• Title/Summary/Keyword: 패킷 분석기

Search Result 152, Processing Time 0.026 seconds

Design of Fast Handover Mechanism in Proxy Mobile IPv6 Networks (Proxy Mobile IPv6 네트워크에서 Fast Handover 기법 설계)

  • Park, Byung-Joo;Han, Youn-Hee;Kim, Bong-Ki
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.301-310
    • /
    • 2008
  • In the existing literature, the handover process reveals numerous problems manifested by high movement detection latency. FMIPv6 can reduce packet loss using a tunnel-based handover mechanism. However, this mechanism may cause performance degradation due to the out-of-sequence packets. Recently. Proxy Mobile IPv6 is proposed for network-based mobility management to reduce overhead in mobile node. PMIPv6 can decrease handover latency which related overhead in MN by using network agent. In this paper, we proposed optimized fast handover scheme called Fast Proxy Mobile IPv6 (EF-PMIPv6). The proposed EF-PMIPv6 can support fast handover using fast IAPP and ND schemes. Further, a mathematical analysis is provided to show the benefits of our scheme. In the analysis, various parameters are used to compare our scheme with the current procedures, while our approach focuses on the reduction of handover latency.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Microwave Propagation in the Plasma for 28 GHz Superconducting ECRIS (28 GHz 초전도 ECRIS 플라즈마에서의 마이크로파 전파)

  • Wang, S.J.;Won, M.S.;Lee, B.S.;Kim, S.H.;Kwak, J.G.;Jeong, S.H.;Kim, S.K.;An, C.Y.
    • Journal of the Korean Vacuum Society
    • /
    • v.19 no.6
    • /
    • pp.467-474
    • /
    • 2010
  • Packet propagation and absorption for the 28 GHz superconducting ECRIS under developing by KBSI Pusan center is analyzed with limited parameter range. The microwave power generated by 28 GHz gyrotron is axially injected to the plasma cavity through waveguide system. According to the analytical ray tracing calculation, the wave packet launched quasi-longitudinally at a high magnetic field side changes its direction from outward to inward as it is approaching resonance layer. Therefore, initially diverging wave does not likely hit a conducting surface before absorbing by electron cyclotron resonance. Also, absorption by plasma with moderate electron density is so strong that reflection by an extraction plate may not be expected.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

Autonomic Period Determination for Variable Rate Limiter of Virus Throttling (바이러스 감속기의 가변 비율 제한기를 위한 자율적 주기 결정)

  • Shim, Jae-Hong;Sohn, Jang-Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1C
    • /
    • pp.67-77
    • /
    • 2007
  • Virus throttling technique, one of many early worm detection techniques, detects Internet worm propagation by limiting connect requests within a certain ratio. The typical virus throttling controls the period of rate limiter autonomically by utilizing weighted average delay queue length to reduce connection delay time without hanving a large effect on worm detection time. In the existing virus throttling research, a minimum period of variable rate limiter is fired and a turning point which is a point that the period of rate limiter has been being decreased and starts to be increased is also fixed. However, these two performance factors have different effects on worm detection time and connection delay. In this paper, we analyze the effect of minimum period and turning point of variable rate limiter, and then propose an algorithm which determines values of performance factors by referencing current traffic pattern. Through deep experiments, it is verified that the proposed technique is more efficient in respect of reducing worm detection time and connection delay than the existing virus throttling which fixed the performance factors.

Interpretation and Statistical Analysis of Ethereum Node Discovery Protocol (이더리움 노드 탐색 프로토콜 해석 및 통계 분석)

  • Kim, Jungyeon;Ju, Hongteak
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.48-55
    • /
    • 2021
  • Ethereum is an open software platform based on blockchain technology that enables the construction and distribution of distributed applications. Ethereum uses a fully distributed connection method in which all participating nodes participate in the network with equal authority and rights. Ethereum networks use Kademlia-based node discovery protocols to retrieve and store node information. Ethereum is striving to stabilize the entire network topology by implementing node discovery protocols, but systems for monitoring are insufficient. This paper develops a WireShark dissector that can receive packet information in the Ethereum node discovery process and provides network packet measurement results. It can be used as basic data for the research on network performance improvement and vulnerability by analyzing the Ethereum node discovery process.

List-event Data Resampling for Quantitative Improvement of PET Image (PET 영상의 정량적 개선을 위한 리스트-이벤트 데이터 재추출)

  • Woo, Sang-Keun;Ju, Jung Woo;Kim, Ji Min;Kang, Joo Hyun;Lim, Sang Moo;Kim, Kyeong Min
    • Progress in Medical Physics
    • /
    • v.23 no.4
    • /
    • pp.309-316
    • /
    • 2012
  • Multimodal-imaging technique has been rapidly developed for improvement of diagnosis and evaluation of therapeutic effects. In despite of integrated hardware, registration accuracy was decreased due to a discrepancy between multimodal image and insufficiency of count in accordance with different acquisition method of each modality. The purpose of this study was to improve the PET image by event data resampling through analysis of data format, noise and statistical properties of small animal PET list data. Inveon PET listmode data was acquired as static data for 10 min after 60 min of 37 MBq/0.1 ml $^{18}F$-FDG injection via tail vein. Listmode data format was consist of packet containing 48 bit in which divided 8 bit header and 40 bit payload space. Realigned sinogram was generated from resampled event data of original listmode by using adjustment of LOR location, simple event magnification and nonparametric bootstrap. Sinogram was reconstructed for imaging using OSEM 2D algorithm with 16 subset and 4 iterations. Prompt coincidence was 13,940,707 count measured from PET data header and 13,936,687 count measured from analysis of list-event data. In simple event magnification of PET data, maximum was improved from 1.336 to 1.743, but noise was also increased. Resampling efficiency of PET data was assessed from de-noised and improved image by shift operation of payload value of sequential packet. Bootstrap resampling technique provides the PET image which noise and statistical properties was improved. List-event data resampling method would be aid to improve registration accuracy and early diagnosis efficiency.

An Error Concealment Method for Enhancement Layer in the SNR Layer (SNR 계층부호화에서 고급계층에 대한 에러은닉 기법)

  • Park, Byung-Yup;Lee, Guee-Sang
    • Annual Conference of KIPS
    • /
    • 2003.11a
    • /
    • pp.69-72
    • /
    • 2003
  • 영상압축 방법인 ITU-T H.263 부호화 기법에 비해 H.263에서의 주요 특징 중 하나는 에러 강인성으로, 그중에서 계층부호화 모드는 한 개의 송신 영상에 대해서도 부호기와 전송로에 따라 여러 가지 화질의 재생 영상을 얻을 수 있는 기능, 즉 에러 및 패킷 손실 발생 가능 채널에서 비디오 정보 전송시 디코더측에서 사용 가능한 다양한 비트율, 해상도, 디스플레이 율을 허용함으로써 비디오 정보에 대한 전송을 향상시키는 기법이다. 계층부호화 에러은닉기법은 기본계층에 대해서는 QoS 보장에 의해 무손실 전송이 가능하므로 모든 프레임에 애러가 발생할 수 있는 단일계층 에러은닉보다 고급계층에서 이용할 수 있는 정보가 더 많다는 점에서 더 유리한 이점을 가지고 있다. 본 논문에서는 SNR 계층부호화된 고급계층에 대해서 이용 가능한 데이터 손실이 없는 기본계층과 고급계층에 상관관계를 분석하여 계층형부호화에 맞는 에러은닉기법을 제시한다.

  • PDF

An Error Concealment Method for Enhancement Layer in the SNR Layer (SNR 계층부호화에서 고급계층에 대한 에러은닉 기법)

  • 박병엽;이귀상;정정균
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.429-432
    • /
    • 2003
  • 영상압축 방법인 ITU-T H.263 부호화 기법에 비해 H.263+에서의 주요 특징 중 하나는 에러 강인성으로, 그 중에서 계층부호화 모프는 한 개의 송신 영상에 대해서도 복호기와 전송로에 따라 여러 가지 화질의 재생 영상을 얻을 수 있는 기능, 즉 에러 및 패킷 손실 발생 가능 채널에서 비디오 정보 진송시 디코더측에서 사용 가능한 다양한 비트율, 해상도 디스플레이율을 허용함으로써 비디오 정보에 대한 전송을 향상시키는 기법이다. 계층 부호화 에러은닉기법은 기본계층에 대해서는 QoS 보장에 의해 무손실 전송이 가능하므로 모든 프레임에 에러가 발생할 수 있는 단일계층 에러은닉보다 고급계층에서 이용한 수 있는 정보가 더 많다는 점에서 더 유리한 이점을 가지고 있다. 본 논문에서는 SNR 계층부호화된 고급계층에 대해서 이용 가능한 데이터 손실이 없는 기본계승과 고급계층에 상관관계를 분석하여 계층형 부호화에 맞는 에러은닉기법을 제시한다.

  • PDF

Performance Improvement Method of Handoff considering Virtual Home Agent in Mobile IP (Virtual Home Agent 를 고려한 Mobile IP 핸드오프 성능 개선 방안)

  • Lee, Byoung-Moon;Lee, Jae-Kee
    • Annual Conference of KIPS
    • /
    • 2003.11b
    • /
    • pp.1011-1014
    • /
    • 2003
  • 표준 Mobile IP(MIP)에서는 기본 구조에 따른 성능상의 문제점들이 제기되어 왔으며 이를 해결하기 위해 MIP 확장을 통한 성능 개선 기법들이 연구되어 왔다. 핸드오프에 따른 성능 저해 요소를 분석하여 라우팅 최적화, 등록 및 전송지연, 데이터 패킷 손실률을 개선하기 위해 본 논문에서는 Foreign Agent(FA)내에 Virtual Home Agent(VHA) 기능을 추가함으로써 Home Agent(HA)의 Mobile Host(MH)에 대한 이동 관리 역할 분담 마른 등록, FA의 효율적인 버퍼 이용이 가능한 방안을 제안하였다.

  • PDF