Abstract:
A method and an apparatus of integrative network management, which provide connection between private networks and real-time connection according to various policies depending on security or a quality of service (QoS), manages information required to provide the connection, and controls connection by using the managed information in order to defend and cope with various types of cyber attacks and fundamentally invalidate a cyber attack.
Abstract:
An operation method of a VPN security apparatus includes receiving a service request from a client, dynamically allocating a fake address of a VPN apparatus connected to a service server, which provides the service requested by the client, and transmitting the fake address allocated to the VPN apparatus to the client and the VPN apparatus.
Abstract:
In order to select a conference processing device to host a video conference between conference participation devices, a video conference system selects conference processing devices that are positioned most adjacent to each of conference participation devices that participate in the video conference as candidates for a conference processing device. The video conference system forms network topology based on candidate conference processing devices and conference participation devices, and aligns candidate conference processing devices based on preset alignment reference information. The video conference system selects one of the aligned candidate conference processing devices as an optimal conference processing device to host the video conference.
Abstract:
A processor partitions a deep neural network having a plurality of exit points and at least one partition point in a branch corresponding to each of the exit points, for distributed processing in an edge device and a cloud. The processor sets environmental variables and training variables for training, selects an action to move at least one of an exit point and a partition point from a combination of the exit point and the partition point corresponding to a current state, performs the training by accumulating experience data using a reward according to the selected action and then moves to a next state, and outputs a combination of an optimal exit point and a partition point as a result of the training.
Abstract:
Disclosed are a network apparatus and an operating method thereof. The network apparatus includes: a security authentication module that executes security authentication of a distributed denial of service (DDoS) attack when a predetermined packet requests access to a particular service server to which the security authentication is applied, at the time of inputting the predetermined packet; and a communication module that transmits the predetermined packet security-authenticated by the security authentication module through a transmission route of the particular service server, so as to easily defend the DDoS attack by using a pseudo state of a service procedure.