• Title/Summary/Keyword: 트래픽 측정

Search Result 384, Processing Time 0.034 seconds

Malicious Traffic Protection through MSPI Designing (MSPI설계를 통한 유해 트래픽 차단)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.31-42
    • /
    • 2006
  • In this paper, we proposed an integrated infrastructure for optimal information security to resolve these kinds of problems and to implement more powerful protection. The proposed infrastructure presents a security framework, provides a functional mechanism, and implements a scheme for information security based on the design concept of integrated structures. In order to ensure effective malicious traffic blocking, this paper emphasizes that a comprehensive approach through infrastructure improvement and combination of scanning tool is the only measure for preparing against today's environment of virus infiltration. The proposed model is a measure developed at a time when a permanent technological solution to virus is yet to be developed. A performance analysis model is developed and the performance is evaluated through the case studies for the proposed methodology. The effectiveness of the infrastructure for optimal information security needs the continuous diagnostic evaluation and tuning through the users or the organizations.

  • PDF

A study on module of biometric information binary using QRcode (QRcode를 이용한 생체정보 바이너리 모듈 연구)

  • Lee, Jae-Pil;Kim, Young-Hyuk;Lim, Il-Kown;Lee, Jae-Gwang;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.431-434
    • /
    • 2012
  • The network traffic increases due to the web service and mobile application use while the smart device user increases rapidly. This paper presented the QRcode application as network data loss problem in the u-Health mobile environment and encryption module alternative. Therefore, the bio-information of the patient was collected and QRcode was produced in the PC based. In addition, the rate of reading recognized in the polution and damage was confirmed. The data traffic loss ratio using the network performance measurement equipment was tested.

  • PDF

An Algorithm for Design of a Multiple Ring Network Using ROADM in WDM Mesh Networks (WDM Mesh 네트워크에서 ROADM을 이용한 멀티플-링 네트워크 설계 방안)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lim, Tae-Hyung;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.663-672
    • /
    • 2007
  • This paper proposes an algorithm for design of a multiple ring network that can be applied to an arbitrary topology in the WDM optical transport networks. Especially, we suggest an integer linear program(ILP) formulation with the objective of minimizing the total cost of nodes based on the reconfigurable OADM(ROADM) architecture and propose a heuristic algorithm to reduce computational complexity of the exact problem formulation. To evaluate the performance and validity of this scheme, we applied it to an NSFnet topology assuming the dynamic or static traffic condition and compared it with a mesh methodology about capacity of connection requests and the total cost of the nodes.

The Effects of Backhole Attack on Lattice Structure MANET (격자구조 MANET에서 블랙홀 공격의 영향)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.578-581
    • /
    • 2014
  • Blackhole attack, a kinds of attacks to routing function, can cause critical effects to network transmission function, Especially, on MANET(Mobile Ad-hoc Network) which it is not easy to prepare functions to respond malicious intrusion, transmission functions of entire networks could be degraded. In this paper, effects of blackhole attack to network transmission performance is analyzed on lattice structured MANET. Specially, performance is measured for various location of blackhole attack on lattice MANET, and compared with the performance of random structured MANET. This paper is done with computer simulation, VoIP(Voice over Internet Protocol) traffic is used in simulation. The results of this paper can be used for data to deal with blackhole attack.

  • PDF

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

Verification of Extended TRW Algorithm for DDoS Detection in SIP Environment (SIP 환경에서의 DDoS 공격 탐지를 위한 확장된 TRW 알고리즘 검증)

  • Yum, Sung-Yeol;Ha, Do-Yoon;Jeong, Hyun-Cheol;Park, Seok-Cheon
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.594-600
    • /
    • 2010
  • Many studies are DDoS in Internet network, but the study is the fact that is not enough in a voice network. Therefore, we designed the extended TRW algorithm that was a DDoS attack traffic detection algorithm for the voice network which used an IP data network to solve upper problems in this article and evaluated it. The algorithm that is proposed in this paper analyzes TRW algorithm to detect existing DDoS attack in Internet network and, design connection and end connection to apply to a voice network, define probability function to count this. For inspect the algorithm, Set a threshold and using NS-2 Simulator. We measured detection rate by an attack traffic type and detection time by attack speed. At the result of evaluation 4.3 seconds for detection when transmitted INVITE attack packets per 0.1 seconds and 89.6% performance because detected 13,453 packet with attack at 15,000 time when transmitted attack packet.

