• Title/Summary/Keyword: server

Search Result 7,891, Processing Time 0.029 seconds

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

A RFID-Based Multi-Robot Management System Available in Indoor Environments (실내 환경에서 운영 가능한 RFID 기반 멀티 로봇 관리 시스템)

  • An, Sang-Sun;Shin, Sung-Oog;Lee, Jeong-Oog;Baik, Doo-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.13-24
    • /
    • 2008
  • The multi robot operation technique has emerged as one of the most important research subjects that focus on minimizing redundancy in space exploration and maximizing the efficiency of operation. For an efficient operation of the multi robot systems, the movement of each Single robot in the multi robot systems should be properly observed and controlled. This paper suggests Multi Robot Management System to minimize redundancy in space exploration by assigning exploration space to each robot efficiently to take advantage of the RFID. Also, this paper has suggested fault tolerance technique that detects disable Single robot and substitute it by activated Single robot in order to ensure overall exploration and improve efficiency of exploration. Proposed system overcomes previous fault that it is difficult for central server to detect exact position of robot by using RFID system and Home Robot. Designated Home robot manages each Single robot efficiently and assigns the best suited space to Single robot by using RFID Tag Information. Proposed multi robot management system uses RFID for space assignment, Localization and Mapping efficiently and not only maximizes the efficiency of operation, but also ensures reliability by supporting fault-tolerance, compared with Single robot system. Also, through simulation, this paper proves efficiency of spending time and redundancy rates between multi robot management applied by proposed system and not applied by proposed system.

  • PDF

Adaptive Migration Path Technique of Mobile Agent Using the Metadata of Naming Agent (네이밍 에이전트의 메타데이터를 이용한 이동 에이전트의 적응적 이주 경로 기법)

  • Kim, Kwang-Jong;Ko, Hyun;Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.165-175
    • /
    • 2007
  • The mobile agent executes a given task by which the agent code moves to the server directly. Therefore, node migration method becomes an important factor which impact on the whole performance of distributed system. In this paper, we propose an adaptive migration path technique of mobile agent using the metadata of naming agent. In this proposed technique, node selection for migration depends on the content of referenced metadata, and the reliability of migrated information is determined by the metadata updating method and cooperative operations of individual agents in multi-agents system. For these, we design the metadata using by the number of hit documents, hit ratio, node processing time and network delay time, and describe the methods for creating, using and updating metadata for which determine the adaptive node migration path of mobile agent according to the cooperation of individual agents and number of hit documents using by designed metadata. And results of evaluated performance for proposed adaptive migration path technique through the proper experiment and analysis gain rate of high effective information earning, because of high hit ratio(72%) about of fathered documents by case of applying metadata move to the 13 nodes. But, in case of non-applying metadata is hit ratio(46%) of gathered documents and rate of effective information earning about of 26 nodes is 36.8%.

  • PDF

Generator of Dynamic User Profiles Based on Web Usage Mining (웹 사용 정보 마이닝 기반의 동적 사용자 프로파일 생성)

  • An, Kye-Sun;Go, Se-Jin;Jiong, Jun;Rhee, Phill-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.389-390
    • /
    • 2002
  • It is important that acquire information about if customer has some habit in electronic commerce application of internet base that led in recommendation service for customer in dynamic web contents supply. Collaborative filtering that has been used as a standard approach to Web personalization can not get rapidly user's preference change due to static user profiles and has shortcomings such as reliance on user ratings, lack of scalability, and poor performance in the high-dimensional data. In order to overcome this drawbacks, Web usage mining has been prevalent. Web usage mining is a technique that discovers patterns from We usage data logged to server. Specially. a technique that discovers Web usage patterns and clusters patterns is used. However, the discovery of patterns using Afriori algorithm creates many useless patterns. In this paper, the enhanced method for the construction of dynamic user profiles using validated Web usage patterns is proposed. First, to discover patterns Apriori is used and in order to create clusters for user profiles, ARHP algorithm is chosen. Before creating clusters using discovered patterns, validation that removes useless patterns by Dempster-Shafer theory is performed. And user profiles are created dynamically based on current user sessions for Web personalization.

A Credit Card Sensing System based on Shared Key for Promoting Electronic Commerce (전자상거래 촉진을 위한 공유키 기반 신용카드 조회 시스템)

  • Jang, Si-Woong;Shin, Byoung-Chul;Kim, Yang-Kok
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1059-1066
    • /
    • 2003
  • In this paper, the magnetic sensing system is designed and implemented for the safe security in internet commerce system. When the payment is required inthe internet commerce system, the magnetic sensing system will get the information from a credit card without keyboard input and then encrypt and transmit the information to server. The credit card sensing system, which is proposed in this paper, is safe from keyboard hacking because it encrypts card information immediately in its internal chip and sends the information to host system. For the protection of information, the magnetic sensing system is basically based on a synchronous stream cipher cryptosystem which is related to a group of matrices. The size of matrices and the bits of keys for the best performances are determined for various cases. It is shown that for credit card payments. matrices of size 2 have good performance even at most 128bits keys with the consideration of inverse matrices. For authentication of general-purpose data, the magnetic sensing system needs more than 1.5KB data and in this case, the optimum size of matrices is 2 or 3 at more 256bits keys with consideration of inverse matrices.

