• Title/Summary/Keyword: server operation

Search Result 511, Processing Time 0.031 seconds

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Implementation of Web Based Remote Monitoring and Control System (웹에 기반한 원격 감시 및 제어장치의 구현)

  • Chang, Ho-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.140-145
    • /
    • 2009
  • Recently, lots of research activities have been carried out to provide advanced smart control functions applying a computer networking technology to telemeter/telecontrol systems. In this paper, we suggest client/server architecture with specially designed remote and local control software for applicant those to greenhouse model. The server system collects and integrates various datas related sensor or actuator, and stores in database maintaining high quality of remote I/O control operation. Where as the client system simply operation such as control panel on the internet web browser. Implemented system well communicate interactively both monitoring and control status of greenhouse including multimedia informations. In this study we also analyze the extent of the performance enhancement in terms of overall throughput and data transfer time effected by packet size.

Android Based Ubiquitous Interface for Controlling Service Robots (서비스 로봇 제어를 위한 안드로이드 기반의 유비쿼터스 인터페이스)

  • Quan, Yongxun;Ahn, Hyun-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.35-41
    • /
    • 2010
  • In this paper, an Android based ubiquitous interface for controlling service robots is presented. The robot server captures the images for the front view of the robot, makes a map of the environment and its position, produces a graphic image of its pose, and then transmits them to the Android client. The Android client displays them in the LCD panel and transfers control information obtained from touched buttons to the server. In the interface environment, we implement remote moving mode, autonomous moving mode, and remote operation mode for being used for versatile operability to the robot with limited screen of the smart phone. Experimental results show the implementation of the proposed interface in Android installed on Motoroi to control a service robot, and demonstrate its feasibility.

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

  • Zhu, Hong;Wu, Bin;Xie, Meiyi;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5171-5189
    • /
    • 2016
  • With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.

Development of Control System for 2MW Direct Drive Wind Turbine (2MW급 직접구동형 풍력터빈 제어시스템 개발)

  • Moon, Jun-Mo;Jang, Jeong-Ik;Yoon, Kwang-Yong;Joe, Gwang-Myung;Lee, Kwon-Hee
    • Journal of Wind Energy
    • /
    • v.2 no.1
    • /
    • pp.90-96
    • /
    • 2011
  • The purpose of this paper is to describe the control system for optimal performance of 2MW gearless PMSG wind turbine system, and to afford some techniques of the algorithm selection and design optimization of the wind turbine control system through analysis of load calculation and control characteristic. Wind turbine control system is composed of the main control system and remote control and monitoring system. The main control system is industrial PC based controller, and the remote control and monitoring system is a server based computer system. The main control system has a supervisory control of the wind turbine with operation procedures and power-speed control through the torque control by pitch angle. There are some applications to optimize the wind turbine system at the starting mode with increasing of rotor speed, and cut-in operating mode to prevent trundling cut-in and cut-out, a gain scheduling of pitch PID controller, torque scheduling and limitation of generation power by temperature limitation or remote command by remote control and monitoring system. Also, the server operation program of the remote control and monitoring system and the design of graphical display are described in this paper.

Design and Implementation of a Small Server Room Environment Monitoring System by Using the Arduino (아두이노를 이용한 소규모 서버 룸 환경 모니터링 시스템의 설계 및 구현)

  • Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.385-390
    • /
    • 2017
  • Owing to the development of IT technology, a computerized system in various ways such as a variety of company's businesses, factory automation system and hospital healthcare system is introduced and operated. And it is possible to say that a computer system is more important than anything else to the extent that all businesses are suspended in case the system is down. Attention should be always paid to environmental management such as temperature, humidity and fire in server room for the normal operation of system in this situation. It is thought that there is necessity for a low-cost system which independently monitors environment round the clock in the situation where the person in charge doesn't pay attention and which informs a person in charge in real time when an event occurs for the operation of this small server room. Consequently, it is to be hoped that the suspension of service provided by computer system, which may occur due to a specific event, can be prevented.

