• Title/Summary/Keyword: Information sender

Search Result 351, Processing Time 0.026 seconds

System Design of IDS for DDoS Detect and Defense (DDoS공격감지 및 방어를 위한 침입방지 시스템의 설계)

  • Hong, Seong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6845-6848
    • /
    • 2014
  • This paper proposes a system design of IDS for detecting and defending against DDoS attacks on a network. The proposed system has three parts; the Alert, Attack Analyzer and Defense agent. When the server resource was reduced too much by incoming traffic, the Alert Agent sends message and traffic information to the Attack Analyzer. The message and traffic to the Attack analyzer include only the sender & receiver address and packet numbers for minimizing the overload of Attack Analyzer. Message Received Attack Analyzer investigates the Message. If the pattern of traffic is the same as the DDoS Style, the Analyzer sends a message to the Defense Agent to block that traffic. In this system, at the serious state of the server-down, the Attack analyzer uncovers the DDoS Attacker and send a message to the Defense Agent to block that traffic. This works for server reactivation as soon as possible.

Visual expression technique analysis of motion graphic by media for emotion communication (감성전달을 위한 매체별 모션그래픽의 시각적 표현기법 분석)

  • Yun, Hwang-Rok;Kyung, Byung-Pyo;Lee, Dong-Lyeor
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.921-926
    • /
    • 2009
  • After the scientific development of human history, numerous images have been developed and expanded in digital media as a communication tools. Image digital media make communication closer between sender and receptor. The image digital media which has been developed with the change of technology and media transformation have shortened visual information transportation and the time as well by combining the sense of visual and audio. Motion graphic field has been emerged as the type of image digital media development. The development of motion graphic make possible for the expressive effect and dynamic image technique which is impossible by the existing media type. Especially, it is applied to various field such as the title of movie, TV program, and advertise or music video etc. These image expression techniques are stimulating acceptor's emotion to take a role of emotion communication function also. This study aims to find the characteristics motion graphic of which how influence as an effective communication tool as important role to the receptors, and the examine the effect and application of motion graphic to the receptors as a emotion communication tool by case study.

  • PDF

An Effective Solution to Overcome the Restriction of SACK Blocks' Number in TCP SACK (오프셋을 활용한 효율적인 TCP SACK 메커니즘)

  • Lin, Cui;Hong, Choong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1039-1046
    • /
    • 2005
  • TCP SACK is the unique mechanism to reflect the situation of sink's sequence space, some TCP variants and proposals can perform in conjunction with SACK mechanism for achieving optimal performance. By definition of RFC 2018, however, each contiguous block of data queued at the data receiver is defined in the SACK option by two 32-bit unsigned integers in network byte order. Since TCP Options field has a 40-byte maximum length, when error bursts now, we note that the available option space may not be sufficient to report all blocks present in the receiver's queue and lead to unnecessarily force the TCP sender to retransmit Packets that have actually been received by TCP sink. For overcoming this restriction, in this thesis, a new solution named 'one-byte offset based SACK mechanism' is designed to further improve the performance or TCP SACK and prevent those unwanted retransmissions. The results or both theory analysis and simulation also show that his proposed scheme operates simply and more effectively than the other existing schemes by means of the least bytes and most robust mechanism to the high packet error rates often seen in networks environment.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

Data Origin Authentication Scheme for Wireless Mesh Networks (무선 메쉬 네트워크를 위한 데이터 송신 인증 기술)

  • Kang, Nam-Hi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.135-142
    • /
    • 2010
  • Wireless mesh network, which is an access network technology, adopts ubiquitous features of ad-hoc network that includes capabilities of self-configuration and self-management. This paper proposes a scheme which enables nodes along route in wireless mesh network to authenticate data and verify data integrity. The scheme distinguishes infra-node, which is a network device used to form mesh network, and user node in ad-hoc network, which operates functions as a sender, receiver or relayer, to deploy different authentication scheme. That is, hop-based authentication scheme along route forming wireless backbone differs from authentication scheme for user nodes in route over MANET. The proposed scheme is less complex than previously proposed schemes from the repects of security setup procedures and managements. In addition, the scheme is able to reduce transmission delay from a source to a destination owing to fast authentication over wireless backbone.

Design of the Encryption/Decryption System in the Embedded Environment for Video Contents Protection (비디오 콘텐츠 보호를 위한 임베디드 환경에서의 실시간 암/복호화 시스템 설계)

  • Yun, Byung-Choon;Lee, Dong-Hoon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.71-80
    • /
    • 2011
  • According to rapid development of communication and video compression technology, the video contents are easily disseminated into various areas. In order to prevent illegal distribution of video contents, the necessity of video contents protection technology is increased. In this paper, we propose the video encryption and decryption algorithm based on logistic map and design the prototype system in real-time embedded environment. The sender system with encryption capability is implemented on DM642 EVM target board and the receiver system with decryption capability is implemented in satellite D-STB. Experimental results show that the time change ratio of encoding process on target board are less than 0.97% and the time change ratio of the decoding process on D-STB is less than 1.75%. So, we verify that the proposed encryption/decryption system can be used in real time application.

