• Title/Summary/Keyword: IP-VPN

Search Result 119, Processing Time 0.043 seconds

A Real and Effective Multi-Videoconferencing Service Based on IP Networks (네트워크를 통한 실질적이고 효과적인 다자간 영상회의 서비스)

  • Kim, Sang-Hyun;Song, Jae-Phil;Sohn, Jin-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.478-481
    • /
    • 2008
  • 오늘날 비즈니스의 글로벌화, 사업장의 분산화는 필연적으로 영상회의의 활성화를 가져왔으나, 기 구축된 SD(Standard Definition)급 화질의 영상회의는 실감성 및 장시간 사용시 피로감 등에 따른 이용율 저조로 기대 만큼의 성화를 이루지 못하였다. 또한 기존 영상회의 시스템에서의 dec는 보조적 채널, 시스템 조작과 운영의 복잡성, 낮은 해상도로 인한 표정 및 눈짓 등의 요소 포착이 어려운 한계를 극복하지 못하였고, 기업들은 기업 내부 및 국내외 타기업들과의 협업을 위해 막대한 비용과 시간이 요구되고 있는 실정이다. KT는 기존 영상회의 문제 극복을 위해 서울<->대전 연구소간 전용선 연결, 비용 및 여러 site 확장을 위한 VPN으로의 전환 방안등 최상의 영상회의 구축을 위한 검토를 통해 Full HD실감 화질의 영상회의를 구축하였으며, 향후에는 Full HD 데이터 압축 기술 향상 및 데이터 전송 방안에 대한 더 많은 연구가 필요하다고 판단된다. 본 고에서는 KT에서 구축한 영상회의 사례를 중심으로 기본적인 기술과 구조, 국내외 시장의 현황 및 활용 방안에 대해 논하였다.

  • PDF

Reenforcement and Utilization Method of BigData Security (빅데이터 보안 강화 및 활용 방안)

  • Kang, Jung-Ku;Park, Seok-Cheon;Kim, Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1256-1259
    • /
    • 2013
  • 최근 데이터의 양이 기하급수적으로 증가하면서 빅데이터가 이슈가 되어 많은 관심을 받고 있는 현실이다. 현재 빅데이터의 기술은 데이터 추출과 이용에만 초점이 맞춰져 있어 보안에 취약한 시스템에 해킹시도가 있을 경우 개인과 기업에 막대한 피해가 발생될 수 있다. 따라서 본 논문에서는 빅데이터 보안에 초점을 두어 외부로부터 피해를 방지하고 안전하게 빅데이터 서버를 운영하는 방법을 제시한다. 즉, Iptable을 이용한 IP나 포트 허용 여부를 지정하고 가상사설망(VPN)을 이용하여 외부 접속을 방지하며 패스워드 강화를 통해 빅데이터 서버의 보안 강화 및 활용 방안을 제시하였다.

A Multibit Tree Bitmap based Packet Classification (멀티 비트 트리 비트맵 기반 패킷 분류)

  • 최병철;이정태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.339-348
    • /
    • 2004
  • Packet classification is an important factor to support various services such as QoS guarantee and VPN for users in Internet. Packet classification is a searching process for best matching rule on rule tables by employing multi-field such as source address, protocol, and port number as well as destination address in If header. In this paper, we propose hardware based packet classification algorithm by employing tree bitmap of multi-bit trio. We divided prefixes of searching fields and rule into multi-bit stride, and perform a rule searching with multi-bit of fixed size. The proposed scheme can reduce the access times taking for rule search by employing indexing key in a fixed size of upper bits of rule prefixes. We also employ a marker prefixes in order to remove backtracking during searching a rule. In this paper, we generate two dimensional random rule set of source address and destination address using routing tables provided by IPMA Project, and compare its memory usages and performance.

