• Title, Summary, Keyword: MAC Address

Search Result 95, Processing Time 0.032 seconds

Extended FDB Application Algorithm Proposal for Overlap VLAN Implementation (중첩 VLAN구현을 위한 확장 FDB적용 알고리즘 제안)

  • 황인섭;공휘식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.84-88
    • /
    • 2001
  • Security and degradation by broadcast is the most important part that must handle in LAN. Virtual LAN can improve LAN's degradation by method to form and manages network group logically. MAC Address VLAN algorithm that propose in this research give overlap special qualify to VLAN adding extension VID field and VID connection extent table to FDB, manage overlap extent dynamically. VLAN that apply this proposal algorithm can share information and resource in network without additional equipment. Application is possible switch or Bridge that this algorithm achieves Layer 2 functions.

  • PDF

An ARP-disabled network system for neutralizing ARP-based attack

  • Battulga, Davaadorj;Jang, Rhong-Ho;Nyang, Dae-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • /
    • pp.234-237
    • /
    • 2016
  • Address Resolution Protocol (ARP) is used for mapping a network address to physical address in many network technologies. However, since ARP protocol has no security feature, it always abused by attackers for performing ARP-based attacks. Researchers presented many technologies to improve ARP protocol, but most of them require a high implementation cost or scarify the network performance for using ARP protocol securely. In this paper, we present an ARP-disabled network system to neutralize the ARP-based attacks. "ARP-disabled" means suppress the ARP messages like request, response and broadcast messages, but not the ARP table. In our system, ARP tables are used for managing static ARP entries without prior knowledge (e.g. IP, MAC list of client devices). This is possible because the MAC address was designed to be derived from IP address. In general, our system is safe from the ARP-based attacks even the attacker has a strong power. Moreover, we saved network bandwidth by disabling the ARP messages.

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.

ARP spoofing attack and its countermeasures (도메인 네임 스푸핑 공격과 그 대응책)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.1
    • /
    • pp.47-53
    • /
    • 2014
  • DNS spoofing, the DNS server with the address of a specific web server intercepts them in the process of translating the attacker wants to forge a Web server that is a way to access. ARP spoofing ARP request and response messages for the protocol without authentication vorticity incorrect information as to the ARP Cache Table to store the MAC addresses of their vulnerability using the MAC address of the other computer as if it were a lie technique. These DNS / ARP spoofing attacks in detail to find out about how it looks at ways to prevent. Think about the future research directions.

  • PDF

A Study of Indirect Attack Method with Interlocked Proxy Server in Foreign Country (해외에서 Proxy Server를 연동한 우회적인 공격기법 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.432-435
    • /
    • 2011
  • Hacking 공격자에 대한 수사실무에서는 Proxy Server를 연동한 해외에서의 우회공격에 대한 기법과 기술을 알아야 MAC address 또는 Real IP에 대한 역추적이 가능하다. 즉 Proxy Server를 여러 번 거치면서 자신의 Real IP를 숨기고 ARP Spoofing 기법을 사용하여 MAC address를 속이기 때문이다. 본 논문에서는 해외에서의 해킹 공격자들이 어떻게 공격자의 Real IP를 숨기고, ARP Spoofing 기법을 응용하여 공격을 시도하는 기법과 기술을 연구한다. 또한 Proxy Server를 통한 우회공격에서 ARP Spoofing 공격을 보안하는 방법을 연구한다. 본 논문 연구가 해외로 부터의 Hacking과 방어를 위한 기술 발전에 기여 할 것 이다.

  • PDF

Implementation of Security Algorithm to Preserve Copyright of Education Contents (학원 교육 콘텐츠 S/W 저작권 보호를 위한 알고리즘 구현)

  • Kang, Min-Jae;Pyoun, Do-Kil;Cheong, Sang-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.324-326
    • /
    • 2011
  • As development of education contents has become more active, it is not much that way to preserve copyright of S/W consuming contents. So this paper studied way to preserve copyright of S/W from MAC address of ethernet and hard disk volume serial number. This study realizes the simple but powerful security algorithm to preserve copyright. So this tightens to preserve copyright of S/W of education contents and will contributes to decrease damages because of using illegal S/W.

  • PDF

A Study on Asynchronous MAC Protocol with Dynamic Preamble Length in Wireless Sensor Networks (WSN에서 프리앰블 다이나믹을 이용한 비동기 MAC 프로토콜 연구)

  • Han, Hyeon-Ho;Hong, Yeong-Pyo;Lee, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3563-3570
    • /
    • 2010
  • MAC protocol has been studied for reducing energy consumption in wireless sensor networks. The overhearing and idle In the existing asynchronous MAC Protocol will occur due to unnecessary energy consumption. In this paper, to solve these problems, the Preamble to change the structure of the destination address, the Preamble of the end times, the data including the length of the Preamble and Data Overhearing reduce the length of the Check Interval Data generated according to the presence of the Dynamic Value dynamically adjustable by changing the DPL (Dynamic Preamble Length)-MAC protocol was proposed. Moreover, the existing asynchronous MAC protocol of wireless sensor networks and DPL-MAC protocol proposed in this paper to simulate the energy consumption and latency were assessed in terms of comparative analysis.

Light Medium Access Control (MAC) Protocol for Wireless Universal Serial Bus (WUSB)

  • Kim, Jun-Whan;Huh, Jea-Doo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • /
    • pp.199-201
    • /
    • 2005
  • USB has arguably become the most successful PC peripheral interconnect ever defined. As appearing UWB, wireless USB (WUSB) emerges very popular technology. However, the distributed Medium Access Control (MAC) does not harmonize with the topology of WUSB. In this paper, we address a novel MAC protocol for conformity with WUSB. The protocol is to handle negotiation on Distributed Reservation Protocol (DRP) including the channel time slot of WUSB.

  • PDF

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Implementation of the Passenger Positioning Systems using Beacon (Beacon을 활용한 선박 탑승자 위치확인 시스템의 구현)

  • Jeong, Seon-Jae;Yim, Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.153-160
    • /
    • 2016
  • In this paper, we propose a system that tracks the position of the passengers and sailors using a Bluetooth-based Beacon in the ship. The position of the tracking passengers, sometimes fatal emergencies of the rescue team, such as the sinking of the ship is utilized in order to efficiently and quickly rescue the passengers, and the collected data can be utilized additionally by grasping the flow of human traffic patterns. The system proposed in this paper, install MAC data acquisition called AP (Access Point) for each cabin, and in the installed AP retrieves Tag of the information provided to the passenger and collected. A Tag has only its own MAC Address to the privacy, no user information is not collected. All data communication by sending and receiving MAC Address was only to ensure anonymity.