• Title/Summary/Keyword: IP Security

Search Result 747, Processing Time 0.028 seconds

Policy-Based QoS Control Management System for VoIP Service (VoIP 서비스를 위한 정책 기반의 QoS 제어 관리 시스템)

  • Cho, Bong-Kwan;Jung, Jae-Il
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.69-75
    • /
    • 2010
  • At present, deterioration in service quality, which caused by increased network traffic from a lot of users in the same network, makes smooth communication service difficult. In this paper, we present policy-based QoS management system for VoIP service in order to supply smooth VoIP service to users. The presented system can guarantee quality of VoIP service even in huge traffic situation, and makes it possible to operate whole network in an efficient manner.

A Study on Preventing SA Re-negotiation for Mobility Support in Mobile IP VPN Environment (모바일 IP VPN 환경에서의 이동성 지원에 따른 SA 재협상 방지에 관한 연구)

  • 차정석;김태윤;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.891-898
    • /
    • 2003
  • In the remote access VPN architecture which is based on IPsec, if the VPN client wants to be served the VPN service continuously during VPN client's handoff, It needs the techniques to merge VPN with Mobile IP. In this case, if the VPN client roams to new subnet, it acquires new CoA. As a result of changing IP address, existing SA becomes useless and new SA is required. The SA renegotiation process results from handoff of the VPN client and does not result from security aspect. Hence, In the environment which includes many handoffs, overhead by SA re-negotiation deteriorates performance. In this paper, we propose the technique provides that it doesn't need to renegotiate SA and be able to get the security service continuously even though MN's handoff occurs in Mobile IP VPN environment.

A Study on Security for IPv6 and ATM (IPv6및 ATM에서의 보호에 관한 연구)

  • 박영호
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.29-38
    • /
    • 2002
  • This paper presents IPv6, ATM, and IP/ATM security systems for computer network. IPv6 uses authentication header and ESP to provide security services. Authentication header provides integrity and authentication services and ESP provides integrity, authentication and confidentiality services. User plan of ATM provides authentication, integrity, confidentiality and access control services and control plan of ATM provides authentication and integrity services. IP/ATM security services are also presented.

  • PDF

A Scalable and Practical Authentication Protocol in Mobile IP (Mobile IP에서 확장성과 실용성 있는 인증 프로토콜 제안 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.35-44
    • /
    • 2005
  • In Mobile IP protocol, because a mobile node still uses its home IP address even though it moves to foreign network from home network, authentication among mobile node, foreign network and home network is critical issue. Many researches about this issue have been based on shared secret, for example mobile node and home agent authenticate each other with pre-shared symmetry key. And they missed several security issues such as replay attack. Although public key scheme could be applied to this issue easily, since the public key cryptography is computationally complicated, it still has the problem that it is not practical to realistic environment. In this paper, we describe several security issues in Mobile IP protocol. And we propose new Mobile IP authentication protocol that is applicable to realistic environment using public key algorithm based on certificate. It has scalability for mobile nodes and is applicable to the original Mobile IP protocol without any change. Finally we prove security of the proposed protocol and that it might not affect performance of the original Mobile IP protocol.

A Study of IP Spoofing Attack and Defense Through Proxy Server (Proxy Server를 통한 IP Spoofing 공격과 방어 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.281-284
    • /
    • 2010
  • The characteristics of International Hacking is that because even if with tracing techniques, nobody can find Real IP address of the attacker so it is true that Great difficulty in the investigation. so that an attacker goes through the Proxy Server Many times and they use techniques of IP Spoofing to hide their IP address. In this paper, study How attackers use IP Spoofing Technique and the application of Proxy Server. In addition, to Propose IP Spoofing attacks through the Proxy Server attack and defend methods also IP traceback methods so this study materials will contribute to the development of International Hacking and Security Protection Technology.

  • PDF

Security Solution and Threats Analysis in the ATM based IP Network (ATM 기반 IP 네트워크에서의 위협요소 분석 및 보호방법)

  • 김도완;김기현;한치문
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.89-92
    • /
    • 1999
  • This paper describes on the threats such as IP spoofing, denial of service, and ILMI based attack etc. for IP over ATM network. Especially we discuss on the threats due to ATM characteristics that are VC stealing, multiparty and multi-connection call. Also we investigate on the threats of ATM based MPLS network. Finally we discuss and suggest the various solutions of ATM security.

  • PDF

Impact of Cryptographic operations on the QoS of VoIP system (암호화 연산에 따른 VoIP QoS 측정 및 분석)

  • 홍기훈;임범진;정수환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.223-227
    • /
    • 2001
  • 보안을 위한 암호화는 실시간 통신인 VoIP에 패킷의 추가적인 작업이 요구되므로 음질에 악영향을 미치게 된다. 이러한 영향을 파악하고 분석하기 위해 DES, 3DES, SEED 그리고 AES 등의 암호 알고리즘을 VoIP 시스템에 적용하여 지터나 RTT 혹은 패킷 손실율과 같은 QoS 요소를 측정함으로써 각 암호 알고리즘의 연산이 실시간 통신에 미치는 영향을 알아보았다.

  • PDF

IPSec VPNs vs. SSL VPNs

  • 윤재호;권태경;천동현;임선간
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.24-30
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있다. 그러나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹보안프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 IPSec VPN과 SSL VPN의 차이점의 분석하여 정리하고자 한다.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Implementation of Secure VoIP System based on H.235 (H.235 기반 VoIP 보안 시스템 구현)

  • 임범진;홍기훈;정수환
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.241-245
    • /
    • 2001
  • 인터넷 서비스와 함께 발달한 멀티미디어 서비스 중 각광받고 있는 VoIP 서비스는 유선 전화보다 저렴한 가격을 바탕으로 하여 호황을 누리고 있다. 그러나 인터넷을 전송망으로 이용하는 VoIP는 개인의 암호화되지 않은 음성데이터의 도청이 쉽게 이루어질 수 있을 뿐만 아니라 사용자 및 서비스 업자에 대한 인증 방법 부재로 인한 불법 이용이 예상되는 등 보안적 문제점을 가지고 있다. 그에 따른 VoIP 서비스의 보안 요구사항은 계속 증가하고 있으며 이에 대한 연구 노력이 시급하다. 본 논문에서는 ITU에서 제안한 H.323 VoIP의 보안 프로토콜인 H.235에 대하여 연구하고 이를 구현한 VoIP 보안 시스템을 구축하여 VoIP 보안 프로토콜의 요구 사항 및 방향을 제시하였다.

  • PDF