• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.026 seconds

Design of Packet Analyzer Using SharpPcap (SharpPcap 기반의 대화형 패킷 분석기의 설계)

  • Yoo, Jaeheon;Choi, Seongryong;Kim, Minchul;Kim, Jinmo;Hwang, Soyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.177-180
    • /
    • 2015
  • As network technology advances hacking techniques are also evolving. This paper proposes design of a packet analyzer to monitor and analyze data packets in networks. The proposed packet analyzer offers functions such as packet sniffing, filtering and statistics. We implemented a prototype packet analyzer in C# .NET development environment using SharPcap.

  • PDF

MPLS Internet Traffic Engineering in IP Network (MPLS 인터넷 트래픽 엔지니어링 기술)

  • Jang Hee-Seon;Shi Hyun-Cheul
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.155-164
    • /
    • 2002
  • MPLS is a integrated technology by using routing function and label swapping in the network layer. Based on the previous forwarding equivalence classes, it adds the fixed length label in ingress of the MPLS domain. For the routing, without the packet header information, it uses label for the forwarding decisions. In this paper, traffic engineering requirements in the MPLS internet will be setup. The traffic engineering function have to be performed previously with the network topology. In addition to, we presents the IP network topology and main function with MPLS signaling protocol.

  • PDF

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

A Study on Authentication Protocol for Secure RFID Tag (RFID Tag 보안을 위한 인증 프로토콜에 관한 연구)

  • Jung, Yong-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.805-811
    • /
    • 2009
  • Firstly, this dissertation suggests the tag ID transfer method using two-dimensional arrangement. Secondly, provide better and stable security system compare to existing one by transferring tag; ID using established two-dimensional arrangement. Thirdly, provide operating module, which possible to descramble two-dimensional arrangement, with a character set when descrambling in a tag and a server. Lastly, suggest safe key transfer using a character set and two-dimensional arrangement. In order to embody suggested system and assess, transferred two-dimensional arrangement several times to carry out the experiment. Confirmed that it is impossible for suggested system to decode key patterns compare to existing RFID systems.

The Estimation of Traffic Volume for Dynamic Radio Resource Control (동적 무선 자원 제어를 위한 트래픽 양 예측 방안)

  • Yun, Mi-Young;Kim, Ki-Il;Park, Ae-Soon;Lee, Jae-Kyung;Kim, Sang-Ha
    • Annual Conference of KIPS
    • /
    • 2000.10b
    • /
    • pp.1609-1612
    • /
    • 2000
  • 무선망에서 기존의 회선 서비스뿐만 아니라 패킷 서비스 및 영상 서비스 등을 수용하는 데 있어서 고려되어야 할 것들 중 하나는 무선 자원의 활용이다. 특히 패킷 서비스의 경우 가변적인 패킷의 길이와 양으로 효율적인 무선 자원관리를 어렵게 하는 요소를 지니고 있다. 즉, 무선 자원을 효율적으로 운용하기 위해서는 동적인 무선 자원할당 메커니즘이 중요한 역할을 한다. UMTS 표준 문서에서는 계층 2 전송 프로토콜인 RLC (Radio Link Control) 버퍼의 양만을 측정하여 무선 자원 할당이 제어가 되도록 권고하고 있다. 하지만 트래픽 양의 변화가 큰 VBR 트래픽의 경우, 이와 같은 방법은 갑자기 증가하거나 감소하는 트래픽 양에 적응하기 힘들고 이는 무선 자원의 효율성을 저하시키며, QoS 제공도 어렵다. 본 논문에서는 먼저 트래픽 특성을 알 수 있는 토큰 버켓 모델을 RLC에 적용하고, 동적 무선 자원 할당을 위해 RLC 버퍼의 양뿐만 아니라 예상되는 유입 트래픽 양을 측정 및 보고하는 메커니즘을 제안한다.

  • PDF

Method for Supporting Multiple Service in a Mobile Terminal (이동 단말기에서 다중 서비스 지원 방안)

  • Lee, Jong-Chan;Park, Sang-Joon;Lee, Jin-Kwan
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.79-85
    • /
    • 2008
  • Our paper deals with a method for supporting multiple call/sessions in a mobile terminal. The different identifier for each protocol layer is assigned to each session when a mobile terminal sets SDP for multimedia services. In particular, QoS based tasks are used for managing the traffics in radio interface. Also, queuing, admission control, load control, resource allocation and scheduling are done based on the priority of sessions. The various multimedia services which is different in the requirement of resource allocation are able to be serviced simultaneously because a mobile terminal can provide the various services based on this scheme.

  • PDF

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

A Study on the Improvement of Information Security Management Condition Evaluation in Public Sector through the SCAP Analysis by NIST in U.S. (미(美) NIST 보안성 자동평가프로토콜(SCAP)분석을 통한 공공기관의 정보보안관리실태 평가제도 개선방안 연구)

  • Jee, Yoon Seok;Lee, Yong Suk;Yoon, Duck Jung;Shin, Yong Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.4
    • /
    • pp.31-39
    • /
    • 2019
  • The 129 public institutions in Korea are subject to Information Security Management Condition Evaluation (ISMCE) as a part of the government management evaluation system by the Ministry of Economy and Finance. ISMCE is started in 2006 with the central government institutions, and applied to the all public institutions in 2009. This evaluation is annually conducted by the National Intelligence Service through the site visits, and the number of the evaluated institutions is increasing year by year. However, the process of ISMCE - identifying existing vulnerabilities in the information system - is conducted manually. To improve this inconvenience, this paper introduces the various evaluation system in the major countries, especially in the United States, and analyzes the Security Content Automation Protocol (SCAP) by NIST. SCAP is automation protocol for the system vulnerability management (in technical fields) and security policy compliance evaluation. Based on SCAP, this paper suggests an improvement plan for the ISMCE of Korea.

A Construction of the N-BMS Focused on the Building Service Equipment (N-BMS : National Building Management System) (건물 군관리시스템 구축방안)

  • Lee, Tae-Won;Kim, Yong-Ki;Kang, Sung-Ju
    • Proceedings of the SAREK Conference
    • /
    • 2007.11a
    • /
    • pp.149-154
    • /
    • 2007
  • Now, in Korea, the performances of the building service equipment relay on the individual superintendent's share for the assessment of performance, fault detection, deterioration diagnosis of the building service equipment. As the result, very different quality of the performance or the durability of equipment is being obtained with his skill and effort and it is also not easy to assess that quality. This finally lead to the waste of labor force and the operating cost due to the high-cost, low-efficiency system. How to construct the N-BMS was considered to save energy, resource and to conserve performance of building service equipment. The FEMIS, facility, energy/environmental management & information system, for building service offer management process integrated with BAS, FMS and EMS and so on.

  • PDF

ECA Rule-Based Timely Collaboration of Web-Based Distributed Business Systems (웹기반 분산 기업 시스템을 위한 ECA 규칙 기반 적기 협력방법)

  • Lee, Dong-Woo;Lee, Seong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.345-354
    • /
    • 2005
  • In this paper collaboration of web-based distributed business systems is analyzed and the need of timely collaboration is derived and described in terms of inter-organizational contracts. A method of event-condition-action (ECA) rule based timely collaboration to meet the need and an active functionality component (AFC) to provide the method are proposed. The proposed method supports high level rule programming and event-based immediate processing so that system administrators and programmers can easily maintain the timely collaboration independently to the application logic. The proposed AFC uses HTTP protocol to be applied through firewalls. It is implemented using basic trigger facilities of a commercial DBMS for practical purpose.

  • PDF