Abnormal System Operation Detection by Comparing QR Code-Encoded Power Consumption Patterns in Software Execution Control Flow (QR 코드로 인코딩된 소프트웨어 실행 제어 흐름 전력 소비 패턴 기반 시스템 이상 동작 감지)

  • Kang, Myeong-jin;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1581-1587
    • /
    • 2021
  • As embedded system are used widely and variously, multi-edge system, which multiple edges gather and perform complex operations together, is actively operating. In a multi-edge system, it often occurs that an abnormal operation at one edge is transferred to another edge or the entire system goes down. It is necessary to determine and control edge anomalies in order to prevent system down, but this can be a heavy burden on the resource-limited edge. As a solution to this, we use power consumption data to check the state of the edge device and transmit it based on a QRcode to check and control errors at the server. The architecture proposed in this paper is implemented using 'chip-whisperer' to measure the power consumption of the edge and 'Raspberry Pi 3' to implement the server. As a result, the proposed architecture server showed successful data transmission and error determination without additional load appearing at the edge.

Design of System for Avoiding upload of Identical-file using SA Hash Algorithm (SA 해쉬 알고리즘을 이용한 중복파일 업로드 방지 시스템 설계)

  • Hwang, Sung-Min;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.81-89
    • /
    • 2014
  • In this paper, we propose SA hash algorithm to avoid upload identical files and design server system using proposed SA hash algorithm. Client to want to upload file examines the value of SA hash and if the same file is found in server system client use the existing file without upload. SA hash algorithm which is able to examine the identical-file divides original file into blocks of n bits. Original file's mod i bit and output hash value's i bit is calculated with XOR operation. It is SA hash algorithm's main routine to repeat the calculation with XOR until the end of original file. Using SA hash algorithm which is more efficient than MD5, SHA-1 and SHA-2, we can design server system to avoid uploading identical file and save storage capacity and upload-time of server system.

Integrated Stochastic Admission Control Policy in Clustered Continuous Media Storage Server (클리스터 기반 연속 미디어 저장 서버에서의 통합형 통계적 승인 제어 기법)

  • Kim, Yeong-Ju;No, Yeong-Uk
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.217-226
    • /
    • 2001
  • In this paper, for continuous media access operations performed by Clustered Continuous Media Storage Server (CCMSS) system, we present the analytical model based on the open queueing network, which considers simultaneously two critical delay factors, the disk I/O and the internal network, in the CCMSS system. And we derive by using the analytical model the stochastic model for the total service delay time in the system. Next, we propose the integrated stochastic admission control model for the CCMSS system, which estimate the maximum number of admittable service requests at the allowable service failure rate by using the derived stochastic model and apply the derived number of requests in the admission control operation. For the performance evaluation of the proposed model, we evaluated the deadline miss rates by means of the previous stochastic model considering only the disk I/O and the propose stochastic model considering the disk I/O and the internal network, and compared the values with the results obtained from the simulation under the real cluster-based distributed media server environment. The evaluation showed that the proposed admission control policy reflects more precisely the delay factors in the CCMSS system.

  • PDF

Sensitivity Analysis on the Performance of Multimedia Stream Server using Simulation (시뮬레이선을 통한 멀티미디어 스트림 서버의 성능 민감도 분석)

  • Park, Jin-Won;Park, Chong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.2
    • /
    • pp.23-29
    • /
    • 2006
  • This paper studies the Internet stream server which serves multimedia stream services such as VoD and MoD. The Internet multimedia stream server is developed to provide 50 users with continuous multimedia stream contents simultaneously. This paper focuses on introducing design concepts, operation details and on evaluating system performance and doing sensitivity analysis with respect to the change of the system components. The performance evaluation is performed using simulation in order to identify the system component that mostly affects the system performance. The sensitivity analysis shows the service delay rates of the multimedia stream server depending on the user's service request pattern. Also, the analysis is made on the utilization rates of the core system components such as the PCI bus and the Ethernet card, and on the system performance change by adding more system components.

  • PDF