• Title/Summary/Keyword: 응용 트래픽

Search Result 448, Processing Time 0.027 seconds

An Effective ABR Flow Control Algorithm of ATM (ATM망의 ABR 트래픽 관리에 관한 연구)

  • 임청규
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.132-138
    • /
    • 1998
  • A network of Asynchronous Transfer Mode (ATM) will be required to carry the traffics(CVR, VBR, UBR, ABR) generated by a wide range of services. The traffic ABR uses the remined space of the CBR/VBR traffics bandwith. The Rate-based, the Credit-based, and the mixed method that are implementing the control loop of ABR traffic service is on study. In this paper, a new algorithm that can be considered in ATM and effectively manage ABR traffic using VS/VD method and EPRCA algorithm is proposed on the switch of the Rate-based method

  • PDF

An Anomaly Detection based on Probabilistic Behavior of Hidden Markov Models (은닉마코프모델을 이용한 이상징후 탐지 기법)

  • Lee, Eun-Young;Han, Chan-Kyu;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1139-1142
    • /
    • 2008
  • 인터넷의 이용이 증가함에 따라 네트워크를 통한 다양한 공격 역시 증가 추세에 있다. 따라서 네트워크 이상징후를 사전에 탐지하고 상황에 따라 유연하게 대처할 수 있도록 하기 위한 연구가 절실하다. 본 연구는 은닉마코프모델을 이용해 트래픽에서 이상징후를 탐지하는 기법을 제안한다. 제안하는 기법은 시계열 예측 기법을 이용해 트래픽에서 징후를 추출한다. 징후추출 과정의 결과를 은닉마코프모델을 활용한 징후판단과정을 통해 네트워크 이상징후인지를 판단하고 결정한다. 일련의 과정을 perl로 구현하고, 실제 공격이 포함된 트래픽을 사용하여 검증한다. 하지만 결과가 확연히 증명되지는 않는데, 이는 학습과정의 부족과 실제에 가까운 트래픽의 사용으로 인해 나타나는 현상으로 연구의 본질을 흐리지는 않는다고 판단된다. 오히려 실제 상황을 가정했을 때 접근이나 적용을 판단함에 관리자의 의견을 반영할 수 있으므로 공격의 탐지와 판단에 유연성을 증대시킬 수 있다. 본 연구는 실시간 네트워크의 상황 파악이나 네트워크에서의 신종 공격 탐지 및 분류에 응용가능할 것으로 기대된다.

Application-specific Traffic Generator (응용 프로그램의 특성 반영이 가능한 트래픽 생성기)

  • Yeo, Phil-Koo;Cho, Keol;Yu, Dae-Chul;Hwang, Young-Si;Chung, Ki-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.9
    • /
    • pp.40-49
    • /
    • 2011
  • Integrating massive components and low-power policies have been actively investigated for system-on-chip designs. But in recent years, finding the optimal interconnection structure among heterogeneous components has emerged as a critical system design issue. Therefore, various simulation tools to model interconnection designs are being developed and performance evaluation of simulation is reflected in the real design. But most of the simulation environments employ traffic generation based on the mathematical probability functions, and such traffic generation cannot fully cover for various situations that may be occurred in the real system. Therefore, the demand for traffic pattern generation based on real applications is increasing. However, there have been few simulators that adopt application-specific traffic generators. This paper proposes a novel traffic generation method in simulating various interconnection structures for multi-processor system-on-chip design. The proposed traffic generation method can generate traffic patterns that can reflect the actual characteristics of the application and evaluate the performance of an interconnection structure under more realistic circumstance than traffic patterns using mathematical probability functions. By comparing the differences between the proposed method and the one based on mathematical probability functions, this paper shows advantages of the proposed traffic generation method.

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

게임이론과 그 응용

  • Kim, Seung-Uk
    • Information and Communications Magazine
    • /
    • v.30 no.12
    • /
    • pp.66-75
    • /
    • 2013
  • 수학을 기반으로 경제학에서 널리 사용되던 게임이론이 최근 네트워크 디자인 분야에서 중요한 수단으로 활용되고 있다. 통신 네트워크에서 게임이론의 응용 분야로는 혼잡 제어, 네트워크 라우팅, 네트워크 부하균형, 통신보안, 대역폭 가격선정, 무선 협력통신, 트래픽 컨트롤, 전력제어, 자원 할당과 서비스 품질 보장 등 다양한 분야가 존재한다. 본 고에서는 최근 주목받고 있는 게임이론의 기본개념과 발전해온 역사, 그리고 대표적인 게임모델들에 대하여 간단히 소개하고자 한다.

