• 제목/요약/키워드: Network Packet Monitoring

검색결과 140건 처리시간 0.023초

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

웨이블렛 팩킷변환을 이용한 구조물의 이상상태 모니터링 (Structural Health Monitoring Using Wavelet Packet Transform)

  • 김한상;윤정방
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2004년도 추계학술대회논문집
    • /
    • pp.619-624
    • /
    • 2004
  • In this research, the structural health monitoring method using wavelet packet analysis and artificial neural network (ANN) is developed. Wavelet packet Transform (WPT) is applied to the response acceleration of a 3 element-cantilever beam which is subjected to impulse load and Gaussian random load to decompose the response signal, then the energy of each component is calculated. The first ten largest components in magnitude among the decomposed components are selected as input to an ANN to identify the damage location and severity. This method successfully predicted the amount of damage in the structure when the structure is subjected to impulse load. However, when the beam is subjected to Gaussian random load which can be considered as ambient vibration it did not yield satisfactory results. This method is applicable to structures such as machinery gears that are subjected to repetitive loads.

  • PDF

Packet Switching에 의한 공중 Computer 통신망 개발 연구 -제1부: Kornet 개요 및 NMC 개발 (Development of a Packet-Switched Public computer Communication Network -PART 1: KORNET Overview and Development of Network Management Center)

  • 은종관;이경근
    • 대한전자공학회논문지
    • /
    • 제22권6호
    • /
    • pp.103-113
    • /
    • 1985
  • 본 론문은 packet 교환 방식의 computer 통신망인 KORNET 개발에 판한 4편의 논문중 제1부로서 KORNET의 전체적인 개요와 network management center(NMC)의 개발에 관하여 기술하였다. NMC는 operator dialogue를 통하여 network내 여러 소자의 상태를 감지 하고 가입자와 network의 운용을 담당하며 routing의 관리를 담당하는등 network의 중추적 기능을 구행한다 본 KORNET의 구현에 있어서 통신 protocol은 CCITT의 권고사항을 충실히 따랐으며 NMC의 응용 software인 operator interface, prinary/secondary부, session layer차 packet level adaptor는 자체적으로 개발하였고, packet, link 및 physical level protocol은 Data Goner각사에서 개발한 XODIAC X.25를 응용하여 개발하였다.

  • PDF

Buffer Scheme Optimization of Epidemic Routing in Delay Tolerant Networks

  • Shen, Jian;Moh, Sangman;Chung, Ilyong;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • 제16권6호
    • /
    • pp.656-666
    • /
    • 2014
  • In delay tolerant networks (DTNs), delay is inevitable; thus, making better use of buffer space to maximize the packet delivery rate is more important than delay reduction. In DTNs, epidemic routing is a well-known routing protocol. However, epidemic routing is very sensitive to buffer size. Once the buffer size in nodes is insufficient, the performance of epidemic routing will be drastically reduced. In this paper, we propose a buffer scheme to optimize the performance of epidemic routing on the basis of the Lagrangian and dual problem models. By using the proposed optimal buffer scheme, the packet delivery rate in epidemic routing is considerably improved. Our simulation results show that epidemic routing with the proposed optimal buffer scheme outperforms the original epidemic routing in terms of packet delivery rate and average end-to-end delay. It is worth noting that the improved epidemic routing needs much less buffer size compared to that of the original epidemic routing for ensuring the same packet delivery rate. In particular, even though the buffer size is very small (e.g., 50), the packet delivery rate in epidemic routing with the proposed optimal buffer scheme is still 95.8%, which can satisfy general communication demand.

애플리케이션 계층에서 트래픽 분석을 위해 부하 차단기를 적용한 네트워크 트래픽 모니터링 시스템 (Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application Layer)

  • 손세일;김흥준;이진영
    • 인터넷정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.53-60
    • /
    • 2006
  • 인터넷을 통해 전송되는 트래픽의 양이 지속적으로 증가하고 있기 때문에 네트워크 트래픽 모니터링 시스템이 모든 패킷을 실시간으로 분석하기는 어렵다. 피어-투피어(P2P), 스트리밍 미디어, 메신저 등과 같이 동적으로 포트 번호를 할당받는 애플리케이션의 사용이 늘어나면서, 사용자들은 이들이 유발하는 트래픽을 분석하기를 원하고 있다. 이 같은 고수준의 분석을 위해서는 각 패킷마다 많은 처리 시간이 필요로 한다. 본 논문에서 부하 차단기를 이용하여 패킷의 수를 제한할 것을 제안한다. 선택된 패킷은 어떤 애플리케이션이 생성한 것인지 식별된 후, 정의된 애플리케이션 계층의 프로토콜에 따라 분석된다.

