• Title/Summary/Keyword: 프로토콜 분석기

Search Result 268, Processing Time 0.222 seconds

Design and Implementation of Remote Script Editor for Vulnerability Scanning (취약성 탐지 스크립트의 원격 편집기 설계 및 구현)

  • 이철호;최경희;박승규;정기현;이철원;이남훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.142-144
    • /
    • 2002
  • 본 논문에서는 취약성 탐지 스크립트의 원격 편집기를 설계 및 구현하였다. 원격 편집기는 Windows 계열의 시스템에서 구동되며 스크립트 데이터베이스가 저장되어 있는 서버로부터 스크립트를 인출하여 수정 후 저장하거나 새로운 스크립트를 작성하여 저장한다. 편집기는 스크립트의 작성 및 편집을 위한 편집기능, 서버와의 HTTP 프로토콜 기반 통신 기능, 스크립트의 사용 용도나 스크립트의 경향과 특성을 파악하는 등의 특성분석기능, 스크립트의 유효성 및 문법 검사기능을 가지고 있으며, 원격 편집기의 요청이 있을 때에 이에 응답하기 위하여 스크립트 데이터베이스 서버측에서 CGI(Comman Gateway Interface)가 구동된다.

  • PDF

SMX-1 신호링크기능 S/W설계 및 구현

  • Lee, Geun-U;Baek, Yeong-Sik
    • ETRI Journal
    • /
    • v.14 no.4
    • /
    • pp.236-248
    • /
    • 1992
  • 본 고에서는 국내 신호망에 사용될 NO.7 신호방식을 채택한 신호중계교환기 SMX-1 시스팀의 메시지전달부(MTP)중 레벨2 신호링크 기능에 대한 소프트웨어의 설계 및 구현에 대하여 기술하였다. SMX-1 시스팀내에서 요구하는 레벨2 신호링크의 기능은 NO.7 신호방식-메시지전달부 국내기준안에서 제시한 신호링크 고유기능, 고신뢰도가 만족되도록 설계된 SMX-1 시스팀의 유지보수기능, SMX-1 시스팀 운용시 망상태 파악 및 가용도 등을 파악하기 위해 필요한 측정 및 감시 기능들이 구현되었다. 또한 신호링크 고유기능중에서도 설계자 구현 의존 사항들인 신호 전송로 차단때의 감지 기능, 신호링크 폭주 기능, 옥텟계수 모드 처리기능, 긴 메시지 수신처리 기능 등이 구현되었다. 구현 완료된 신호링크기능이 NO.7 신호방식-메시지전달부 국내기준안에서 요구하는 메시지전달부 신호전송성능의 신호트래픽 처리용량을 만족하는지를 확인하기 위하여 NO.7 프로토콜 분석기를 통하여 시험하였으며 그 결과를 분석 및 기술하였다.

  • PDF

Analysis on Co-use Performance of System according to Duty Cycle of Interfering Transmitter Signal (간섭 송신기 신호 duty cycle에 따른 시스템 공유 성능 분석)

  • Cho, Ju-Phil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.2
    • /
    • pp.222-227
    • /
    • 2012
  • In this paper, we analyze the total performance according to duty cycle of interfering transmitter in hetero systems. We analyze this criteria as a parameter for co-use when hetero systems share the same frequency channels. In order to make an analysis of relationship between duty cycle and performances of two systems. We take into consideration on the case that WiBro is an victim receiver and WLAN is a interfering transmitter. Analyzed coexistence results may be widely applied into the technique developed to get the coexisting condition for wireless devices using many communication protocols in same frequency.

A Study on the Session Description Protocol Stack for VoIP (VoIP를 위한 Session Description Protocol 스택에 관한 연구)

  • Jung, Sung-Ok;Ko, Kwang-Man
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.3
    • /
    • pp.19-27
    • /
    • 2001
  • Accordingly it is very important to not only develop the stack of protocol, but also try an international standardization regarding the standard protocol of VoIP. Has compared to the advanced countries having already some success in commercialization, Korea is relatively much less involved in relation to this technology and endeavors. In this regards, this paper is focused on developing a protocol stack made with encoder/decoder, the generator or the header file, syntax analyzer etc. based on the protocol grammars of Session Description Protocol supported by IETF RFC2327. For the sake of it, first describe the SDP BNF grammar based on IETF RFC2327 Augmented BNF. And then we produce the Abstract Syntax Tree, header file generator for encoding/decoding as applying the method of syntax directed to SDP protocol grammar.

  • PDF

Experiments on decision tree analysis for four-peg tower of Hanoi (4 개의 기둥을 가진 하노이의 탑에 대한 결정 트리 생성 실험)

  • Kang, Dae-Ki;Choi, Jae-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.171-172
    • /
    • 2011
  • In this research, we discuss the process of analyzing the solution of four-peg tower of Hanoi using protocol analysis technique, and of developing decision trees from the analyzed contents. For these, we design and implement a computer program that can simulate four-peg tower of Hanoi. The implemented program generates a certain regular-to-regular tower of Hanoi problem, let a user to solve the problem, and records the solution process. From the process by the implemented program and the recorded protocol, we can build the decision tree for the solution. We expect this research can contribute to find a non-optimal solution for n-peg tower of Hanoi.

