• Title/Summary/Keyword: 패킷 분류

Search Result 152, Processing Time 0.029 seconds

Classification of False Alarms based on the Decision Tree for Improving the Performance of Intrusion Detection Systems (침입탐지시스템의 성능향상을 위한 결정트리 기반 오경보 분류)

  • Shin, Moon-Sun;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.473-482
    • /
    • 2007
  • Network-based IDS(Intrusion Detection System) gathers network packet data and analyzes them into attack or normal. They raise alarm when possible intrusion happens. But they often output a large amount of low-level of incomplete alert information. Consequently, a large amount of incomplete alert information that can be unmanageable and also be mixed with false alerts can prevent intrusion response systems and security administrator from adequately understanding and analyzing the state of network security, and initiating appropriate response in a timely fashion. So it is important for the security administrator to reduce the redundancy of alerts, integrate and correlate security alerts, construct attack scenarios and present high-level aggregated information. False alarm rate is the ratio between the number of normal connections that are incorrectly misclassified as attacks and the total number of normal connections. In this paper we propose a false alarm classification model to reduce the false alarm rate using classification analysis of data mining techniques. The proposed model can classify the alarms from the intrusion detection systems into false alert or true attack. Our approach is useful to reduce false alerts and to improve the detection rate of network-based intrusion detection systems.

Forwarding Equivalence Class for Broadcasting on MPLS network (MPLS망에서 브로드캐스팅을 위한 포워딩 동일 클래스)

  • 최현경;박창민;김상하
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.386-388
    • /
    • 1998
  • Multiprotocol Label Switching(MPLS)는 기존 인터넷 라우팅에서 사용하는 longest prefix match 방식 대신에 short label exact match 방식을 사용함으로써 더 단순한 고속 포워딩 기술을 제공한다. 또한, 동일한 Forwarding Equivalence Class(FEC)에속하는 플로우들을 합성하여 하나의 레이블을 사용하는 방법 즉, Multipoint-to-point Tree(MPT)를 형성함으로써 확장설을 향상시켰다. 본 논문에선 현재 이슈가 괴고 있는 "IP address prefix"와 "host LSP"의 FEC타입과는 전송방식이 다른 브로드캐스팅을 위한"broadcast"FEC 타입을 제안하였으며, 브로드캐스트 패킷을 전송하는데 있어서 각각의Label Switched Path(LSP)제어 방식을 사용할 경우의 문제점을 분석하고, 유니캐스팅과 브로드캐스팅의 서로 다른 레이블 할당방식으로 인한 레이블 충돌을 해결하기 위해서 레이블 범위를 분류하여 사용하는 방식을 제안한다.해서 레이블 범위를 분류하여 사용하는 방식을 제안한다.

  • PDF

QoS Measurement Method of RTP/RTCP for Multimedia Service in BcN (BcN에서 멀티미디어 서비스를 위한 RTP/RTCP의 QoS 측정방법)

  • Lim Jae-Young;Kim Jeong-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.611-615
    • /
    • 2005
  • Having been multimedia services in BcN network, QoS is best important factor. This paper classify existing services and newly to be offered services, analyze quality criterion and measurement method for QoS guarantee in BcN, This paper investigate end-to-end quality criterion, classify measurement method existing and newly to be offered services, search quality criterion, introduce measurement method such as call success rate, packet loss rate, one-way delay, jitter and R-value for end-to-end quality measurement.

  • PDF

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

Machine Learning-based Detection of DoS and DRDoS Attacks in IoT Networks

  • Yeo, Seung-Yeon;Jo, So-Young;Kim, Jiyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.101-108
    • /
    • 2022
  • We propose an intrusion detection model that detects denial-of-service(DoS) and distributed reflection denial-of-service(DRDoS) attacks, based on the empirical data of each internet of things(IoT) device by training system and network metrics that can be commonly collected from various IoT devices. First, we collect 37 system and network metrics from each IoT device considering IoT attack scenarios; further, we train them using six types of machine learning models to identify the most effective machine learning models as well as important metrics in detecting and distinguishing IoT attacks. Our experimental results show that the Random Forest model has the best performance with accuracy of over 96%, followed by the K-Nearest Neighbor model and Decision Tree model. Of the 37 metrics, we identified five types of CPU, memory, and network metrics that best imply the characteristics of the attacks in all the experimental scenarios. Furthermore, we found out that packets with higher transmission speeds than larger size packets represent the characteristics of DoS and DRDoS attacks more clearly in IoT networks.

