• Title/Summary/Keyword: New Address

Search Result 1,453, Processing Time 0.025 seconds

Comparison and Analysis of Protocols for the Secure Binding Updates in MIPv6 (MIPv6의 안전한 바인딩 갱신을 위한 프로토콜 비교 분석)

  • Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.755-762
    • /
    • 2003
  • For the route optimization in the MIPv6, MN(Mobile Node) sends CN(Correspondent Node) a binding update message to notify the binding of is HoA(Home Address) with its new CoA(Care-of Address). However, unautenticated binding updates expose the involved MN and CM to various sucurity attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols, and the performance of packet exchanges and cryptographic operations. Then, we analyze the four typical binding update protocols based on the presented criterions. In addition, we propose some improvement tips for secure binding updates.

Design of a Protected Server Network with Decoys for Network-based Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.57-64
    • /
    • 2018
  • In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. In this paper, we design a protected server network with a large number of decoys to anonymize the protected servers that dynamically mutate their IP address and port numbers according to Hidden Tunnel Networking, which is a network-based moving target defense scheme. In the network, a protected server is one-to-one mapped to a decoy-bed that generates a number of decoys, and the decoys share the same IP address pool with the protected server. First, the protected server network supports mutating the IP address and port numbers of the protected server very frequently regardless of the number of decoys. Second, it provides independence of the decoy-bed configuration. Third, it allows the protected servers to freely change their IP address pool. Lastly, it can reduce the possibility that an attacker will reuse the discovered attributes of a protected server in previous scanning. We believe that applying Hidden Tunnel Networking to protected servers in the proposed network can significantly reduce the probability of the protected servers being identified and compromised by attackers through deploying a large number of decoys.

The trend of international address standardization and implications - with a focus on ISO 19160-2 - (주소의 국제표준화 동향분석 및 시사점 - ISO 19160-2를 중심으로 -)

  • Kim, Sung-Hoon;Kim, Bo-Eun;Won, Seok-Hwan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.1
    • /
    • pp.57-68
    • /
    • 2022
  • This study analyzed the status of international address standardization and reviewed responses of nations contained in the ISO/CD 19160-2-N5652 standard document. It identified problems in Korea's responses to the standard document, and presented ways of improvement. International standard procedures for ISO 19160-2 are underway with the goal to its completion by July 2023. To create an international standard, continuous monitoring and responses are required, and efforts to reflect the strength of the Korean addressing system on the new standard is needed.

A Study on the Algorithms for One-way Transmission in IPv6 Environment (IPv6 환경에서의 일방향 통신 알고리즘에 대한 연구)

  • Koh, Keun Ho;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.63-69
    • /
    • 2017
  • In the early 1990s, IETF(Internet Engineering TaskForce) had started the discussion on new address protocol that can modify and supplement various drawbacks of existing IPv4 address protocol with the introduction of CIDR(Classless Inter-Domain Routing) which is a temporary solution for IPv4 address depletion, NAT, private IP address. While various standards related to new address protocol has been proposed, the SIPP(Simple Internet Protocol Plus) was adopted among them because it is regarded as the most promising solution. And this protocol has been developed into current IPv6. The new concepts are introduced with modifying a lot of deficiencies in the exisitng IPv4 such as real-time data processing, performance on QoS, security and the efficiency of routing. Since many security threats in IPv6 environment still exist, the necessity of stable data communication environment has been brought up continuously. This paper deveopled one-way communication algorithm in IPv6 based on the high possibility of protecting the system from uncertain and potential risk factors if the data is transmitted in one way. After the analysis of existing IPv6 and ICMPv6, this paper suggests one-way communication algorithm as a solution for existing IPv6 and ICMPv6 environment.