  • PDF

A Study on Traffic Distribution Processing using the Round Robin Monitoring System

  • Kim Seok-Soo
    • Journal of information and communication convergence engineering
    • /
    • 제3권2호
    • /
    • pp.90-92
    • /
    • 2005
  • As the result of the study shows, Round Robin Algorithm allows servers to ensure definite traffic distribution, unless incoming data loads differ much. Although error levels are high in some cases, they were eventually alleviated by repeated tests for a long period of time. The study uses two software packages (Packet Capture and Round Robin Test Package) to check packet volume from Virtual Network Structure (data generator, virtual server, Server 1, 2, 3), and finds out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round Robin Load Balancing Monitoring System include round robin testing, system monitoring, and graphical indication of data transmission and packet volume.

개선된 PF_RING을 이용한 고성능 패킷 캡쳐 (Improved PF_RING for High Performance Packet Capture)

  • 단조위;김용수
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2008년도 추계학술발표대회
    • /
    • pp.1012-1015
    • /
    • 2008
  • The packet capturing becomes a bottleneck in the network intrusion detection and monitoring system as the network performance developing. Many approaches, zero copy, interrupt coalescing and NAPI which attempt to improve packet capturing performance of Linux, are inefficient. PF_RING is a new type of network socket that dramatically improves the packet capture speed, but not perfect. This paper proposes some solutions which can improve the memory utilization and save some data copy time based on the commodity network adapters rather than on the commercial network adapters.

차세대 통합망에서 데이터 통신의 품질을 보장하기 위한 기법 (Architecture Design for Guaranteeing Quality of Data Communication in NGcN)

  • 유상훈;백두권
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2005년도 춘계학술대회 논문집
    • /
    • pp.1-4
    • /
    • 2005
  • Information communication environment integrates communication, broadcasting and internet, and Digital Convergence service emerges in result. Thus, the effective routers are needed so that they can transmit a huge number of data to core internet through appropriate base center. Therefore, the network guaranteeing QoS in transport layer supports interoperability with different wireless networks. So as to users receive necessary information anywhere seamlessly, the network architecture focuses on packet transmission and it is efficient for the control layer switches and controls packets between different networks. Since individual users take advantage of different services and data, the effective router architecture must be designed. Hence in this paper we design monitoring technique to solve security problem and to support premium service to ultimate users. Thereafter, we run opnet simulation and show the improvement of proposed router architecture.

  • PDF

DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현 (Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks)

  • 이형우;김태수
    • 인터넷정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.85-98
    • /
    • 2010
  • 최근 All-IP 네트워크 환경이 구축되면서 다양한 형태의 트래픽이 송수신되고 있으며, 이와 더불어 다양한 형태의 공격이 급증하고 있어 이에 대한 능동적 대응 방안이 제시되어야 한다. 기존 연구로는 SPIE 시스템 기반 해시 함수와 Bloom filter 방식을 적용한 라우터 중심 패킷 경로 역추적 기법이 제시되었으나, DDoS 공격이 발생 시 이를 능동적으로 차단하면서 공격 근원지를 역추적하기에는 문제점이 있다. 따라서 본 연구에서는 기존 SPIE 및 Sinkhole 기반 라우터 기법의 장단점에 대한 분석을 통해 두 방식의 장점을 결합하여 All-IP 네트워크 환경에 적합한 IP 역추적 방식을 설계하고 이를 구현하였다. 본 연구에서 제시한 기법은 기존의 Sinkhole 방식과 유사하게 공격 패킷에 대한 수집/모니터링 기능을 제공하면서도 역추적 패킷 Manager 시스템을 기반으로 공격 패킷에 대한 판단 및 수집/제어 할 수 있어 성능 향상과 함께 DDoS 공격에 대한 능동적 대응이 가능하였다.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.