  • PDF

Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism (HV-KEM을 이용한 생체 정보 기반 인증 프로토콜)

  • Seo, Minhye;Hwang, Jung Yeon;Kim, Soo-hyung;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.69-79
    • /
    • 2016
  • Biometric authentication is considered as being an efficient authentication method, since a user is not required to possess or memorize any other information other than biometrics. However, since biometric information is sensitive and could be permanently unavailable in case of revealing that information just once, it is essential to preserve privacy of biometrics. In addition, since noise is inherent in the user of biometric recognition technologies, the biometric authentication needs to handle the noise. Recently, biometric authentication protocols using fuzzy extractor have been actively researched, but the fuzzy extractor-based authentication has a problem that a user should memorize an additional information, called helper data, to deal with their noisy biometric information. In this paper, we propose a novel biometric authentication protocol using Hidden Vector Key Encapsulation Mechanism(HV-KEM) which is one of functional encryption schemes. A primary advantage of our protocol is that a user does not need to possess or memorize any additional information. We propose security requirements of HV-KEM necessary for constructing biometric authentication protocols, and analyze our proposed protocol in terms of correctness, security, and efficiency.

A Lightweight Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활 지원 시스템을 위한 경량 인증 프로토콜)

  • Yi, Myung-Kyu;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2017
  • Recent advances in healthcare technologies along with improved medical care have led to a steady increase in life expectancy over the past few decades. As a result, the world population is aging rapidly. Various researches have been carried out to provide information and communication technologies based solutions that enhance the well-being of elderly people and provide them with a well margin of independency in their daily life. Ambient assisted living can be defined as the use of information and communication technologies in a person's daily living and working environment to enable them to stay active longer, remain socially connected and live independently into old age. Since the information transmitted in ambient assisted living systems is very sensitive, the security and privacy of such data are becoming important issues that must be dealt with. In this paper, we propose a novel lightweight authentication protocol for the ambient assisted living systems. The proposed authentication protocol not only supports several important security requirements needed by the ambient assisted living systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Adaptive Error Control Based on Traffic Type and Channel Error Rate in Wireless ATM (무선 ATM에서의 트래픽 형태 및 채널 오율에 기반한 적응 오류 제어)

  • 김영웅;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1532-1538
    • /
    • 1999
  • In general, because error rate of wireless link is higher than that of wired link, DLC layer protocol for wired network with low error rate is not proper for wireless environments. In addition, the conventional DLC layer protocol for wireless network is optimized for the low-speed data service, so it is difficult to use conventional DLC protocol in the current mobile communication environments handing high-speed and multimedia services. Therefore, a DLC layer protocol that is suitable to current wireless communication environments is required. In this paper, we propose a novel error control scheme that supports a variety of traffic attribute and is applicable to high-speed and multimedia data service in WATM. The proposed scheme provides enhanced throughput performance for real-time traffic by using modified ASR ARQ without ACK and reduces loss rate by using FEC in the case of high error condition. Also, for non real-time traffic, the use of ASR ARQ without ACK enhances throughput performance and delay time is decreased by using FEC in the case of high error rate channel. As a result of simulation, the proposed scheme has better performance than conventional ASR ARQ protocol in view of delay and throughput.

  • PDF

Residential Gateway Design under Realtime Linux Environment (실시간 Linux 환경에서 상주형 게이트웨이의 설계)

  • Shim, Jang-Sup;Kim, Jong-Kyum;Jung, Soon-Key
    • The KIPS Transactions:PartA
    • /
    • v.11A no.1
    • /
    • pp.21-28
    • /
    • 2004
  • In this paper, we describe the study of residential gateway design and the implementation of its core functional features under the realtime linux environment. This Paper has also suggested the developing example of device driver that can execute the realtime linux with stability based on the recent research findings of which is related to the functions of existing realtime operating system for residential gateway, and explained methods that can further improve performance by analyzing the performance characteristics of the system. And as a result, it was able to suggest the possibility of effective implementation of residential gateway under the realtime linux environment in this paper.

Formal Analysis of the Security Protocol in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅환경에서 보안프로토콜의 정형적 분석)

  • Kim, Hyun-Seok;Lee, Song-Hee;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.493-496
    • /
    • 2006
  • 유비쿼터스 환경에서의 네트워킹은 장소나 시간에 제약없이 최상의 서비스를 받기 위한 편리성을 제공한다. 이에 RFID 기술은 이러한 유비쿼터스의 목적을 쉽게 달성할 수 있는 기술로 주목받고 있으며 많은 장점을 갖는 반면, 프라이버시 침해문제와 같은 보안적인 문제를 갖고 있다. 본 논문에서는 RFID 환경에서 안전하지 않은 Tag 나 Reader 기를 식별하는 기술인 보안프로토콜을 정형적 검증방법인 모델체킹을 이용하여 신뢰성있는 네트워크를 구축하고자 한다.

  • PDF