• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.027 seconds

DoS Attack Defense Using SDN and Honeypot (SDN 과 Honeypot 을 활용한 DoS 공격 차단 기법)

  • Mun, Sungsik;Kim, Mihui
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.397-400
    • /
    • 2020
  • SDN(Software Defined Networking)은 효율적인 방법과 저렴한 비용으로 네트워크를 직접 프로그램 하여 즉각적인 제어를 할 수 있다. 본 논문에서는 SDN 의 특성을 활용, SDN 구성요소인 컨트롤러와 스위치를 활용하여 공격 정보를 수집하고 이를 기반으로 공격을 탐지하는 위협 레벨 관리 모듈, 공격 탐지 모듈, 패킷 통계 모듈 등을 설계하여 프로그래밍하고 허니팟을 적용하여 서비스 거부(DoS, Denial of Services)공격을 차단하는 방법을 제시한다.

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

Design of an Network System for the Continuous Single Golf Game Play (지속적인 싱글 골프게임 플레이를 위한 네트워크 시스템 설계)

  • Lim, Seunghyeon;Park, KeeHyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.47-50
    • /
    • 2013
  • 본 논문에서는 지속적인 싱글 골프게임 플레이를 위한 네트워크 시스템 설계를 제안한다. 본 설계는 스크린 골프 시뮬레이터와 자료동기화 기술을 접합함으로써, 언제 어디서나 이전에 정지된 게임 플레이 환경을 재현하여 계속적인 플레이 할 수 있도록 하는데 그 목적이 있다. 플레이어가 스크린 골프장에서 게임 플레이하다가 게임이 완전히 끝나기 전에 정지하게 되면, 본 논문에서 제안한 네트워크 시스템이 해당 게임 환경 정보를 서버에 저장한다. 차후 플레이어가 게임 재개를 원할 경우, 종전에 정지한 게임 환경 정보를 그대로 재현할 수 있도록 다운로드하여 사용자에게 제공함으로써, 지속적인 게임 플레이를 가능하게 한다. 본 논문의 시스템은 PC콘솔 클라이언트, 프록시 서버, 사용자 데이터 서버로 구성된다. PC콘솔 클라이언트는 콘솔 기기에 탑재되며, 사용자에게 스크린 골프게임을 제공하고, 게임 환경 정보를 프록시 서버로 전송한다. 프록시 서버는 닫힌 네트워크에 존재하는 사용자 데이터 서버와 PC콘솔 클라이언트를 연결하며, 해당 세션을 관리한다. 사용자 데이터 서버는 실제 플레이어의 인증, 데이터 저장 및 불러오기와 같은 실질적인 서비스를 제공한다.

  • PDF

An improved algorithm for Detection of Elephant Flows (개선된 Elephant Flows 발견 알고리즘)

  • Joung, Jinoo;Choi, Yunki;Son, Sunghoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.849-858
    • /
    • 2012
  • We proposed a scheme to accurately detect elephant flows. Along the ever increasing traffic trend, certain flows occupy the network heavily in terms of time and network bandwidth. These flows are called elephant flows. Elephant flows raises complicated issues to manage for Internet traffics and services. One of the methods to identify elephant flows is the Landmark LRU cache scheme, which improved the previous method of Least Recently Used scheme. We proposed a cache update algorithm, to further improve the existing Landmark LRU. The proposed scheme improves the accuracy to detect elephant flow while maintaining efficiency of Landmark LRU. We verified our algorithm by simulating on Sangmyung University's wireless real network traces and evaluated the improvement.

A Composition of all Node Map Using Neighborhood Information in ad hoc Networks (Ad Hoc 네트워크에서 이웃노드 정보를 이용한 전체 노드 맵 구현)

  • Chang, Woo-Suck
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.221-226
    • /
    • 2006
  • An Ad hoc network, differently from wired networks, is a self organized network of mobile nodes in wireless environments. In this kind of routing and operation environments. link breaks occur frequently. Knowing positions of nodes may prevent or recover this type of phenomenon. Typically, GPS is used to detect position of nodes but high cost and complexity of construction limit applications. In this paper, we propose and design a method of construction nodes' position map using only information of all nodes without GPS. The proposed method complements and overcomes previous system with software solutions. Hence, construction and operation are simple, and can decrease cost of construction expenses.

