• Title/Summary/Keyword: 시그니쳐

Search Result 75, Processing Time 0.027 seconds

Automatic Payload Signature Generation System (페이로드 시그니쳐 자동 생성 시스템)

  • Park, Cheol-Shin;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.615-622
    • /
    • 2013
  • Fast and accurate signature extraction is essential to improve the performance of the payload signature-based traffic analysis methods. However the slow manual process in extracting signatures make difficult to deal with the rapidly changing application in current Internet environment. Therefore, in this paper we propose a system automatically generating signatures from ground-truth traffic data. In addition, we improve the efficiency of signature extraction by recognizing the application protocol using a protocol filters and generating signatures automatically according to the application-specific protocol contents. In order to verify the validity of the system proposed in this paper, we compared the signatures automatically generated from our system with the signatures manually created for a few popular applications.

Development of Signature Generation and Update System for Application-level Traffic Classification (응용 레벨 트래픽 분류를 위한 시그니쳐 생성 및 갱신 시스템 개발)

  • Park, Jun-Sang;Park, Jin-Wan;Yoon, Sung-Ho;Lee, Hyun-Shin;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.99-108
    • /
    • 2010
  • The traffic classification is a preliminary but essentialstep for stable network service provision and efficient network resource management. While various classification methods have been introduced in literature, the payload signature-based classification is accepted to give the highest performance in terms of accuracy, completeness, and practicality. However, the collection and maintenance of up-to-date signatures is very difficult and time consuming process to cope with the dynamics of Internet traffic over time. In this paper, We propose an automatic payload signature generation mechanism which reduces the time for signature generation and increases the granularity of signatures. Furthermore, We describe a signature update system to keep the latest signatures over time. By experiments with our campus network traffic we proved the feasibility of our mechanism.

View Index Technique using Signatures in Relational Databases (관계 데이타베이스에서 시그니쳐를 이용한 뷰인덱스 기법)

  • Yong, Hwan-Seung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.757-765
    • /
    • 1996
  • View index techniques are proposed to process queries on views. Signature referencing techniques keep pointers with signatures of the referred object when there is any reference relationship between objects. When queries having conditions on referred object are give, disk I/Os can be reduced by checking conditions using stored signatures. Signature view index techniques proposed in this paper apply signature referencing techniques to view index by keeping not only tuple identifiers but also signatures for the tuple. When queries having conditions on views regiven, we can retrieve only tuples from a view index which satisfy given conditions by checking those with stored signatures.

  • PDF

Research on Signature Maintenance Method for Internet Application Traffic Identification using Header Signatures (헤더 기반 인터넷 응용 트래픽 분석을 위한 시그니쳐 관리 방법에 관한 연구)

  • Yoon, Sung-Ho;Kim, Myung-Sup
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.19-33
    • /
    • 2011
  • The need for application traffic classification becomes important for the effective use of network resources. The header-based identification method uses the header signature {IP address, port number, transport layer protocol TCP/UDP)}extracted from Internet application server to overcome some limitations overhead, payload encryption, etc.) of previous methods. A lots signature is extracted because this method uses header information of server. So, we need a maintenance method to keep essential signatures. In this paper, we represent the signature maintenance method using properties of identified traffic and history of the signature. Also, we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Automatic Payload Signature Update System for Classification of Recent Network Applications (최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템)

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Sung-Ho;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • In these days, the increase of applications that highly use network resources has revealed the limitations of the current research phase from the traffic classification for network management. Various researches have been conducted to solutions for such limitations. The representative study is automatic finding of the common pattern of traffic. However, since the study of automatic signature generation is a semi-automatic system, users should collect the traffic. Therefore, these limitations cause problems in the traffic collection step leading to untrusted accuracy of the signature verification process because it does not contain any of the generated signature. In this paper, we propose an automated traffic collection, signature management, signature generation and signature verification process to overcome the limitations of the automatic signature update system. By applying the proposed method in the campus network, actual traffic signatures maintained the completeness with no false-positive.

