• Title/Summary/Keyword: IP Media

Search Result 363, Processing Time 0.03 seconds

Current Status and Challenges of BGP Hijacking Security Threat (BGP 하이재킹 보안 위협 대응 현황 및 과제)

  • Han, Wooyoung;Hong, Yunseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1525-1530
    • /
    • 2022
  • BGP(Border Gateway Protocol) is a routing protocol that is actively used in inter-AS routing on the Internet. However, BGP routing protocol is vulnerable to BGP hijacking attacks that hijack the network by impersonating normal BGP sessions. BGP Hijacking attacks can lead to causing intercept IP traffic or interference with the normal service operation. Recently, BGP hijacking attacks, which have often occurred overseas, have also occurred in Korea. It means threatening the security of the Internet. In this paper, we analyze the overall process of attack through representative attack cases and virtual scenarios of BGP hijacking and based on the results of analyzing the application status of security technology to prevent BGP hijacking attacks by Korea and global major ISPs. It covers the technical proposal of ISPs and autonomous system operators should take to defend against BGP hijacking attacks.

Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection (Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.76-81
    • /
    • 2018
  • The Internet of Things (IoT), which is emerging as a future economic growth engine, has been actively introduced in areas close to our daily lives. However, there are still IoT security threats that need to be resolved. In particular, with the spread of smart homes and smart cities, an explosive amount of closed-circuit televisions (CCTVs) have been installed. The Internet protocol (IP) information and even port numbers assigned to CCTVs are open to the public via search engines of web portals or on social media platforms, such as Facebook and Twitter; even with simple tools these pieces of information can be easily hacked. For this reason, a big-data analytics system is needed, capable of supporting quick responses against data, that can potentially contain risk factors to security or illegal websites that may cause social problems, by assisting in analyzing data collected by search engines and social media platforms, frequently utilized by Internet users, as well as data on illegal websites.

A Scheme for Network Selection and Heterogeneous Handover in Hierarchical Wireless Multiple Access Networks with IMS (IMS를 포함한 계층적 무선 멀티 억세스 네트워크에서의 네트워크 선택 및 핸드오버 기법)

  • Moon, Tae-Wook;Kim, Moon;Cho, Sung-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.146-153
    • /
    • 2009
  • Recently, the research relative to NGN(Next Generation Network) is progressing in 3GPP(The 3rd Generation Partnership Progect), IETF(Internet Engineering Task Force), and so on. Although user needs frequently mobility which is various service pattern, In accordance with the development of these various applications, IMS(IP Multimedia Subsystem) and hierarchical networks ie, Femtocell/WiBro/3G etc is constructed for more user demands which provide service in anytime, anywhere. It is necessary to optimum network selection criterion which consider to wireless signal quality add to user service profile and service network traffic balance. NGN also needs a method to perform heterogeneous handover and to constraint Ping-pong phenomenon when using existing terminal-based handover decision. This paper proposes scheme for network selection and heterogeneous handover procedure in hierarchical wireless multi-access network based on SIP-MIH(Session Initiation Protocol-Media Independent Handover) with IMS by using user service profile that the considerations are dealing with not only selection and registration of various access network but also easy of developing the terminal.

P2P-based Mobility Management Protocol for Global Seamless Handover in Heterogeneous Wireless Network (이기종망에서 글로벌 끊김 없는 핸드오버를 위한 P2P 기반 이동성 관리 프로토콜)

  • Chun, Seung-Man;Lee, Seung-Mu;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.73-80
    • /
    • 2012
  • In this article, we propose a P2P-based mobility management protocol for global seamless handover in heterogeneous wireless networks. Unlike previous mobility management protocols such as IETF MIPv4/6 and its variants, the proposed protocol can support global seamless handover without changing the existing network infrastructure. The idea of the proposed protocol is that the location management function for mobility management is separately supported from packet forwarding function, and bidirectional IP tunnels for packet transmission are dynamically constructed between two end-to-end mobile hosts. In addition, early handover techniques have been developed to avoid large handover delays and packet losses using the IEEE 802.21 Media Independent Handover functions. The architecture and signaling procedure of the proposed protocol have been designed in detail, and the mathematical analysis and simulation have been done for performance evaluation. The performance results show that the proposed protocol outperforms the existing MIPv6 and HMIPv6 in terms of handover latency and packet loss.

Design and Implementation of user centric pavilion information guide system based on commercial mobile device (모바일 기기 기반 사용자 중심형 전시관 정보 안내 시스템의 설계 및 구현)

  • Yun Hyun-Joo;Bu So-Young;Choi Yoo-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.187-199
    • /
    • 2006
  • This paper proposes the design of user centric pavilion information guide system based on mobile device such as PDA. which is composed of system interface factors as user wants. The suggested information guide system is convenient for user carrying because it is based on PDA mobile device and the used liquid browser system makes all data information displayed on a small screen in contrast with the other browser system. Indeed, factors of system interface can be re-composed by user interaction. And this system can effectively provide the detail information about the exhibited objects as various media data such as text, image, voice, music, video etc. The proposed system is made up of media database server. mobile system control server and mobile system interface which accepts user interaction and displays the information. Each system is networked based on TCP/IP and uses XML (extensible Markup Language) and JAVA 2 micro edition to be able to update data. This feature enhances a wide use to be able to load this system on the any mobile device.