  • PDF

Design of SIP System Framework for Supporting Mobility Based on JAIN (이동성 지원을 위한 JAIN 기반 SIP 시스템 프레임워크의 설계)

  • 이종언;차시호;김규호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.138-147
    • /
    • 2003
  • There are some problems of current internet protocols to support the mobility of terminal in wireless environments. The mobile IP has come out to solve these problems, but there exists some problems like triangle routing, the need of each host's home address and the management of tunneling. Also. real-time multimedia traffics require fast hand-off, low latency and the utilization ratio of high bandwidth. SIP can support the mobility of wireless terminal and is widely accepted as the protocol which can support multimedia service and call setup in next generation network. In this paper, the framework of SIP system will be designed and implemented to support the mobility of wireless terminal by using JAIN API which follow the standards of next generation network and this system matches the standards of next generation network.

  • PDF

Network Classification of P2P Traffic with Various Classification Methods (다양한 분류기법을 이용한 네트워크상의 P2P 데이터 분류실험)

  • Han, Seokwan;Hwang, Jinsoo
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Security has become an issue due to the rapid increases in internet traffic data network. Especially P2P traffic data poses a great challenge to network systems administrators. Preemptive measures are necessary for network quality of service(QoS) and efficient resource management like blocking suspicious traffic data. Deep packet inspection(DPI) is the most exact way to detect an intrusion but it may pose a private security problem that requires time. We used several machine learning methods to compare the performance in classifying network traffic data accurately over time. The Random Forest method shows an excellent performance in both accuracy and time.

Improvement of Windows File Management System (윈도우 파일관리 시스템의 개선)

  • Jho, Sung-Jun;Kang, Hyo-Jae;Kim, Hark-Young;Lee, Do-Hyeon;Lee, Seung-Joo;Song, Jun-Young;Hwang, Young-Sup
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.94-97
    • /
    • 2012
  • 파일관리 시스템은 운영체제와 네트워크의 변천에 따라 다양한 변화롤 가져 왔다. 클라우드 서비스는 사용자가 효과적으로 파일 관리를 할 수 있도록 다양한 기능이나 새로운 파일 관리 방법을 제공하고 있다. 개인용 윈도우 역시 시대의 변화에 맞추어 다양한 기능을 제공하고 있지만 기본적인 폴더 시스템은 변화하지 않았다. 특히 파일의 분류가 애매한 경우 개인용 윈도우에서는 편리하게 이러한 파일을 분류하거나 관리할 방법을 제공해주고 있지 않다. 개인용 윈도우에서도 더 효과적 으로 파일을 관리할 수 있도록 다양한 파일 관리 방법을 제공하도록 파일 관리 시스템을 개선한다. 본 프로젝트는 사용자 편의성을 높여주기 위하여 윈도우에서 제공되지 않는 카테고리나 태그와 같은 개념을 도입하여 사용자의 파일관리나 검색 등을 쉽고 빠르게 할 수 있도록 도우며, 파일의 공유 및 보안을 쉽게 할 수 있는 기술 요소롤 제공한다. 개선된 파일 관리 시스템의 필수요소인 보안 시스템과 검색 시스템 및 효과적인 파일 분류 시스템을 지원하는 프로토타입을 구현하고 소개한다.

USN Metadata Definition and Metadata Management System for Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 위한 USN 메타데이터 정의 및 메타데이터 관리 시스템)

  • Park, Jong-Hyun;Kang, Ji-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.143-153
    • /
    • 2011
  • The goal of Ubiquitous Sensor Network(USN) environments is to provide users high quality services based on a variety of sensors. In this environment, sensor devices, sensor nodes and sensor networks are heterogeneous and have various characteristics. Therefore it is important for interoperability to define a metadata for describing USN resources. The OGC(Open Geospatial Consortium) proposes SensorML(Sensor Model Language) as a standard language for modeling sensors. However, SensorML provides a framework for describing a processing model among sensors rather than describing information of sensors. Therefore, to describe a USN metadata is not main purposes of SensorML. This paper defines a USN metadata which describes information about sensor device, sensor node, and sensor network. Also the paper proposes a method for efficiently storing and searching the USN metadata and implements a USN metadata management system based on our method. We show that our metadata management system is reasonable for managing the USN metadata through performance evaluation. Our USN metadata keeps the interoperability in USN environments because the metadata is designed on SensorML. The USN metadata management system can be used directly for a USN middleware or USN application.

Distributed Security for Web Application Contents Protection (웹 어플리케이션 콘텐츠 보호를 위한 분산 보안)

  • Heo, Jin-Kyoung
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.125-130
    • /
    • 2008
  • User web service is increasing by development of internet technology. Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is like that, we have reliability of contents and illegality copy problem of internet contents in web application system. It is contents protection skills in web that encipherment technology, authentication and digital signature. We need message encoding and secret key for solve vulnerability of encipherment in web application system. In this paper, we propose a distributed secure system that can data confidentiality and user authentication. It prevent performance degradation from bottle neck in encipherment server, and improve service quality.

  • PDF