Throughput Analysis of the IEEE 802.11g DCF with ERP-OFDM Parameters (IEEE 802.11g ERP-OFDM 파라미터 기준 DCF 처리율 분석)

  • Kang, Koo-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.1-11
    • /
    • 2011
  • A lot of works on the throughput analysis of the IEEE 802.11 DCF have been studied since last few years. However, we should predict the throughput of the IEEE 802.11g that we mostly use today because the existing numerical results do not consider exactly the IEEE 802.11g with the physical layer ERP-OFDM parameters. In particular, we might have different results in the working WLAN s compared with the simple predictions of the throughput using the previous results. In this paper, we directly monitor the ERP-OFDM physical layer parameters on the operating WLANs, and then analyze the saturated DCF throughput with the well-known analytic model. Moreover, we measure the bandwidth utilization on the real WLANs working with FTP services, and then compare them with the analytic results. According to the experiment results, we confirm the usefulness of the analytic models which assume the saturated traffic sources.

An Empirical Study on the Marketing Performance of e-Trade using Search Engine Optimization (검색엔진 최적화(SEO) 기법을 활용한 전자무역 마케팅 성과에 관한 실증연구)

  • Lee, Sang-Jin;Chung, Jason
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.3-28
    • /
    • 2011
  • Recently marketing methods of small and medium exporting firms have changed from internet marketing using homepage, or e-catalogs, to search engine marketing. However, there is no specific proof of search engine marketing effectiveness. Therefore the purpose of this research is to explore marketing performance of search engine marketing(SEM) based on search engine optimization. In order to build an optimal SEM strategy, quantitative data are collected from the Google-analytics such as homepage visits, page views, and traffic source for three years. At the same time, this study has carried out a survey to measure the qualitative effectiveness. The result of this quantitative study suggests that the existing carryover effects and lag effects would be maintained through search engine optimization. Meanwhile, the qualitative survey shows that satisfaction and awareness of homepage have been improved after search engine optimization. This can support logically increase of homepage visiting ratio of quantitative analysis. Also exporting companies know very well, that traffic and page views have increased after search engine optimization.

  • PDF

The Traffic Performance Test Effects of Short Data Service Message Length in D-TRS (D-TRS환경에서 Short Data Service 메시지 크기에 따른 트레픽 성능평가)

  • Kim, Sai-Byuck;Song, Byeong-Kwon;Hwang, Gyu-Bin;Jeong, Tae-Eui;Kim, Jin-chul;Kim, Young-eok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1106-1108
    • /
    • 2009
  • TETRA(Terrestrial Trunked Radio)는 ETSI(European Telecommunications Standards Institute)에서 지정한 유럽 이동 무선 통신 기반의 표준이다. 본 논문은 TETRA 네트워크에서 트래픽에 따른 모뎀 성능 테스트와 그 결과 분석을 다룬다. TETRA 네트워크에서는 전송 방식에 따라 SDS(Short Data Service)와 PDS(Packet Data Service)로 나뉘게 되는데 본 논문에서는 PEI(Peripheral Equipment Interface)를 이용하여 SDS 전송 방식의 성능측정및 평가를 하였다. 본 측정에서는 최대 140바이트가 전송 가능한 SDS-Type 4가 사용 되었다. 성능 측정은 SDS메시지 데이터의 길이의 차이와 전송간격에 차이를 두어 측정하였다. 전송길이는 10에서 140바이트로 매 10바이트 단위씩 증가하였다. 전송 간격은 각각 0.5초, 1.0초, 1.5초씩 차이를 두어 측정하였고, 전송횟수는 각각 1000번씩 전송하였다. 테스트에 사용된 TETRA 모뎀은 UNIMO 사의 MU-1000MD이 사용되었다.

Performance Evaluation of VPN Protocol for FreeS/WAN and cIPe (FreeS/WAN과 cIPe의 VPN 보안 프로토콜 성능 시험)

  • 신용녀;정태인;박희운
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.211-213
    • /
    • 2002
  • 가상사설망이 중요한 정보를 원격에 전송한다는 개념만으로 여겨질 때에는 암호화강도에 주목했었다. 그러나 가상사설망 시장이 활성화되면서 보다 많은 트래픽을 효율적으로 처리하기 위하여, 가상사설망 고성능화에 대한 요구가 증대되고 있다. 본 논문에서는 가상사설망에서 성능 측정 시 필요한 항목들을 제시하고 설치한 네트워크 성능에 얼마만큼의 영향을 미치는지에 대해 살펴본다. 이를 위해 네트웍 환경을 IPsec 프로토콜을 사용하는FreeS/WAN 패키지를 활용하여 구성해보고, 자신의 독자적인 프로토콜인 CIPE 프로토콜을 사용하는 cIPe 패키지를 사용하여 다양한 성능지표들을 반영한 성능 측정을 실시하였다. Psec 표준을 준수하여 구현된 FreeS/WAN은 적용하는 방법에 따라 네트워크 성능 차가 상대적으로 크고 cIPe 방법은 암호화 적용 전에 비해서 그다지 큰 차이를 보이지는 않는다. 본 결과들을 고려할 경우, 가상사설망의 성능과 보안을 적절히 유지하는 범위에서 정책과 시스템 사양을 고려하여 가상사설망을 도입하여야 할 것이다.

  • PDF