Development of signature Generation system and Verification Network for Application Level Traffic classification (응용 레벨 트래픽 분류를 위한 시그니쳐 생성 시스템 및 검증 네트워크의 개발)

  • Park, Jun-Sang;Park, Jin-Wan;Yoon, Sung-Ho;Oh, Young-Seok;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1288-1291
    • /
    • 2009
  • 네트워크 트래픽 모니터링과 분석은 엔터프라이즈 네트워크의 효율적인 운영과 안정적 서비스를 제공하기 위한 필수적인 요소이다. 다양한 트래픽 분석 방법 중 시그니쳐 기반의 분석 방법은 가장 높은 분석률을 보이지만 모든 시그니쳐를 수작업으로 추출하기 때문에 응용프로그램의 변화와 출현에 유연하게 대응하지 못한다. 따라서 본 논문에서는 응용프로그램 시그니쳐 생성 과정의 단점을 보완할 수 있는 시그니쳐 자동 생성 시스템을 제안한다. 응용프로그램 시그니쳐는 페이로드 내의 고유한 바이트 시퀀스로 정의하며 응용프로그램이 발생시키는 모든 트래픽을 대상으로 추출한다. 또한 생성 시스템의 실효성을 증명할 수 있는 검증 시스템 및 검증 네트워크를 제시한다.

High Performance Signature Generation by Quality Evaluation of Payload Signature (페이로드 시그니쳐 품질 평가를 통한 고효율 응용 시그니쳐 탐색)

  • Lee, Sung-Ho;Kim, Jong-Hyun;Goo, Young-Hoon;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1301-1308
    • /
    • 2016
  • Internet traffic identification is an essential preliminary step for stable service provision and efficient network management. The payload signature-based-classification is considered as a reliable method for Internet traffic identification. But its performance is highly dependent on the number and the structure of signatures. If the numbers and structural complexity of signatures are not proper, the performance of payload signature-based-classification easily deteriorates. Therefore, in order to improve the performance of the identification system, it is necessary to regulate the numbers of the signature. In this paper, we propose a novel signature quality evaluation method to decide which signature is highly efficient for Internet traffic identification. We newly define the signature quality evaluation criteria and find the highly efficient signature through the method. Quality evaluation is performed in three different perspectives and the weight of each signature is computed through those perspectives values. And we construct the signature map(S-MAP) to find the highly efficient signature. The proposed method achieved an approximately fourfold increased efficiency in application traffic identification.

Application Traffic Identification Speed Improvement by Optimizing Payload Signature Matching Sequence (페이로드 시그니쳐 매칭 순서 최적화를 통한 응용 트래픽 분류 속도 향상)

  • Lee, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup;Seok, Woojin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.575-585
    • /
    • 2015
  • The traffic classification is a preliminary and essential step for stable network service provision and efficient network resource management. However, the payload signature-based method has significant drawbacks in high-speed network environment that the processing speed is much slower than other methods such as header-based and statistical methods. In addition, as signature numbers are increasing, traffic analysis speed also declines because of signature matching method that does not consider analytic efficiency of each signature and traffic occurrence feature. In this paper, we propose a signature list reordering method in order by analytic value of each signature. When we reordered the signature list by the proposed method, we achieved about 30% improvement in speed of the traffic analysis compared with random signature list.

Implementation of Engine Generating Mutation Worm Signature Using LCSeq (LCSeq를 이용한 변형 웜 시그니쳐 생성 엔진 구현)

  • Ko, Joon-Sang;Lee, Jae-Kwang;Kim, Bong-Han
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.94-101
    • /
    • 2007
  • We introduce the way to detect the mutation worm. We implemented the program that can generate signature using LCSeq(Longest Common Subsequence) technique in Suffix Tree studied as pattern recognition algorithm. We also showed the process to detect the mutation of CodeRed worm and Nimda worm and evaluated signatures generated by snort and LCSeq.

Multi Signature Based Polymorphic Worm Detection (다중 시그니쳐에 기반한 변형웜 탐지 기법)

  • Lee, Injoon;Song, Chihwan;Kang, Jaewoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1252-1255
    • /
    • 2010
  • 기존의 단일 시그니쳐를 이용한 악성 코드 침입 탐지 시스템은 자신의 컨텐츠를 변형시키는 변형웜을 잡기에는 적합하지 않다. 변형웜을 탐지하기 위한 노력으로 변형웜에 적합한 시그니쳐를 만들기 위한 노력이 있어왔다. 이 연구는 기존의 변형웜 탐지 시그니쳐 방법들을 분석하고 비교하여, 상호 보완적인 멀티 시그니쳐 방법을 제안한다. 이 방법은 정확도 높은 변형웜 탐지 시스템을 구성하기 위한 근본 기술로 활용될 것으로 기대한다.