• Title/Summary/Keyword: Network Filtering

Search Result 553, Processing Time 0.027 seconds

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

A construction of fuzzy controller using learning (학습을 이용한 퍼지 제어기의 구성)

  • 안상철;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.484-489
    • /
    • 1992
  • The inference of fuzzy controller can be considered a mapping from the controller input to membership value. The membership value, a kind of weight, has a role to decide if the input is appropriate to the rule. The membership function is described by several values, which are decided by a learning method. The learning method is adopted from adaptive filtering theory. The simulation shows the proposed fuzzy controller can learn linear and nonlinear functions. the structure of the proposed fuzzy controller becomes a kind of neural network.

  • PDF

Design and Implementation of Network Traffic Filtering System (네트워크 트래픽 필터링 시스템의 설계 및 구현)

  • 김민수;김성조
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.269-271
    • /
    • 2000
  • 인터넷의 속도가 점차 빨라지고 대역폭이 증가함에도 불구하고 네트워크 대역폭은 여전히 부족한 자원이다. 이는 네트워크 속도가 빨라짐에도 불구하고 그 만큼 이를 모두 활용하는 어플리케이션이 계속 개발되어 사용되기 때문이다. 기업 차원에서는 주요한 자산인 네트워크 대역폭을 효율적으로 활용하는 것이 매우 중요하며, 개인 차원에서는 미성년들이 유해한 정보에 노출되는 것을 방지하는 것이 필요하다. 본 논문에서는 이러한 필요성에 따라 네트워크 트래픽을 분석하고, 이를 바탕으로 관리 정책에 따라 네트워크 트래픽을 필터링하는 시스템을 설계하고 이를 구현하였다.

  • PDF

Design of Sensor Network Security Model using Contract Net Protocol and DEVS Modeling (계약망 프로토콜과 DEVS 모델링을 통한 센서네트워크 보안 모델의 설계)

  • Hur, Suh Mahn;Seo, Hee Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In order to reduce damage from these attacks, several security solutions have been proposed. Researchers have also proposed some techniques to increase the energy-efficiency of such security solutions. In this paper, we propose a CH(Cluster Header) selection algorithm to choose low power delivery method in sensor networks. The CNP(Contract Net Protocol), which is an approach to solve distribution problems, is applied to choose CHs for event sensing. As a result of employing CNP, the proposed method can prevent dropping of sensing reports with an insufficient number of message authentication codes during the forwarding process, and is efficient in terms of energy saving.

Neural Network-based Real-time End Point Detection Specialized for Accelerometer Signal (신경망을 이용한 실시간 가속도 신호 끝점 검출 방법)

  • Lim, Jong-Gwan;Kwon, Dong-Soo
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.178-185
    • /
    • 2009
  • A signal processing algorithm is proposed for end point detection which is used commonly in accelerometers-based pattern recognition problem. In the conventional method, end points are detected by manual manipulation with an additive button or algorithm based on statistical computation and highpass filtering to cause critical time delay and difficulty for parameters optimization. As an solution, we propose a focused Time Lagged Feedforward Network(TLFN) with respect to a differential signal of acceleration, which is widely applied for time series forecasting. The simple experiment is conducted with handwriting and the detection performance and response characteristic of the proposed algorithm is tested and analyzed.

  • PDF

Neural-network-based Impulse Noise Removal Using Group-based Weighted Couple Sparse Representation

  • Lee, Yongwoo;Bui, Toan Duc;Shin, Jitae;Oh, Byung Tae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3873-3887
    • /
    • 2018
  • In this paper, we propose a novel method to recover images corrupted by impulse noise. The proposed method uses two stages: noise detection and filtering. In the first stage, we use pixel values, rank-ordered logarithmic difference values, and median values to train a neural-network-based impulse noise detector. After training, we apply the network to detect noisy pixels in images. In the next stage, we use group-based weighted couple sparse representation to filter the noisy pixels. During this second stage, conventional methods generally use only clean pixels to recover corrupted pixels, which can yield unsuccessful dictionary learning if the noise density is high and the number of useful clean pixels is inadequate. Therefore, we use reconstructed pixels to balance the deficiency. Experimental results show that the proposed noise detector has better performance than the conventional noise detectors. Also, with the information of noisy pixel location, the proposed impulse-noise removal method performs better than the conventional methods, through the recovered images resulting in better quality.

Design and Implementation of Interworking Gateway with QoS Adaptation (QoS 적응 기능을 갖는 연동 게이트웨이의 설계 및 구현)

  • Song, Byeong-Hun;Choe, Sang-Gi;Jeong, Gwang-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.619-627
    • /
    • 1999
  • To support multimedia services between network domains with different environments, it is required to map the functionalities in many aspects. In this paper, we implemented interworking gateway which provides protocol conversion and QoS(Quality of Service) adaptation to interwork DAVIC services based on ATM(Asynchronous TRansfer Model )network and Internet AV services. The interworking gateway converts RTSP(Real-Time Streaming Protocol ) message into DSM-CC(Digital Storage Media Command & Control) messages to control the stream that is served in ATM network, and transmits data stream by using RTP(Real-Time Transport Protocol) The interworking gateway provides QoS adaptation functionalities by QoS monitoring and MPEG filtering to meet the variation of network bandwidth.

Interacting Multiple Model Vehicle-Tracking System Based on Neural Network (신경회로망을 이용한 다중모델 차량추적 시스템)

  • Hwang, Jae-Pil;Park, Seong-Keun;Kim, Eun-Tai
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.5
    • /
    • pp.641-647
    • /
    • 2009
  • In this paper, a new filtering scheme for adaptive cruise control (ACC) system is presented. In the proposed scheme, the identification of the mode of the preceding vehicle is considered as a classification problem and it is done by a neural network classifier. The neural network classifier outputs a posterior probability of the mode of the preceding vehicle and the probability is directly used in the IMM framework. Finally, ten scenarios are made and the proposed NIMM is tested on them to show its validity.

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF