Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 10, Issue 6 - Dec 2009
Volume 10, Issue 5 - Oct 2009
Volume 10, Issue 4 - Aug 2009
Volume 10, Issue 3 - Jun 2009
Volume 10, Issue 2 - Apr 2009
Volume 10, Issue 1 - Feb 2009
Selecting the target year
Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern
Shin, Moon-Sun ; Paik, Woo-Jin ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 1~13
Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.
HWbF(Hit and WLC based Firewall) Design using HIT technique for the parallel-processing and WLC(Weight Least Connection) technique for load balancing
Lee, Byung-Kwan ; Kwon, Dong-Hyeok ; Jeong, Eun-Hee ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 15~28
This paper proposes HWbF(Hit and WLC based Firewall) design which consists of an PFS(Packet Filter Station) and APS(Application Proxy Station). PFS is designed to reduce bottleneck and to prevent the transmission delay of them by distributing packets with PLB(Packet Load Balancing) module, and APS is designed to manage a proxy cash server by using PCSLB(Proxy Cash Server Load Balancing) module and to detect a DoS attack with packet traffic quantity. Therefore, the proposed HWbF in this paper prevents packet transmission delay that was a drawback in an existing Firewall, diminishes bottleneck, and then increases the processing speed of the packet. Also, as HWbF reduce the 50% and 25% of the respective DoS attack error detection rate(TCP) about average value and the fixed critical value to 38% and 17%. with the proposed expression by manipulating the critical value according to the packet traffic quantity, it not only improve the detection of DoS attack traffic but also diminishes the overload of a proxy cash server.
Privacy Information Protection Model in e-Healthcare Environment
Kim, Kyong-Jin ; Hong, Seng-Phil ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 29~40
The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.
A Lightweight Authentication and Key Agreement Protocol in Wireless Sensor Networks
Yoon, Sin-Sook ; Ha, Jae-Cheol ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 41~51
Recently, there are many researches on security to remove vulnerability which is caused by wireless communication in wireless sensor networks. To guarantee secure communication, we should basically provide key management for each node, mutual authentication and key agreement protocol between two nodes. Although many protocols are presented to supply these security services, some of them require plentiful storage memory, powerful computation and communication capacity. In this paper, we propose a lightweight and efficient authentication and key agreement protocol between two sensor nodes, which is an enhanced version of Juang's scheme. In Juang's protocol, sensor node's information used to share a secret key should be transmitted to registration center via a base station. On the contrary, since node's information in our protocol is transmitted up to only base station, the proposed scheme can decrease computation and communication cost for establishing the shared key between two nodes.
e-Passport Integrated Authentication Mechanisms with Improved Efficiency
Lee, Dong-Bum ; Go, Woong ; Kwak, Jin ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 53~63
e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.
AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments
Kim, Mi-Hui ; Chae, Ki-Joon ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 65~73
IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.
An Efficient Incremental Evaluation Technique Using an Extended Dependency Chart
Hun, Jung-Lan ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 75~84
There have been numerous researches in minimizing the total cost of program development in order to improve productivity of the programs. The incremental evaluation is the evaluation method of reevaluating only affected parts instead of reevaluating overall program when the program has been changed. Since the incremental evaluation method carries its advantage, the method itself is very important when considering the execution efficiency of the program developing environment. This paper extends the dependency chart for an imperative language and presents the extended version of dependency chart which can be applied to the Object Oriented Programming Languages such 'Java'. This paper also presents the incremental evaluation algorithm for Object Oriented Programming Languages and proves its correctness, analyzing the efficiency of incremental evaluation by the simulation.
