• Title/Summary/Keyword: 와이어샤크

Search Result 5, Processing Time 0.018 seconds

Development Tool of Sniffing Vulnerability for Device based on Android (안드로이드기반 스마트디바이스의 스니핑 취약 분석을 위한 도구 개발)

  • Kim, Minchul;Suh, Taeweon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.697-700
    • /
    • 2015
  • 스마트디바이스의 확산으로 그에 따른 보안에 대한 중요성이 커지고 있다. 스마트디바이스의 정보를 보안하기 위해서는 소스코드에서 암호화가 필요하다. 하지만 모든 애플리케이션이 암호화가 돼있는 것은 아니다. 스마트디바이스의 구조를 모르는 사용자는 애플리케이션이 안전한지 모르기 때문에 정보가 암호화 돼있지 않는 애플리케이션을 사용할 경우 개인정보가 유출될 가능성이 농후하다. 따라서 이를 사용자에게 인지시켜주기 위해 암호화과정에 따른 암호화 복잡도를 체크할 수 있는 분석 툴을 개발하였다. 이 개발 툴은 오픈소스 기반인 와이어샤크와 카인과 아벨을 이용한 이차분석 툴로 사용자에게 해당 애플리케이션이 개인정보유출의 위험성을 제안한다.

Transmission for IEC 61850 Sampled Values Using Current and Voltage Sensors of Raspberry Pi (라즈베리파이 전류와 전압 센서를 이용한 IEC 61850 샘플 값 전송)

  • Hwang, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.157-162
    • /
    • 2018
  • This study uses sensors and Raspberry Pi to measure the values of current and voltage and transmits the measured sampled values to a network, carrying them in the frame of IEC 61850-9-2. A laboratory model was composed to send the sampled values, using the frame of IEC 61850-9-2. This study conducted a protocol analysis, using Wireshark for the accurate verification of the occurrence of the frame of IEC 61850-9-2. A visual analysis was conducted by displaying the received sampled values of current and voltage on the monitor in graphs. In addition, this study tested if the sampled values of IEC 61850-9-2 sent and received through the network equipment would meet the performance requirements of the message types of IEC 61850.

Interpretation and Statistical Analysis of Ethereum Node Discovery Protocol (이더리움 노드 탐색 프로토콜 해석 및 통계 분석)

  • Kim, Jungyeon;Ju, Hongteak
    • KNOM Review
    • /
    • v.24 no.2
    • /
    • pp.48-55
    • /
    • 2021
  • Ethereum is an open software platform based on blockchain technology that enables the construction and distribution of distributed applications. Ethereum uses a fully distributed connection method in which all participating nodes participate in the network with equal authority and rights. Ethereum networks use Kademlia-based node discovery protocols to retrieve and store node information. Ethereum is striving to stabilize the entire network topology by implementing node discovery protocols, but systems for monitoring are insufficient. This paper develops a WireShark dissector that can receive packet information in the Ethereum node discovery process and provides network packet measurement results. It can be used as basic data for the research on network performance improvement and vulnerability by analyzing the Ethereum node discovery process.

The traffic performance evaluation between remote server and mobile for applying to encryption protocol in the Wellness environment (웰니스 환경에서 암호화 프로토콜 적용을 위한 모바일과 원격 서버간 트래픽 성능 평가)

  • Lee, Jae-Pil;Kim, Young-Hyuk;Lee, Jae-Kwang
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.415-420
    • /
    • 2013
  • U-WHS refers to a means of remote health monitoring service to combine fitness with wellbing. U-WHS is a system which can measure and manage biometric information of patients without any limitation on time and space. In this paper, we performed in order to look into the influence that the encryption module influences on the communication evaluation in the biometric information transmission gone to the smart mobile device and Hospital Information System.In the case of the U-WHS model, the client used the Objective-c programming language for software development of iOS Xcode environment and SEED and HIGHT encryption module was applied. In the case of HIS, the MySQL which is the Websocket API of the HTML5 and relational database management system for the client and inter-server communication was applied. Therefore, in WIFI communication environment, by using wireshark, data transfer rate of the biometric information, delay and loss rate was checked for the evaluation.

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.