QoS Enhancement Scheme through Service Differentiation in IEEE 802.11e Wireless Networks (IEEE 802.11e 무선랜에서 서비스 차별화를 통한 QoS 향상 방법)

  • Kim, Sun-Myeng;Cho, Young-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.4
    • /
    • pp.17-27
    • /
    • 2007
  • The enhanced distributed channel access (EDCA) of IEEE 802.11e has been standardized for supporting Quality of Service (QoS) in wireless LANs. In the EDCA, support of QoS can be achieved statistically by reducing the probability of medium access for lower priority traffics. In other words, it provides statistical channel access rather than deterministically prioritized access to high priority traffic. Therefore, lower priority traffics affect the performance of higher priority traffics. Consequently, at the high loads, the EDCA does not guarantee the QoS of multimedia applications such as voice and video even though it provides higher priority. In this paper, we propose a simple and effective scheme, called deterministic priority channel access (DPCA), for improving the QoS performance of the EDCA mechanism. In order to provide guaranteed priority channel access to multimedia applications, the proposed scheme uses a busy tone for limiting the transmissions of lower priority traffics when higher priority traffic has data packets to send. Performance of the proposed scheme is investigated by numerical analysis and simulation. Our results show that the proposed scheme outperforms the EDCA in terms of throughput, delay, jitter, and drop under a wide range of contention levels.

The Effect of Compressed Video Traffic over ABR on Satellite ATM Networks (위성 ATM 망에서 압축된 비디오 트래픽의 ABR 서비스에 미치는 영향)

  • 김성철;이상은
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1285-1294
    • /
    • 1999
  • In this paper we consider the performance of TCP video traffic over ABR with Long-Range Dependent VBR traffic. As compressed coded video traffics are increasing rapidly over Internet, lots of studies are being done for transmitting those traffics efficiently using limited network resources. We consider here the transmitting video service over ABR service in ATM networks, especially satellite networks. CBR or VBR services are suggested in transmitting the video traffic in ATM Forum TM 4.0. But ABR service connection, which is considered as appropriate service for data traffic, can be established with a small amount of bandwidth, MCR (Minimum cell rate). Furthermore ABR service can control the source's transmitting rate using feedback mechanism. Using this feature ABR service can be used in some applications which can control their quality of services corresponding to network loads. Compressed video sources with MPEG-2 are used for Long-Range Dependent VBR traffic here. We model the compressed video source to resemble the MPEG-2 transport streams. These compressed video traffic streams are consisted of three different frames, I-frame, P-frame, and B-frame. So when a network are overloaded, we can control the quality of service using this traffic features. TCP Traffics over ABR need large buffers in ATM switch to satisfy their QoS with background VBR traffics, which have high deviations in bandwidth. Furthermore satellite ATM networks with large feedback delay need large buffers corresponding RTT delay. The performance comparisons among EFCI and ER switch (ERICA+) switches in the network circumstances described above were shown in this paper. We also considered the case with ON-OFF VBR traffics.

  • PDF

The Implementation of Application Services Using CSCFs of Management (CSCF 노드 관리를 이용한 응용 서비스 구현)

  • Lee, Jae-Oh;Cho, Jae-Hyoung
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.33-40
    • /
    • 2012
  • Recently, according to increasing the network traffic in the IMS, the role of Network Management System (NMS) is very important because of limited network resource. NMS can perform two kinds of routing ways with the capability of static or dynamic routing. The way of A dynamic routing is more efficient than static routing one because it can make the flow of traffic changeful among nodes in the IMS. Therefore, in this paper, we suggest a management function of NMS, using a dynamic routing algorithm for managing the CSCFs in the IMS. And then we analyze the algorithm by measuring the performance of PoC, one of the prominent application services to be deployed in the IMS.

Processing Speed Improvement of HTTP Traffic Classification Based on Hierarchical Structure of Signature (시그니쳐 계층 구조에 기반한 HTTP 트래픽 분석 시스템의 처리 속도 향상)

  • Choi, Ji-Hyeok;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.191-199
    • /
    • 2014
  • Currently, HTTP traffic has been developed rapidly due to appearance of various applications and services based web. Accordingly, HTTP Traffic classification is necessary to effective network management. Among the various signature-based method, Payload signature-based classification method is effective to analyze various aspects of HTTP traffic. However, the payload signature-based method has a significant drawback in high-speed network environment due to the slow processing speed than other classification methods such as header, statistic signature-based. Therefore, we proposed various classification method of HTTP Traffic based HTTP signatures of hierarchical structure and to improve pattern matching speed reflect the hierarchical structure features. The proposed method achieved more performance than aho-corasick to applying real campus network traffic.

A Traffic-Classification Method Using the Correlation of the Network Flow (네트워크 플로우의 연관성 모델을 이용한 트래픽 분류 방법)

  • Goo, YoungHoon;Lee, Sungho;Shim, Kyuseok;Sija, Baraka D.;Kim, MyungSup
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.433-438
    • /
    • 2017
  • Presently, the ubiquitous emergence of high-speed-network environments has led to a rapid increase of various applications, leading to constantly complicated network traffic. To manage networks efficiently, the traffic classification of specific units is essential. While various traffic-classification methods have been studied, a methods for the complete classification of network traffic has not yet been developed. In this paper, a correlation model of the network flow is defined, and a traffic-classification method for which this model is used is proposed. The proposed network-correlation model for traffic classification consists of a similarity model and a connectivity model. Suggestion for the effectiveness of the proposed method is demonstrated in terms of accuracy and completeness through experiments.