• Title/Summary/Keyword: Real IP

Search Result 703, Processing Time 0.041 seconds

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

Design and implementation of TCP/IP protocol stack for small real-time kernels (소형 실시간 커널을 위한 TCP/IP 프로토콜 설계및 구현)

  • 윤재식;김재양;정선태
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.414-417
    • /
    • 1997
  • Many small-sized real-time kernels do not provide memory management and device drivers, not to mention file management. In this paper, we propose a design and implementation of TCP/IP protocol stack for such small real-time kernels based on [6] where we studied issues to be considered for porting the functionalities of TCP/IP for such small real-time kernels.

  • PDF

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.

A Study on the Distributed Real-time Mobile Robot System using TCP/IP and Linux (Linux와 TCP/IP를 이용한 분산 실시간 이동로봇 시스템 구현에 관한 연구)

  • 김주민;김홍렬;양광웅;김대원
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.10
    • /
    • pp.789-797
    • /
    • 2003
  • An implementation scheme and some improvements are proposed to adopt public-licensed operating system, Linux and de-facto world-wide network standard, TCP/IP into the field of behavior-based autonomous mobile robots. To demonstrate the needs of scheme and the improvement, an analysis is performed on a server/client communication problem with real time Linux previously proposed, and another analysis is also performed on interactions among TCP/IP communications and the performance of Linux system using them. Implementation of behavior-based control architecture on real time Linux is proposed firstly. Revised task-scheduling schemes are proposed that can enhance the performance of server/client communication among local tasks on a Linux platform. A new method of TCP/IP packet flow handling is proposed that prioritizes TCP/IP software interrupts with aperiodic server mechanism as well. To evaluate the implementation scheme and the proposed improvements, performance enhancements are shown through some simulations.

A study on the extended TCP/IP protocol for real-time communication (실시간 통신을 위한 확장된 TCP/IP 프로토콜 개발에 관한 연구)

  • Yoon, Young-Chan;Park, Jae-Hyun
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.42-52
    • /
    • 1998
  • This paper proposes an extended TCP/IP protocol, LAN/TCP, that can be used for the distributed soft real-time systems connected through the Ethernet-based local area network. Since LAN/TCP shows soft real-time performance with keeping compatibility and interoperability with the standard TCP/IP, the existing application software can be used without any modification. LAN/TCP also provides the periodic transmission mode(PTM) with which the periodical data collection and updating the control signals can be efficiently implemented with relatively small traffic overhead. This paper includes the computer simulation and experimental results of the proposed protocol.

  • PDF

A transmit function implementation of wireless LAN MAC with QoS using single transmit FIFO (단일 송신 피포를 이용한 QoS 기능의 무선랜 MAC의 송신 기능 구현)

  • Park, Chan-Won;Kim, Jung-Sik;Kim, Bo-Kwan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.237-239
    • /
    • 2004
  • Wireless LAN Voice over IP(VoIP) equipment needs Quality-of-Service(QoS) with priority for processing real-time traffic. This paper shows transmit function implementation of wireless LAN(WLANs) media access control(MAC) support VoIP, and it has an advantage of guarantee of QoS and is adaptable to VoIP or mobile wireless equipment. The IEEE 802.11e standard in progress has four queues according to four access categories(AC) for transmit and the MAC transmits the data based on EDCA. The value of AC is from AC0 to AC3 and AC3 has the highest priority. The transmit method implemented at this paper ensure QoS using one transmit FIFO in hardware since real-time traffic data and non real-time traffic data has the different priority. The device driver classifies real-time data and non real-time data and transmit data to hardware with information about data type. The hardware conducts shorter backoff and selects faster AIFS slot for real-time data than it for non real-time data. Therefor It make give the real-time traffic data faster channel access chance than non real-time data and enhances QoS.

  • PDF

Implementation of Middleware for Real-Time Distributed Control System of a Humanoid Robot Using CAN and TCP/IP (휴머노이드 로봇 ISHURO-II의 실시간 분산 제어를 위한 미들웨어 구현)

  • Choi, Woo-Chang;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.175-177
    • /
    • 2006
  • This paper deals with implementation of middleware using CAN(Controller Area Network) network and TCP/IP for real-time distributed control system of a humanoid robot. Existent system using CAN network is available. But, there is problems in extensibility and flexibility. In this raper, the new system using TCP/IP for solution and improvement of problems is proposed. The new system is applied to ISHURO-II, real-humanoid robot. The performance is verified through experiment.

  • PDF

Development of a Real-time Communication Service over Random Medium Access Scheme Networks

  • Choo, Young-Yeol;Kwon, Jang-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.350-353
    • /
    • 2004
  • The increasing use of Ethernet-TCP/IP network in industry has led to the growing interest in its reliability in real-time applications such as automated manufacturing systems and process control systems. However, stochastic behavior of its medium access scheme makes it inadequate for time-critical applications. In order to guarantee hard real-time communication service in Ethernet-TCP/IP network, we proposed an algorithm running over TCP/IP protocol stack without modification of protocols. In this paper, we consider communication services guaranteeing deadlines of periodic real-time messages over MAC protocols that have unbounded medium access time. We propose a centralized token scheduling scheme for multiple access networks. The token is used to allow a station to transmit its message during the time amount that is appended to the token. The real-time performance of the proposed algorithm has been described.

  • PDF

Design of RTP/UDP/IP Header Compression Protocol in Wired Networks (유선망에서의 RTP/UDP/IP 헤더 압축 설계)

  • Kim Min-Yeong;Khongorzul D.;Shinn Byung-Cheol;Lee Insung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1696-1702
    • /
    • 2005
  • Real Time Transport Protocol (RTP) is the Internet standard protocol for transport of real time data audio/video IP Telephony, Multimedia Seivece. In case of 8kbps voice codec, the size of packet per data is 20bytes and become more large to minimal 40bytes with adding each layer's header in RTP/UDP/IP. To solve this problem, various header compression skill were suggested on point-to-point networks. But it compress even IP header and cannot be suitable to apply to end-to-end network Thus, We will renew header compression protocol to apply wired router-based network.

A Study of IP Spoofing Attack and Defense Through Proxy Server (Proxy Server를 통한 IP Spoofing 공격과 방어 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.281-284
    • /
    • 2010
  • The characteristics of International Hacking is that because even if with tracing techniques, nobody can find Real IP address of the attacker so it is true that Great difficulty in the investigation. so that an attacker goes through the Proxy Server Many times and they use techniques of IP Spoofing to hide their IP address. In this paper, study How attackers use IP Spoofing Technique and the application of Proxy Server. In addition, to Propose IP Spoofing attacks through the Proxy Server attack and defend methods also IP traceback methods so this study materials will contribute to the development of International Hacking and Security Protection Technology.

  • PDF