Transmission Performance Evaluation of MPR-based Wireless Communication System Applying for Disaster Investigation (재난조사 활용을 위한 MPR기반 무선통신 전송 성능 평가)

  • Kim, Seong Sam;Shin, Dong Yoon;Noh, Hyun Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.754-762
    • /
    • 2021
  • Seamless wireless communication network access technology enables users to guarantee service continuity. Hence, it is necessary for disaster situations in which network service may be interrupted. The Multi-path router is a technology to improve network stability and strengthen field operability, particularly in a disaster environment where network failure can occur by providing high-performance data transmission using multi-communication networks and network security by VPN-based wireless IP. In this paper, a prototype system for an MPR-based wireless communication network was proposed to improve the operation performance for disaster field investigation applications. A comparative experiment was performed on various data transmission performances with the existing single wireless communication network. In addition, another experiment was conducted by measuring the data packet transmission and receiving performance in the existing/new wireless communication system first and then assessing the UDP transmission performance in a single router environment to understand the transmission capability of the new MPR. The experimental results showed that the sending and receiving performance was improved by approximately double that of the existing single wireless communication system. The proposed prototype system is expected to allow users to share and disseminate collected on-site data more quickly and efficiently during a disaster site investigation.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

Next Generation Internet Based on Optical Switching Technology (광스위칭 기반 차세대 인터넷)

  • Hahm, J.H.;Kang, S.G.;Park, K.S.;Park, C.H.
    • Electronics and Telecommunications Trends
    • /
    • v.16 no.2 s.68
    • /
    • pp.10-30
    • /
    • 2001
  • 본 고에서는 차세대 인터넷 구축을 위한 요소 기술에 대하여 전반적으로 살펴본다. 우리는 현재보다 1,000배 빠른 차세대 인터넷의 구축을 목표로 하고 있다. 따라서 과연 그만큼 빠른 인터넷의 구축이 필요할 것인가를 검증하는 차원에서 향후 5년 정도의 가까운 시일 내에 있을 인터넷 트래픽의 증대에 대한 수요를 서비스 측면에서 살펴본다. 차세대 인터넷은 풍부한 전송대역폭의 제공과 QoS를 기반으로 한 신뢰성 있는 데이터의 전달을 특징으로 하며, 이를 위해서 광스위칭 기반의 전송 하부구조 위에 MPLS 기술이 사용될 것으로 예상된다. 이를 위한 요소기술로 DWDM 전송기술, MEMS 기반의 광스위칭 소자기술과 함께 광스위칭 기술에 지능을 부여하기 위한 표준화 동향에 대하여 살펴본다. 현재의 IP 기반 인터넷에서 제공하지 못하는 QoS 기능은 MPLS에서 가능하게 될 것이다. MPLS에서의 중요한 응용인 트래픽 엔지니어링과 VPN 서비스는 망이 보다 안정적으로 유지될 수 있도록 지원하면서 기업들이 MPLS 망을 이용하여 자신의 망을 구축할 수 있도록 지원할 것이다. MPLS 기술은 IETF에서 표준화가 진행되고 있으며 라우터 개발업체 및 ISP의 큰 지원을 받고 있다. 차세대 인터넷을 위해서는 전달망의 구축도 필요하지만 이와 함께 차세대 인터넷 응용을 위한 컴퓨팅 인프라도 균형있게 개발되어야 한다. 따라서 현재 그 윤곽을 드러내고 있는 차세대 인터넷 응용 인프라 환경에 대하여 그 등장 배경과 관련 기술에 대하여 조망한다. 차세대 인터넷의 개발을 위해서는 광처리 관련 원천 기술, 프로세서 개발 기술, 라우터 설계 기술 및 서버 개발 기술, 어플리케이션 기반 기술 및 사용자 인터페이스 기술들이 전략적으로 이음새 없이 매끄럽게 통합되어야 한다. 이러한 관점에서 필요한 요소기술들을 다수 보유하고 있는 ETRI의 역할은 매우 중요하리라 생각된다.

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF