• Title/Summary/Keyword: 패킷 보호

Search Result 274, Processing Time 0.039 seconds

Routing Table Protection From an Attack to Falsify Hop Count in Mobile Ad-hoc Networks (모바일 애드 혹 네트워크(Mobile Ad-hoc Networks)에서 홉 카운트 변조 공격으로부터의 라우팅 테이블 보안)

  • Kim, Jin-Hee;Lee, Jae-Hyun;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.43-52
    • /
    • 2008
  • The AODV routing algorithm in a mobile ad-hoc networks broadcasts RREQ packet to find a route from a source to a destination. An attacker node may intercept a RREQ packet and attack by falsifying a field in that packet. In this paper, we propose a simply modified method which can protect a routing table from an attack to falsify the hop count field in the RREQ packet. When establishing a connection between a source and a destination, we update routing table of each node on the connection based on minimum delay instead of minimum hop count. By doing this, we can protect routing table from an attack to falsify a hop count Our simulation is implemented in Network Simulator(NS-2). We analyze how an attacker affects the mobile ad-hoc networks. The result of the simulation shows that the proposed mechanism transfers a data securely.

SACK-SNOOP Protocol for Wireless TCP Performance Improvement (무선 TCP 성능 향상을 위한 SACK-SNOOP 프로토콜)

  • Ahn, Chi-Hyun;Kim, Hyung-Chul;Woo, Jong-Jung;Kim, Jang-Hyung;Lee, Dae-Young;Jun, Kye-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.392-401
    • /
    • 2007
  • Wireless network has high BER characteristic because of path loss, fading, noise and interference. Many packet losses occur without any congestion in wireless network. Therefore, many wireless TCP algorithms have been proposed. SNOOP, one of wireless TCP algorithms, hides packet losses for Fixed Host and retransmits lost packets in wireless network. However, SNOOP has a weakness for bust errors in wireless network. This paper proposes the SACK-SNOOP to improve TCP performance based on SNOOP and Freeze-TCP that use ZWA messages in wireless network. This message makes FH stop sending packets to MH. BS could retransmit error packets to MH for this time. SACK-SNOOP use improved Selective ACK, thereby reducing the number of packet sequences according to error environment. This method reduces the processing time for generation, transmission, analysis of ACK. This time gain is enough to retransmit local burst errors in wireless link. Furthermore, SACK-SNOOP can manage the retransmitted error by extending delay time to FH. The simulation shows that our proposed protocol is more effective for packet losses in wireless networks.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF

Design of Messenger for Secure Communication between Users (사용자 사이의 안전한 통신을 위한 메신저 설계)

  • Yoon, Yoeung-Jun;Pyo, Kyoung-Hwan;Sin, Seung-Soo;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.81-84
    • /
    • 2010
  • 기존의 메신저는 통신 내용 보안의 취약성으로 인해 서버관리자와 공격자로부터 사용자에게 피해를 주고 있다. 이러한 문제점을 보완하기 위해 현재 보편화된 메신저 프로그램인 네이트온 메신저의 채팅, 쪽지(메시지) 보내기의 패킷을 분석하고, 사용자의 채팅과 쪽지의 통신 내용을 보호하기 위해 보다 안전성이 높은 새로운 메신저 프로토콜 제안한다.

  • PDF

Suggest to Organization Algorithm for Data Security when Hacking to Encryption Algorithm's key in Network Data Communication (네트워크 통신에서 패킷의 암호화 알고리즘의 키 해킹시 데이터 보안을 위한 조립알고리즘 제안)

  • Jang, Seung-Chul;Jun, Moon-Suk
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.207-209
    • /
    • 2010
  • 오늘날 네트워크 통신은 다양한 해킹방법들로부터 데이터를 보호하기 위하여 다양한 암호화 알고리즘을 사용하여 통신하고 있다. 이렇게 사용되는 암호화 알고리즘에서 키가 누출되어 해킹되었을 경우 데이터에 대한 정보누출 및 수정, 삭제 등의 데이터 가공을 당하게 된다. 본 논문에서는 이러한 문제를 보완하기 위하여 본래의 데이터를 섞고, 재조립하는 조립알고리즘을 제안한다.

  • PDF

Reliable Methods of Interoperability between Packet Transport Networks and IP Networks (고신뢰성을 보장하는 패킷전달망-IP망 상호연동 방법)

  • Lee, Kwang-Koog;Lee, Hosong;Lee, Youngwuk;Jeong, Kitae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.34-40
    • /
    • 2014
  • With the economical data service delivery, the packet transport network (PTN) technologies have emerged as an important player in the next-generation transport networks. As the PTN continues to make such considerable progress, it is being challenged by network providers who need rapid and reliable recovery capabilities to guarantee the availability of their services. This paper introduces several fault detection mechanisms for a client signal failure in packet transport networks and proposes a reliable transmission method of IP flows from routers using the combination of Ethernet services. Based on the first fault detection methods, client signal fault is detected within tens or hundreds of milliseconds. It enables the client network devices to perform their own recovery processes within one second. The second mechanism enables failed Ethernet services to be bypassed via other Ethernet services over disjoint paths, so as to contribute on reducing packet loss of IP traffic.

