)
    • /
    • pp.103-106
    • /
    • 2004
  • A wireless Internet proxy server cluster has to Distillation and Caching functions in order that a user on wireless internet can use existing wired internet service. Distillation function works to distill HTML documents and included images according to the defined preference by a user. When a user requests repeatedly, Caching function decreases response time by reusing original and distilled images or HTML documents. In this paper, we proposed enhanced distillation and caching functions. We performed experiments using 16 PCs and experimental results show the effectiveness of the proposed system compared to the existing system.

  • PDF

Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks

  • Choi, Sang-Yong;Lim, Chang Gyoon;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • 제15권1호
    • /
    • pp.100-115
    • /
    • 2019
  • Malicious code distribution on the Internet is one of the most critical Internet-based threats and distribution technology has evolved to bypass detection systems. As a new defense against the detection bypass technology of malicious attackers, this study proposes the automated tracing of malicious websites in a malware distribution network (MDN). The proposed technology extracts automated links and classifies websites into malicious and normal websites based on link structure. Even if attackers use a new distribution technology, website classification is possible as long as the connections are established through automated links. The use of a real web-browser and proxy server enables an adequate response to attackers' perception of analysis environments and evasion technology and prevents analysis environments from being infected by malicious code. The validity and accuracy of the proposed method for classification are verified using 20,000 links, 10,000 each from normal and malicious websites.

Optimal Number and Placement of Web Proxies in the Internet : The Linear & Tree Topology (인터넷으로 웹 프락시의 최적 개수와 위치 : 선형 구조와 트리구조)

  • Choi, Jung-Im;Chung, Haeng-Eun;Lee, Sang-Kyu;Moon, Bong-Hee
    • Journal of KIISE:Information Networking
    • /
    • 제28권2호
    • /
    • pp.229-235
    • /
    • 2001
  • With the explosive popularity of the World Wide Web, the low penonnance of network often leads web clients to wait a long time for web server's response. To resolve this problem, web caching (proxy) has been considered as the most efficient technique for web server to handle this problem. The placement of web proxy is critical to the overall penonnance, and Li et al. showed the optimal placement of proxies for a web server in the internet with the linear and tree topology when the number of proxies, ]M, is given [4, 5]. They focused on minimizing the over all access time. However, it is also considerable for target web server to minimize the total number of proxies while each proxy server guarantees not to exceed certain res(Xlnse time for each request from its clients. In this paper, we consider the problem of finding the optimal number and placement of web proxies with the lin~ar and tree topology under the given threshold cost for delay time.

  • PDF

Proxy Caching Grouping by Partition and Mapping for Distributed Multimedia Streaming Service (분산 멀티미디어 스트리밍 서비스를 위한 분할과 사상에 의한 프록시 캐싱 그룹화)

  • Lee, Chong-Deuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • 제19권1호
    • /
    • pp.40-47
    • /
    • 2009
  • Recently, dynamic proxy caching has been proposed on the distributed environment so that media objects by user's requests can be served directly from the proxy without contacting the server. However, it makes caching challenging due to multimedia large sizes, low latency and continuous streaming demands of media objects. To solve the problems caused by streaming demands of media objects, this paper has been proposed the grouping scheme with fuzzy filtering based on partition and mapping. For partition and mapping, this paper divides media block segments into fixed partition reference block(R$_f$P) and variable partition reference block(R$_v$P). For semantic relationship, it makes fuzzy relationship to performs according to the fixed partition temporal synchronization(T$_f$) and variable partition temporal synchronization(T$_v$). Simulation results show that the proposed scheme makes streaming service efficiently with a high average request response time rate and cache hit rate and with a low delayed startup ratio compared with other schemes.

A Study on the Design of Proxy for Integrated Network Management (통합 망관리를 위한 Proxy 설계에 관한 연구)

  • 박주희;박승균;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제26권12C호
    • /
    • pp.174-180
    • /
    • 2001
  • The technology to efficiently manage computer communication network is in need as the computer communication network becomes more complicated and users want services more diversified. This has brought industries, research institutes and standadization organizations to consider an effective network management protocol. CMIP and the SNMP have considerable differences in structure and capacity Therefore, it is essential to have enables differences between network management protocol to gear for the two communication management system which is the most widely used and will be continuously used. In this thesis we suggest an interworking function Integrated Network Management for the Design of Proxy. According to the suggest algorithm, by using scoping, it stores the management information, so that it may pass the related information at the inner cash efficiently. Therefore, we can not only reduce some unnecessary management operation considerably but also bring some efficiency of saving the total management system response time.

  • PDF

Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card (TCP 플러딩 공격 방어를 위한 네트워크 인터페이스용 고성능 TCP 프락시 제어 로직 구현)

  • Kim, Byoung-Koo;Kim, Ik-Kyun;Kim, Dae-Won;Oh, Jin-Tae;Jang, Jong-Soo;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권2호
    • /
    • pp.119-129
    • /
    • 2011
  • TCP-related Flooding attacks still dominate Distributed Denial of Service Attack. It is a great challenge to accurately detect the TCP flood attack in hish speed network. In this paper, we propose the NIC_Cookie logic implementation, which is a kind of security offload engine against TCP-related DDoS attacks, on network interface card. NIC_Cookie has robustness against DDoS attack itself and it is independent on server OS and external network configuration. It supports not IP-based response method but packet-level response, therefore it can handle attacks of NAT-based user group. We evaluate that the latency time of NIC_Cookie logics is $7{\times}10^{-6}$ seconds and we show 2Gbps wire-speed performance through a benchmark test.

Stock Market Response to Terrorist Attacks: An Event Study Approach

  • TAHIR, Safdar Husain;TAHIR, Furqan;SYED, Nausheen;AHMAD, Gulzar;ULLAH, Muhammad Rizwan
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권9호
    • /
    • pp.31-37
    • /
    • 2020
  • The purpose of this research study is to examine the stock market's response to terrorist attacks. The study uses data of terrorist attacks in different parts of the country (Pakistan) from June 1, 2014 to May 31, 2017. The event window procedure applies to a 16-day window in which 5 days before and 10 days after the attack. In addition, several event windows have been built to test the response of the Pakistan Stock Exchange. KSE-100 index is taken as proxy of response. The total terrorist attacks are classified into four categories: attacks on law enforcement agencies, attacks on civilians, attacks on special places and attacks on politicians, government employees and bureaucrats. The standard market model is used to estimate the abnormal return of the Pakistan Stock Exchange, which takes 252 business days each year. Furthermore, BMP test is used to check statistical significance of cumulative abnormal rate of return (CAAR). The results of this study reveal that total number of terrorist attacks and attacks on law enforcement agencies show long-term effects on Pakistan stock exchange. However, attacks on civilians, attacks on special places and attacks on politicians, government employees and bureaucrats have little effect on the Pakistan Stock Exchange.