  • PDF

A Study on Users' Perception on the Reallocation of 700MHz Spectrum After Digital Transition of Terrestrial Broadcasting (지상파 방송의 디지털 전환 완료 이후 700MHz대역 주파수 재배치에 대한 이용자 인식 연구)

  • Lee, Yeong-Ju;Park, Sung-Kyu;Choi, Seong-Jin
    • Journal of Broadcast Engineering
    • /
    • v.17 no.6
    • /
    • pp.1080-1090
    • /
    • 2012
  • This study investigates the users' preference of frequency reallocation and frequency auction after digital transition of terrestrial broadcasting and it focuses on the relationships between media using pattern, reception environment of broadcasting telecommunication, and expectation for the universal service and requirement for the public interest. The results show that the longer DMB viewing hours, people prefer to frequency allocation for the telecommunication side. The technical aspects such as perception on the reception environment of broadcasting don't make effect on the users' preference of frequency allocation. In addition, the more people think the universal service of terrestrial broadcasting important, the more people think it unnecessary to adopt auction system to the broadcasting frequency. These results give implication that it is the most basic condition to improve the reception environment in order to accomplish universal service duty of terrestrial broadcasting.

Zika Virus on YouTube: An Analysis of English-language Video Content by Source

  • Basch, Corey H.;Fung, Isaac Chun-Hai;Hammond, Rodney N.;Blankenship, Elizabeth B.;Tse, Zion Tsz Ho;Fu, King-Wa;Ip, Patrick;Basch, Charles E.
    • Journal of Preventive Medicine and Public Health
    • /
    • v.50 no.2
    • /
    • pp.133-140
    • /
    • 2017
  • Objectives: The purpose of this study was to describe the source, length, number of views, and content of the most widely viewed Zika virus (ZIKV)-related YouTube videos. We hypothesized that ZIKV-related videos uploaded by different sources contained different content. Methods: The 100 most viewed English ZIKV-related videos were manually coded and analyzed statistically. Results: Among the 100 videos, there were 43 consumer-generated videos, 38 Internet-based news videos, 15 TV-based news videos, and 4 professional videos. Internet news sources captured over two-thirds of the total of 8 894 505 views. Compared with consumer-generated videos, Internet-based news videos were more likely to mention the impact of ZIKV on babies (odds ratio [OR], 6.25; 95% confidence interval [CI], 1.64 to 23.76), the number of cases in Latin America (OR, 5.63; 95% CI, 1.47 to 21.52); and ZIKV in Africa (OR, 2.56; 95% CI, 1.04 to 6.31). Compared with consumer-generated videos, TV-based news videos were more likely to express anxiety or fear of catching ZIKV (OR, 6.67; 95% CI, 1.36 to 32.70); to highlight fear of ZIKV among members of the public (OR, 7.45; 95% CI, 1.20 to 46.16); and to discuss avoiding pregnancy (OR, 3.88; 95% CI, 1.13 to 13.25). Conclusions: Public health agencies should establish a larger presence on YouTube to reach more people with evidence-based information about ZIKV.

A Handover Scheme for Seamless Service Support between Wired and Wireless Networks over BcN (BcN 환경에서 유선망과 무선망간의 끊김없는 서비스를 지원하기 위한 핸드오버 절차)

  • Yang, Ok-Sik;Choi, Seong-Gon;Choi, Jun-Kyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.799-808
    • /
    • 2005
  • This paper proposes low latency handover procedure for seamless connectivity and QoS support between wired (e.g. Ethernet) and wireless (e.g. WLAN, WiBro(802.16-compatible), CDMA) networks by the mobile-assisted and server-initiated handover strategy. It is assumed that the server decides the best target network considering network status and user preferences. In this algorithm a mobile terminal associates with the wireless link decided at the server In advance and receives CoA as well. When handover occurs without the prediction in wired networks, the server performs fast binding update using physical handover trigger through the MIH(media independent handover) function. As a result, a mobile terminal does not need to perform L2 and L3 handover during handover so that this procedure decreases handover latency and loss.

Fingerprint-Based 1-out-of-n Access Control Technique for Media Service Protection in IPTV Broadcasting System (IPTV의 미디어 서비스 보호를 위한 지문 인식 기반의 1-out-of-n 접근 통제 기법)

  • Lee, Ji-Seon;Rhee, Hyun-Sook;Kim, Hyo-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.687-694
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an emerging technology in which telecommunication and broadcasting technologies are converged. IPTV service providers usually multicast scrambled contents. And only legitimate subscribers who pass the access control can de-scramble and use the contents. In order to ensure revenues, providers oftentimes employ password-based authentication protocols that ensure secure authentication processes between set-top box and smart card. In this paper, we propose a fingerprint-based 1-out-of-n authentication protocol which provides convenient and more secure authentication process in some organizational environments. The proposed scheme shows that only those who provide legitimate fingerprint information can be authenticated even in a situation that both password and smart card are compromised.

A Handover Procedure for Seamless Service Support between Wired and Wireless Networks (유선망과 무선망간의 끊김없는 서비스를 지원하기 위한 핸드오버 절차)

  • Yang, Ok-Sik;Choi, Seong-Gon;Choi, Jun-Kyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.45-52
    • /
    • 2005
  • This paper proposes low latency handover procedure for seamless connectivity and QoS support between wired (e.g. Ethernet) and wireless (e.g. WLAN, WiBro(802.16-compatible), CDMA) networks by the mobile-assisted and server-initiated handover strategy. It is assumed that the server decides the best target network considering network status and user preferences. In this procedure, a mobile terminal associates with the wireless link decided at the server in advance and receives CoA as well. When handover occurs without the prediction in wired networks, the server performs fast binding update using physical handover trigger through the MIH (media independent handover) function. As a result, a mobile terminal does not need to perform L2 and L3 handover during handover so that this procedure decreases handover latency and loss.