DOI QR코드

DOI QR Code

A Study of Advanced Internet Strategy for Future Industry

  • Park, Jae-Kyung (Dept. of Information Security, Korea Polytechnics) ;
  • Lee, Hyung-Su (Dept. of Information Security, Korea Polytechnics) ;
  • Kim, Young-Ja (Dept. of Information Security, Korea Polytechnics)
  • 투고 : 2020.03.05
  • 심사 : 2020.04.01
  • 발행 : 2020.04.29

초록

본 논문에서는 향후 네트워크 서비스의 발전 및 네트워크 대역폭 확대에 따른 현재의 인터넷이 가지고 있는 문제점을 살펴보고 이를 고도화할 수 있는 방안에 대해 제안한다. 현재의 인터넷은 TCP/IP로 구성되어 오랜 시간 사용되어 왔으나 대역폭, 전송량, 보안 등의 근본적인 문제가 해결되지 않아 지속적인 투자 및 유지보수를 통해 미래 네트워크를 대비하여야 한다. 이를 극복하기 위해 현재의 인터넷 프로토콜을 차세대 네트워크로 변환하여 이러한 문제를 극복하고 고도화할 수 있는 방안을 제시하고자 한다. 현재 차세대 네트워크에 대한 많은 연구가 이루어지고 있으나 국내에는 이러한 연구가 많이 이루어지지 않고 있으며 국가적인 차원에서 미래의 인터넷 서비스 산업 발전을 위해 차세대 네트워크에 대한 연구는 매우 중요한 과제일 것이다. 본 논문에서는 다양한 차세대 프로토콜을 통한 장점을 통해 고도화된 인터넷 환경을 제안하고자 한다.

In this paper, we examine the problems of the current Internet due to the development of network services and the expansion of network bandwidth. The current Internet has been used for a long time because it is composed of TCP / IP, but fundamental problems such as bandwidth, transmission rate, and security have not been solved. Therefore, the future network must be prepared through continuous investment and maintenance. In order to overcome this problem, we will propose a way to overcome the above problems and upgrade by converting the current Internet Protocol into the next generation network. Currently, many researches on next-generation networks have been conducted, but there are not many studies in Korea, and research on next-generation networks will be a very important task for the future development of the Internet service industry at the national level. In this paper, we propose an advanced internet environment through the advantages of various next generation protocols.

키워드

참고문헌

  1. Van Jacobson, D. K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, and Rebecca Braynard. Networking Named Content. In CoNext, 2009.
  2. Michael Meisel, Vasileios Pappas, and Lixia Zhang. Ad hoc networking via named data. In MobiArch'10. ACM, 2010. DOI: 10.1016/j.adhoc.2018.08.008
  3. Van Jacobson, D. K. Smetters, Nick Briggs, Michael Plass, Paul Stewart, James D. Thornton, and Rebecca Braynard. VoCCN: Voice-over Content-Centric Networks. In ReArch, 2009. DOI: 10.1145/1658978.1658980
  4. James Roberts. What QoS for the future internet? In The proceedings of FISS09, July 22, 2009.
  5. http://en.wikipedia.org/wiki/Named_data_networking
  6. Jae-Kyung Park, Strengthening Authentication Through Content Centric Networking, KSCI, Mar 24 2018.
  7. Jae-Kyung Park, A Network Translate System Using Next Generation Content Centric Networking Technology, KSCI, Mar 24 2018.
  8. Jae-Kyung Park, A Design of client BBS systems for Secure HVA, KSCI, Sep 21 2018.
  9. Michael Meisel, Vasileios Pappas, and Lixia Zhang. Ad hoc networking via named data. In MobiArch'10. ACM, 2010. DOI: 10.1145/1859983.1859986
  10. G. Loukas and G. Oke, "Protection against denial of service attacks: a survey," The Computer Journal, vol. 53, pp. 1020-1037, 2010. DOI: 10.1093/comjnl/bxp078
  11. M. Li, J. Li, and W. Zhao, "Simulation study of flood attacking of DDOS," in Proc of International Conference on Internet Computing in Science and Engineering 2008, pp. 286-293. DOI: 10.1109/icicse.2008.14
  12. W. Liu, "Research on DoS attack and detection programming," in Proc. of Third International Symposium on Intelligent Information Technology Application 2009, pp. 207-210. DOI: 10.1109/iita.2009.165
  13. J. Nazario, "DDoS attack evolution," Network Security, vol. 2008, pp. 7-10, 2008. DOI: 10.1016/s1353-4858(08)70086-2
  14. G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis, "Detecting DNS amplification attacks," in Critical Information Infrastructures Security, ed: Springer, 2008, pp. 185-196. DOI: 10.1007/978-3-540-89173-4_16
  15. M.-J. Chen, K.-P. Chien, C.-Y. Huang, B.-C. Cheng, and Y.-S. Chu, "An ASIC for SMTP Intrusion Prevention System," in Proc. of IEEE International Symposium on Circuits and Systems 2009, pp. 1847-1850. DOI: 10.1109/iscas.2009.5118138
  16. F. Huici, S. Niccolini, and N. d'Heureuse, "Protecting SIP against very large flooding DoS attacks," in Proc. of Global Telecommunications Conference 2009, pp. 1-6. DOI: 10.1109/glocom.2009.5425524
  17. J. Yu, H. Lee, M.-S. Kim, and D. Park, "Traffic flooding attack detection with SNMP MIB using SVM," Computer Communications, vol. 31, pp. 4212-4219, 2008. DOI: 10.1016/j.comcom.2008.09.018
  18. Van J., et al, "Networking Named Content", SIGCOMM Conference, 2009
  19. Hyung-Su Lee, Jae-Pyo Park, Jae-Kyung Park, "A Network Transport System Using Next Generation CCN Technology," Journal of The Korea Society of Computer and Information, Vol. 22, No. 10, pp. 93-100, Oct. 2017. https://doi.org/10.9708/jksci.2017.22.10.093
  20. Jae-Kyung Park, Won Joo Lee, Kang-Ho Lee, "A Study on the Isolated Cloud Security Using Next Generation Network" Journal of The Korea Society of Computer and Information Vol. 22 No. 11, pp. 41-48, November 2017. https://doi.org/10.9708/jksci.2017.22.01.041
  21. Sung-Jin Kim, Jae-Kyung Park, "Strengthening Authentication Through Content Centric Networking" Journal of The Korea Society of Computer and Information Vol. 22 No. 4, pp. 75-82, April 2017. https://doi.org/10.9708/jksci.2017.22.04.075
  22. Hyung-Su Lee, Jae-Pyo Park, Jae-Kyung Park, "A Network Transport System Using Next Generation CCN Technology" Journal of The Korea Society of Computer and Information Vol. 22 No. 10, pp. 93-100, October 2017. https://doi.org/10.9708/jksci.2017.22.10.093