Network Classification of P2P Traffic with Various Classification Methods (다양한 분류기법을 이용한 네트워크상의 P2P 데이터 분류실험)

  • Han, Seokwan;Hwang, Jinsoo
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Security has become an issue due to the rapid increases in internet traffic data network. Especially P2P traffic data poses a great challenge to network systems administrators. Preemptive measures are necessary for network quality of service(QoS) and efficient resource management like blocking suspicious traffic data. Deep packet inspection(DPI) is the most exact way to detect an intrusion but it may pose a private security problem that requires time. We used several machine learning methods to compare the performance in classifying network traffic data accurately over time. The Random Forest method shows an excellent performance in both accuracy and time.

The Application of InSAR Signature Time Series for Landcover Classification (InSAR Signature 시계열 분석을 통한 토지피복분류)

  • Yun, Hye Won;Choi, Yun Soo;Yoon, Ha Su;Ko, Jong Sik;Cho, Seong Kil
    • Spatial Information Research
    • /
    • v.22 no.1
    • /
    • pp.27-33
    • /
    • 2014
  • Considering the wide coverage, the transparency from climate condition, Interferometric Synthetic Aperture Radar (InSAR) possesses a great potential for the landcover classification as shown in many precedent researches. In addition to the merits of InSAR products for the landcover classification, the time series analysis of InSAR pairs can provide a highly reliable basis to interpret landcover. We applied such idea with the test site in Mountain Baekdu located on the border between North Korea and China. Since it is recently noted as the potential volcanic activation site, the landcover especially the vegetation distribution information is highly essential to validate the reliability of Differential Interferometric Synthetic Aperture Radar (DInSAR) over Mt. Baekdu. The algorithms combining the auxiliary information from Moderate Resolution Imaging Spectroradiometer (MODIS) to analyze the phase coherence and backscatter coefficient of Observing Satellite (ALOS) Phased Array type L-band Synthetic Aperture Radar (PALSAR) was established. The results using InSAR signatures from two polarization modes of ALOS PALSAR showed high reliability for mining landcover and spatial distribution.

Efficient Parsing and Caching Mechanism for Data Carousels (데이터 캐루셀을 위한 효율적인 파싱 및 캐슁 기법)

  • Jeon, Je-Min;Won, Jae-Hoon;Kim, Se-Chang;Ko, Sang-Won;Kim, Jung-Sun
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.635-638
    • /
    • 2008
  • Unlike traditional analog broadcasting, digital broadcasting provides users with various additional services that we have never seen before. To receive these kind of services. data broadcasting includes not only audio, video signal, but also additional data associated with the program. In this paper, we present the efficient parsing and caching mechianism for data carousel in digital broadcasting set-top box. In order to speed up the process of parsing, we use the Message Pool that stores elementary_pid syntax of DSM-CC message packets.

  • PDF

Making Packets from Animation Gestures -Based on the Effort Element of LMA- (애니메이션 제스처의 패킷화 -LMA의 Effort 요소를 기반으로-)

  • Lee, Mi-Young;Hong, Soo-Hyeon;Kim, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.179-189
    • /
    • 2011
  • Gesture is one of the means for non-linguistic communication which can be expressed by human characters in animations. High drawing ability and profound knowledge about gestures are both required for animators to achieve efficient gesture expressions. However, diversified profound techniques are needed to master this knowledge which makes it very difficult for common animation drawers. In this paper, characteristics for each gesture are analyzed based on Laban Movement Analysis and gesture classification by making gesture packets. This research is of notable significance in providing animators with high efficient gesture expression techniques and developing automatic gesture-generating system.