Procedure-Based On-Line Program Replacement (프로시저 단위의 온라인 프로그램 교체)

  • Kim, Young-Jin;Kim, Hyung-Gon;Kim, Hwa-Jun;Lee, In-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.327-341
    • /
    • 2000
  • This paper presents a method for procedure-based on-line program replacement for user applications and illustrates the method in the SUN Solaris environment. In addition to developing procedures for directly changing the address space of a running process, the paper provides solutions on how to allocate space for the new version procedure and how to make the new version procedure work correctly in the old version process address space, when the size of new version procedure is different from that of old version, and thus facilitates procedure-based on-line software replacement. The method performs on-line program replacement using services provided by existing operating systems. Also, the method supports a small, procedure-based replacement and directly modifies necessary parts of a process address space, which results in small performance loss.

  • PDF

Performance Analysis of DoS Security Algorithm for Multimedia Contents Services (멀티미디어 콘텐츠의 서비스거부 방지 알고리즘 성능분석)

  • Jang, Hee-Seon;Shin, Hyun-Chul;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.19-25
    • /
    • 2010
  • In this paper, the performance of the DoS information security algorithm is evaluated to provide the multimedia traffic between the nodes using the multicasting services. The essence technology for information security to distribute the multimedia contents is presented. Under the multicasting services, a node participating new group needs a new address and the node compares the collision with the existing nodes, then DoS attack can be occurred between the nodes by a malicious node. Using the NS2 simulator, the number of DoS attacks, the average number of trials to generate new address, and the average time to create address are analyzed. From simulation results, the efficient algorithm with relevant random number design according to the DRM network is needed to provide secure multimedia contents distribution.

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.

Building Matching Analysis and New Building Update for the Integrated Use of the Digital Map and the Road Name Address Map (수치지도와 도로명주소지도의 통합 활용을 위한 건물 매칭 분석과 신규 건물 갱신)

  • Yeom, Jun Ho;Huh, Yong;Lee, Jeabin
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.5
    • /
    • pp.459-467
    • /
    • 2014
  • The importance of fusion and association using established spatial information has increased gradually with the production and supply of various spatial data by public institutions. The generation of necessary spatial information without field investigation and additional surveying can reduce time, labor, and financial costs. However, the study of the integration of the newly introduced road name address map with the digital map is very insufficient. Even though the use of the road name address map is encouraged for public works related to spatial information, the digital map is still widely used because it is the national basic map. Therefore, in this study, building matching and update were performed to associate the digital map with the road name address map. After geometric calibration using the block-based ICP (Iterative Closest Point) method, multi-scale corresponding pair searching with hierarchical clustering was applied to detect the multi-type match. The accuracy assessment showed that the proposed method is more than 95% accurate and the matched building layer of the two maps is useful for the integrated application and fusion. In addition, the use of the road name address map, which carries the latest and most frequently renewed data, enables cost-effective updating of new buildings.

A Study on Geographical Category Classification of Road Names of New Address System : in the Case of Cheongju City (새주소 체계 도로명의 지리적 유형 분류에 관한 연구 - 청주시를 사례로 -)

  • Hong, Seon-il;Kim, Young-Hoon
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.3
    • /
    • pp.553-568
    • /
    • 2015
  • This paper focuses on the geographical characteristics and the spatial distributions and patterns of the road names in the new address system for which all the 183 road names of Cheongju City has been used. All 183 road names in Cheongju City and their textural information are analyzed and classified into four main categories and six divisions as sub-category. Each type is mapped and its spatial patterns are discussed in order to identify the interaction between the road name and the geographical characteristics of each type. From the discussion stated in the paper, it can be inferred that the road name is not only a representative place name in an area, but also presents an important geographical feature reflecting the toponymy of the cultural and historical backgrounds of an area. Therefore, it is necessary to recognize that for road naming, various aspects such as geographical backgrounds and characteristics should be considered. These are directly related to the publicity and utilization of the road names to the public who is still unfamiliar with the new address system to be used. Finally, various geographical topics and approaches such as toponymy and spatial analysis are proposed for further geographical research, which will contribute to the extent of geographical research scopes.

  • PDF