Fig. 1 Integrated VPN router configuration diagram
Fig. 2 Multiple-Queuing Traffic Shaping
Fig. 3 Routing protocol
Fig. 4 Execution structure of 'zebra'
Table. 1 Hardware / Software Specifications
Table. 2 Invasion technique
Table. 3 False rate Performance analysis
References
- S. E. Yang, I. S. Kang, B. O. Go, and H. K. Jung, "A Realtime Traffic Shaping Method for VPN Tunneling on Smart Gateway Supporting IoT," The Journal of Korea Institute of Information and Communication Engineering, vol.21, no.6, pp. 1121-1126, 2017. https://doi.org/10.6109/jkiice.2017.21.6.1121
- (2015, May). "OpenWrt Chaos Calmer 15.05," [Internet]. Available:http://www.openwrt.org.
- K. Ishiguro. (2017, March). "A routing software package for TCP/IP networks" [Online]. Available:https://www.guagga.net, Ouagga 1.2.0.
- T. Jin, "OpenWrt Development Guide," Wireless Networks Lab, CCIS, MEU. Retrieved, Oct. 2013.
- Open VPN [Internet]. Available::http://openvpn.net/.
- The Linux Foundation. Retrieved. (2014, January). "Introduction to iproute2" [Online]. Available: http://www.linuxfoundation.org.
- B. Hubert. (2012, May). "Linux Advanced Routing & Traffic Control HOWTO" [Online]. Available: http://lartc.org/,DocBook Edition.
- S. E. Yang, B. O. Hog, J. K. Choi, and H. K. Jung, "Wired/Wireless Gateway System Supporting LAN-to- LAN VPN with Multi-Queuing Realtime Traffic Shaping," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 5, May. 2015.
- The Snort Project, (2018, January). "SNORT Users Manual," [Online]. Available: https://www.snort.org, SNORT 2.9.12.
- F. Alam. (2015, March). "Intrusion Detection & SNORT," APRICOT2015, [Online]. Available: https://nsrc.org/workshops.
Cited by
- 웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템 vol.25, pp.3, 2019, https://doi.org/10.6109/jkiice.2021.25.3.449