MOERS: An Eager Replication Scheme using Extended Messaging Order of Group Communication (MOERS: 그룹 통신의 메시징 순서를 확장한 즉시 갱신 중복 기법)

  • Mun, Ae-Gyeong;Nam, Gung-Han;Jo, Haeng-Rae
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.502-512
    • /
    • 2002
  • Most of previous replication schemes assume lazy schemes, which asynchronously propagate replica updates to other nodes after the updating transaction commits. While lazy schemes are novel in the sense that they can resolve high deadlock frequencies of eager schemes, they suffer from the fact that users should be responsible for the data consistency. Recently replication schemes based on the messaging order of group communication have been studied. They can reduce the deadlock frequencies using the messaging order, but they have another problem of increasing execution overhead of aborted transactions at high degree of concurrency. This is because the sender node validates global serializability after multicasting replica update messages to other nodes. In this paper, we propose an efficient eager replication scheme for reducing the number of messaging and overhead of aborted transactions significantly. The proposed scheme validates any conflicts before multicasting and does not multicast when there is any conflict; hence, it can exploit performance improvement by alleviating the message traffic for replica update or by reducing the number of disk accesses and locking delay due to aborted transactions.

Performance Improvement Methods of Multicast using FEC and Local Recovery based on Sever in Mobile Host (이동 호스트에서 FEC와 서버기반 지역복구를 이용한 멀티캐스트 성능 향상 방안)

  • Kim, Hoe-Ok;Yang, Hwan-Seok;Lee, Ung-Gi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.589-596
    • /
    • 2002
  • Tn the data transmission service of the mobile host, it is needed to reduce the bandwidth and to make a reliable error recovery. there are two appropriate methods in that. One is FEC which retransmits the parity of error recovery, in case of happening of the loss after forming the parity of error recovery by grouping original data. The other is local recovery based on server which can block the implosion of transmission. The use of FEC and local recovery based on server at the same time enables the reliable multicast. This paper suggests algorithm that recovers the loss by FEC and local recovery based on server through the solution of the problems about triangle routing, tunnel convergence by dividing mobile host into two parts-the sender and the receiver. This model about the loss of algorithm tested the efficiency of performance by the homogeneous independent loss, the heterogeneous independent loss, the shared source link loss model. The suggested algorithm confirms effectiveness in the environment where there are much data and many receivers in mobile host.

MOERS : An Eager Replication Scheme using Extended Messaging Order of Group Communication (MOERS : 그룹 통신의 메시징 순서를 확장한 즉시 갱신 중복 기법)

  • Mun, Ae Gyeong;Nam, Gung Han;Jo, Haeng Rae
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.500-500
    • /
    • 2002
  • Most of previous replication schemes assume lazy schemes, which asynchronously propagate replica updates to other nodes after the updating transaction commits. While lazy schemes are novel in the sense that they can resolve high deadlock frequencies of eager schemes, they suffer from the fact that users should be responsible for the data consistency. Recently replication schemes based on the messaging order of group communication have been studied. They can reduce the deadlock frequencies using the messaging order, but they have another problem of increasing execution overhead of aborted transactions at high degree of concurrency. This is because the sender node validates global serializability after multicasting replica update messages to other nodes. In this paper, we propose an efficient eager replication scheme for reducing the number of messaging and overhead of aborted transactions significantly. The proposed scheme validates any conflicts before multicasting and does not multicast when there is any conflict; hence, it can exploit performance improvement by alleviating the message traffic for replica update or by reducing the number of disk accesses and locking delay due to aborted transactions.

A Study on Children′s Picture Book as a Communication Medium (커뮤니케이션 매체로서 어린이 그림책에 대한 연구)

  • 박경희
    • Archives of design research
    • /
    • v.14 no.1
    • /
    • pp.7-16
    • /
    • 2001
  • Human beings have been leading their life and desirable social life through communication. Human communication has been changed and expanded through language, letters, printing media, broadcasting media, and more recently network communication media. Since the invention of characters, books have been the human beings' communication medium that have the longest history, and they have preserved and succeeded human spiritual world. Children's picture books are also a communication medium composed of the transmitter of the information, message, medium, and the receiver, and makes the process of communication. The sender: writer, illustrator, and editor, analyzes children, special receiver, symbolizes messages, make up contents and make communication come true by selecting media and effectively delivering them to children. Considering the developmental characteristics of the receiver, children and their desires, visual media such as the writings and illustrations. The writings and illustrations are the most appropriate for communication with children. The first, picture books are for the communication between grown-ups and children, and also that with society for helping children find their identity and perform their roles. The second, through the message of writings and illustrations young children acquire human communication ability of this age. That is, they experience and learn visual communication and letter communication

  • PDF