A Study on the Improvement of the Network Performance Measurement of Virtual Machine between Host OS and Guest OS for a Mobile Personalized Software Platform based on SaaS
U, Su-Jeong ; On, Jin-Ho ; Choi, Jung-Rhan ; Choi, Wan ; Lee, Moon-Kun ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 85~98
Recently, there are a number of researches and developments for the personalized software platform for mobility based on SaaS. The platform requires an optimal virtual machine in order to satisfy the operating systems of various users for the software. In addition, the platform must guarantee the mobility of the users' working environments by supporting fast and secure services between internal and external networks in the platform operating systems. In order to verify the optimal behaviors of virtual machines for the platform, the performance of the virtual machines must be measured and analyzed in various perspectives. In the previous research, unfortunately, the performance of a virtual machine were conducted in the condition that a guest operating system was installed on the virtual machine and considered as a computer, by measuring the network traffic between the guest operating system and an external client operating system. This performance measurement was not suitable for a virtual machine for the platform since a number of different software must be handled in the virtual machine. In order to overcome this limitation, this paper presents a measurement method for network performance and proposes the most optimal virtual machine by the method.
Materialized XML View XML View File Update according to the Deletion of Relational Databases
Gim, Mi-Su ; Ra, Young-Gook ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 99~116
For the mapping of two dimensional table structures of relational databases to the hierarchical XML documents, we apply the foreign key relationships of relational databases. In other words, the primary key of another table referenced by a foreign key of one tuple is mapped to the parent of the foreign key. Then XML hierarchies with order are expressed. In addition, the XML view file generated by the foreign key mappings shows side effects in the case of the relational database update for the satisfaction of referential integrity constraint in the foreign key. Thus, by inferring the foreign key roles at the generation of XML hierarchies, we can anticipate where the side effects occur in the hierarchies. We keep the XML view files up-to-date by reflecting the side effects to the XML files at the update of the underlying relational databases.
A Study of Improved SEED Mobile Game
Kim, Song-Min ; Lee, Mal-Rey ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 117~124
SEED game provides distribution of ability, bulky scenario, association system and a item layered. To improve SEED mobile game, we was designed the high degree of freedom as according to player's processing direction and optimization lavel. And also we assigned various event and quest for users.
Design and Implementation of Location-Aware Smart Bus Guide System
Choi, Joo-Yen ; Jung, Ja-Hyun ; Park, Sung-Mi ; Chang, Byeong-Mo ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 125~132
The goal of our research is to develop a smart context-aware guide system that provides a smart and personalized guide services based on implicit awareness of context. As a context-aware guide application, we have developed a location-aware smart bus guide system for Seoul based on PDA and GPS. It guides users to the nearby bus stops and provides users with information about the bus lines at the bus stops.
A Hybrid Anti-Collision Protocol using Bit Change Sensing Unit in RFID System
Kim, Jeong-Hwan ; Kim, Young-Tae ; Park, Yong-Soo ; Ahn, Kwang-Seon ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 133~141
A tag collision problem occurs when many tags are placed in a interrogation zone in RFID system. A tag collision problem is one of core issues and various protocols have been proposed to solve the collision problems. Generally tree-based protocols generate unique prefixes and identify tags with them as quick as possible. In this paper, we propose the QT-BCS protocol which decreases the identification time by reducing the number of query-response. The QT-BCS protocol makes a prefixes using time slot and bit change sensing unit. This protocol compares the current bit of tags until the current bit is differ from the previous one. When this occurs, all of the bits scanned so far are transferred to slot-0 and slot-1 depending on the first bit value in Reader. Consequently, this method can reduce the number of queries by tracing prefixes easily. Simulation result shows QT-BCS is more efficient in identifying tags than Query Tree and 4-ary Query Tree protocol.
Measuring Achievement of TCP Schemes over Heterogeneous Wireless Networks
Lee, Doo-Hyung ; Bae, Sang-Tae ; Koo, Ja-Hwan ; Chung, Jin-Wook ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 143~151
In this paper, we define Achieved Goodput(AG), Achieved Goodput Index(AGI) and Normalized Achieved Goodput Index(NAGI) in order to evaluate TCP schemes over heterogeneous wireless networks. These metrics contain a concept of achievement, the ability of accomplishing an objective in a given network situation unlike performance metrics commonly used to evaluate TCP schemes.
A Probability-based Clustering Protocol for Data Dissemination in Wireless Sensor Networks
Kim, Moon-Seong ; Cho, Sang-Hun ; Lim, Hyung-Jin ; Choo, Hyun-Seung ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 153~160
One of the major challenges of designing a dissemination protocol for Wireless Sensor Networks(WSNs) is energy efficiency. Recently, this issue has received much attention from the research community, and SPMS, which outperforms the well-known protocol SPIN, specially is a representative protocol. In addition, one of many characters of SPMS is the use of the shortest path to minimize the energy consumption. However, since it repeatedly uses the same path as the shortest path, the maximizing of the network lifetime is impossible, though it reduces the energy consumption. In this paper, we propose a dissemination protocol using probability-based clustering which guarantees energy-efficient data transmission and maximizes network lifetime. The proposed protocol solves the network lifetime problem by a novel probability function, which is related to the residual energy and the transmission radius between nodes. The simulation results show that it guarantees energy-efficient transmission and moreover increases the network lifetime by approximately 78% than that of SPMS.
Adaptive MAC Protocol for Low Latency in WMSN
Kim, Seong-Hun ; Lee, Sung-Keun ; Jung, Chang-Ryul ; Koh, Jin-Gwang ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 161~169
The development of Wireless Multimedia Sensor Networks(WMSNs) is getting realized in accordance with the increased demands to provide multimedia data transmission service such as CCTV movie, image chapter information, audio information based on wireless sensor network. It is very important to provide the differentiated quality assurance of service. In this paper, we propose a sensor medium access control protocol based on DSMAC, which provides differentiated Quality of Service(QoS) for delay. A proposed protocol is able to reduce the delay without increasing the energy consumption by adaptively changing the duty cycle according to the buffer occupancy. Simulation results show that the new MAC protocol performs better in terms of latency than S-MAC and DSMAC.
Hybrid Buffer Structured Optical Packet Switch with the Limited Numbers of Tunable Wavelength Converters and Internal Wavelengths
Lim, Huhn-Kuk ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 171~177
Optical packet switching(OPS) is a strong candidate for the next-generation internet, since it has a fine switching granularity at the packet level for providing flexible bandwidth, and provides seamless integration between WDM layer and IP layer. Optical packet switching have been studied in two categories: OPS in synchronous and OPS in asynchronous networks. In this article we are focused on contention resolution of OPS in asynchronous networks. The hybrid buffer have been addressed, to reduce packet loss further as one of the alternative buffer structures for contention resolution of asynchronous and variable length packets, which consists of the FDL buffer and the electronic buffer. The OPS design issue for the limited number of TWCs and internal wavelengths is important in the aspect of switch cost and resource efficiency. Therefore, an hybrid buffer structured optical packet switch and its scheduling algorithm is presented for considering the limited number of TWCs and internal wavelengths, for contention resolution of asynchronous and variable length packets. The proposed algorithm could lead to the packet loss improvement compared to the legacy LAUC-VF algorithm with only the FDL buffer.
Extracting Fuzzy Rules for Classifying Ventricular Tachycardia/Ventricular Fibrillation Based on NEWFM
Shin, Dong-Kun ; Lee, Sang-Hong ; Lim, Joon-S. ;
Journal of Internet Computing and Services, volume 10, issue 2, 2009, Pages 179~186
This paper presents an approach to classify normal and Ventricular Tachycardia/Ventricular Fibrillation(VT/VF) from the Creighton University Ventricular Tachyarrhythmia DataBase(CUDB) using the neural network with weighted fuzzy membership functions(NEWFM). In the first step, wavelet transform is used for producing input values which are used in the next step. In the second step, two numbers of input features are extracted by phase space reconstruction method and peak extraction method using coefficients produced by wavelet transform in the previous step. NEWFM classifies normal and VT/VF beats using two numbers of input features, and then the accuracy rate is 90.13%.