An APK Overwrite Scheme for Preventing Modification of Android Applications (안드로이드 앱 변조 방지를 위한 APK 덮어쓰기 기법)

  • Choi, Byungha;Shim, HyungJoon;Lee, ChanHee;Cho, Sangwook;Cho, Seong-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.309-316
    • /
    • 2014
  • It is easy to reverse engineer an Android app package file(APK) and get its decompiled source code. Therefore, attackers obtains economic benefits by illegally using the decompiled source code, or modifies an app by inserting malware. To address these problems in Android, we propose an APK overwrite scheme that protects apps against illegal modification of themselves by using a new anti-reverse engineering technique. In this paper, the targets are the apps which have been written by any programmer. For a target app (original app), server system (1) makes a copy of a target app, (2) encrypts the target app, (3) creates a stub app by replacing the DEX (Dalvik Executable) of the copied version with our stub DEX, and then (4) distributes the stub app as well as the encrypted target app to users of smartphones. The users downloads both the encrypted target app and the corresponding stub app. Whenever the stub app is executed on smartphones, the stub app and our launcher app decrypt the encrypted target app, overwrite the stub app with the decrypted target one, and executes the decrypted one. Every time the target app ends its execution, the decrypted app is deleted. To verify the feasibility of the proposed scheme, experimentation with several popular apps are carried out. The results of the experiment demonstrate that our scheme is effective for preventing reverse engineering and tampering of Android apps.

Cattle Shed Management System Based on Wireless Sensor Network with Bio and Environmental Sensors (바이오 및 환경센서를 활용한 무선센서 네트워크 기반의 축사관리 시스템)

  • Kim, Hong-Kyu;Moon, Seung-Jin;Lee, Jong-Dae;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.573-586
    • /
    • 2013
  • Recently, the research, utilizing bio and environment sensors in agricultural and cattle industries, are drawing attention among the various IT convergence technologies. Among such research IT convergence techniques which aim to improve the quality of cattle industry management are necessary in particular. Real-time monitoring of the cattles health condition, identification of the cause of the diseases and timely response to such epidemic based on IT convergence techniques are among them. In order to achieve the better management of cattle industry, we propose a cattles management system which based on various bio environment sensors and wireless network technologies. The system consists of wireless environmental sensor data acquisition nodes, sensor data processing nodes, the gateway and the server. The proposed system is able to actively monitor the cattle field, to respond quickly in the case of massive cattle diseases and to control the environment of the cattle fields. We believe the proposed system will demonstrate the successful application of IT technologies to an applied field such as farming industries because of real-time crisis management capability in case of epidemic and optimal management of cattle industry.

Design and Implementation of Constructing and Utilizing an Attendance Book based on SmartPhone Apps (스마트폰 앱을 활용한 출석부 구성 및 활용 시스템의 설계와 구현)

  • Pyun, Kihyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.14-23
    • /
    • 2014
  • Existing attending management systems require a high cost and are lack of convenience. In this paper, we propose a convenient and practical attending management system as follows: First, our system allows us to construct an attendance book in an easy and simple way. A professor does not have to provide the information of students using the small screen of his smartphone. Instead, each student manages his own information via the app designed for a student in our system. Then the professor can construct the attendance book using another app designed for the professor by confirming the requests from the app designed for a student. Second, our system enables a professor to utilize the pictures of students as well as other information of students to have a good relationship with students. Third, our system provides a functionality of checking attendance automatically by calling the names of students via the app designed for the professor. Then the professor has only to match the name with the face of each student. Fourth, our system provides a functionality of checking attendance in a very fast manner. Our system can complete this behavior within a short time since all students can join the attendance simultaneously by using the app designed for the student. Fifth, our system can prevent an illegal attendance easily by utilizing the distance information.

Augmented Reality (AR)-Based Sensor Location Recognition and Data Visualization Technique for Structural Health Monitoring (구조물 건전성 모니터링을 위한 증강현실 기반 센서 위치인식 및 데이터시각화 기술)

  • Park, Woong Ki;Lee, Chang Gil;Park, Seung Hee;You, Young Jun;Park, Ki Tae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.2
    • /
    • pp.1-9
    • /
    • 2013
  • In recent years, numerous mega-size and complex civil infrastructures have been constructed worldwide. For the more precise construction and maintenance process management of these civil infrastructures, the application of a variety of smart sensor-based structural health monitoring (SHM) systems is required. The efficient management of both sensors and collected databases is also very important. Recently, several kinds of database access technologies using Quick Response (QR) code and Augmented Reality (AR) applications have been developed. These technologies provide software tools incorporated with mobile devices, such as smart phone, tablet PC and smart pad systems, so that databases can be accessed very quickly and easily. In this paper, an AR-based structural health monitoring technique is suggested for sensor management and the efficient access of databases collected from sensor networks that are distributed at target structures. The global positioning system (GPS) in mobile devices simultaneously recognizes the user location and sensor location, and calculates the distance between the two locations. In addition, the processed health monitoring results are sent from a main server to the user's mobile device, via the RSS (really simple syndication) feed format. It can be confirmed that the AR-based structural health monitoring technique is very useful for the real-time construction process management of numerous mega-size and complex civil infrastructures.