Optimal Channel Power Allocation by Exploiting Packet Semantics for Real-time Wireless Multimedia Communication (실시간 멀티미디어 통신을 위한 의미 기반 채널 파워 할당 기법)

  • Hong, Sung-Woo;Won, You-Jip
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.171-184
    • /
    • 2010
  • In this work, we develop a novel channel power allocation method for the real-time multimedia over the wireless network environment. Since each frame has different effect on the user perceivable QoS, improving packet loss does not necessarily coincide with perceivable improvements in QoS. A new channel power control scheme is suggested based on the quantified importance of each frame in terms of user perceivable QoS. Dynamic programming formulation is used to obtain optimal transmit power which minimizes power consumption and maximizes user perceivable QoS simultaneously. The experiment is performed by using publicly available video clips. The performance is evaluated using network simulator version 2 (NS 2) and decoding engine is embedded at the client node, and calculated PSNR over the every frame transmitted. Through the semantics aware power allocation (SAPA) scheme, significant improvement on the QoS has been verified, which is the result of unequal protection to more important packets. SAPA scheme reduced the loss of I frame by upto 27% and reduced power consumption by upto 19% without degradation on the user perceivable QoS.

활동기준원가회계시스템구축을 위한 활동분석 방법에 관한 연구 -서비스업을 대상으로 하며 기존 기업자료를 이용한 활동분석-

  • 김준석;박상민;남호기;박주식
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2000.11a
    • /
    • pp.63-71
    • /
    • 2000
  • 대량생산체제를 위주로 했던 산업혁명 초기에는 원가계산방식이 비교적 수월하였다. 생산에 투입된 비용을 그대로 생산량으로 나누기만 하면 되었고 이 수치를 그대로 원가라고 간주하여도 기업이 존속하는데는 아무 영향이 없었다. 물론 이 때에도 간접비라는 것은 존재하였으나 그 비중이 미미했기에 이를 무시하여도 되었던 것이다. 그러나 그 때와 달리 지금은 기업환경은 다품종 소량생산, 고객 주문 생산 등의 다양한 형태로 변화되어 왔으며 유연생산시스템, 적시생산시스템 등과 같은 새로운 경영기법 및 생산관리 기법이 발달함에 따라 그간 무시되어 왔던 간접비가 오히려 직접비보다도 많아지는 현상이 생기게 되었다. 그래서 증가하는 간접비를 효과적으로 제품이나 서비스에 배부하여야 하는 필요성에서 연구가 시작되었고 그 결과로서 나온 원가계산방법이 활동기준원가계산시스템이다. 우리 나라에는 90년대 초반에 도입되어 여러기업이 시스템을 구축한 상태이며 이에 대한 사례를 연구한 논문도 발표되었다. 활동기준원가 계산시스템이 기존의 원가계산시스템보다 더 정교하다는 것은 많은 이미 많은 연구들에서 입증이 되었지만 그래도 실제 시스템의 구축에 있어서는 아직도 많은 연구과제가 남아있다. 본 연구는 시스템의 구축과정에서 핵심과정으로써 반드시 거쳐야 하는 활동분석단계에 관심을 두고 활동분석과정을 가능한 적은 비용으로 빠르게 수행하기 위한 방법을 모색하였다. 그 방법으로 선택한 것이 기존의 기업보유자료를 이용하여 활동분석을 수행하는 것으로 비록 활동분석데이터의 신뢰성에는 조금 부족한 면이 있을 수 있으나 기업보유자료가 활동분석과 개연성이 있음을 제시하고자 하였다. 한다.드가 전송한 패킷은 이전 셀 지역에 있는 에이전트가 새로운 셀 지역에 있는 이동 노드로 패킷을 재전송하여 전달하는 smooth 핸드오프 기능을 제공한다. 이전 셀 지역에 속한 외부 에이전트가 바인딩을 갱신하기 전에 송신 노드로부터 이동노드로 전달된 패킷이 있을 경우는 패킷을 저장하여 이후에 이동 노드의 위치 정보에 관한 바인딩 정보가 갱신되면 이러한 바인딩 정보에 따라 패킷을 재전송하는 버퍼기능도 제공한다. route optimization mobile IP는 기본적인 mobile IP에서의 복잡한 라우팅 문제를 해결하고, 핸드오프에서의 패킷 손실률을 최소화 한다.본 논문에서는 컴퓨터 시뮬레이션을 통해 smooth 핸드오프를 이용한 mobile IP의 성능을 분석한다. 일반적으로 데이터 트래픽 특성, 노드의 이동성, 바인딩 갱신시간, 버퍼관리 방법 등은 핸드오프 동안 mobile IP의 성능에 많은 영향을 미친다. 따라서 시뮬레이션 모델을 이용하여 다양한 트래픽 환경에서 위에 언급된 성능 파라미터들의 영향을 분석한다. 마지막으로 시뮬레이션 결과를 이용하여 mobile IP의 성능을 개선시키기 위한 방법을 제시한다. 제시하고자 한다.과로 여겨지며, 또한 혈청중의 ALT, ALP 및 LDH활성을 유의성있게 감소시키므로서 감잎 phenolic compounds가 에탄올에 의한 간세포 손상에 대한 해독 및 보호작용이 있는 것으로 사료된다.반적으로 홍삼 제조시 내공의 발생은 제조공정에서 나타나는 경우가 많으며, 내백의 경우는 홍삼으로 가공되면서 발생하는 경우가 있고, 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른

  • PDF