• Title/Summary/Keyword: 패킷 분류

Search Result 152, Processing Time 0.022 seconds

An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy (엔트로피를 이용한 분산 서비스 거부 공격 탐지에 효과적인 특징 생성 방법 연구)

  • Kim, Tae-Hun;Seo, Ki-Taek;Lee, Young-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.63-73
    • /
    • 2010
  • Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.

Weight-based Congestion Control Algorithms for H.264/SVC Streaming (H.264/SVC 스트리밍을 위한 가중치 기반 혼잡 제어 알고리즘)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.9-17
    • /
    • 2012
  • Because best-effort Internet provides no guarantees on packet delay and loss, transient network congestion may cause negative effects on H.264/SVC streaming. Thus, the congestion control is required to adjust bit rate by dropping enhancement layers of H.264/SVC streams. This paper differentiates the video streams according to different levels of importance and proposes weighted-based congestion control algorithms to use the rate-distortion characteristics of streams. To maximize the weighted sum of PSNR values of all streams on a bandwidth-constrained node, this paper proposes WNS(Weighted Near-Sighted) and WFS(Weighted Far-Sighted) algorithms to control the number of enhancement layers of streams. Through simulation, this paper shows that weighted-based congestion control algorithm can efficiently adapt streams to network conditions and analyzes the characteristics of congestion control algorithms.

Hop-by-Hop Priority Increasing Scheme for Improving End-to-end Throughput in Multi-Hop OBS Networks (다중 홉 광 버스트 교환망에서 종단간 수율 향상을 위한 홉 단위 우선 순위 증가 기법)

  • 김병철;조유제
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.35-42
    • /
    • 2003
  • In this paper, we classified the wavelength reservation mechanisms of optical burst switching (OBS), and investigated the path length priority effect of the offset time/delayed reservation (OT/DR)-based scheme like the just-enough-time (JET) protocol. And, we showed that the fiber delay line (FDL)-based scheme can avoid the path length priority effect in multiple hop network environments. Also, we proposed a novel FDL/DR with hop-by-hop priority increasing (HPI) scheme which can improve the end-to-end throughput by increasing the priority of bursts hop-by-hop using the input FDLs at each node. The simulation results showed that the proposed FDL/DR with HPI scheme could avoid the path length priority effect and enhance the end-to-end throughput in multiple hop network environments.

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Network Simulation and Design Guideline for VoIPv6 Network of U-Army (U-Army의 VoIPv6 망 성능 시뮬레이션을 이용한 망 설계 방안)

  • Lee, Hyun-Duck;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.904-910
    • /
    • 2008
  • In this paper, we consider the military requirement, study the military network services and their related traffic parameters, evaluate the performance the experimental army network and then suggest the design guideline of applying VoIP to the whole military. We evaluate the performance of the delay and loss in the viewpoint of packet and call levels for the several scenarios. First, the performances of separate network service were considered and the satisfaction of the requirement was obtained. Secondly, the delays and losses of the integrated network services were calculated as the amount of the background traffic increases. Finally, based on the simulation results, we presented the design guideline which classified network configurations for applying VoIP equipment and helped estimate the number of VoIP terminals in the existing link.

Design and Implementation of The Spam E-Mail filtering System (스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.413-417
    • /
    • 2002
  • E-mail was very particular way of communication in the past, but it becomes one of daily communication methods now. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or badthings, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

Performance Enhancement of Mobile IP Using Dynamic Local Registration Scheme (동적 지역 등록 기법을 이용한 Mobile IP의 성능 향상)

  • Hwang, In-Yong;Park, Hong-Shik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3714-3722
    • /
    • 2000
  • The research related to the mobility support in the Internet can he classified into two fields. One is Macro mobility and the other is Micro mobility In case of \lacro Mobility, the standard, RFC 2002 by IETF is getting focused. But for Micro mobility, a variety of strategies have been discussed. In this paper. we introduce the concept of an LA and propose the strategy that makes it possible for the LA to fully concern frequent local handoff without using the HA. Therefore we can limit the longest handoH delay to a certain degree regardless of the distance between the MN and the HA of the MN. For the registration cost and the packet drop probability due to the registration delay, we prove the performance enhancement of the existing Mobile IP in case that we apply the concept of the LA to existing Mobile IP.

  • PDF

Algorithm of Holding Time Control Using Delay-Tolerant Packet for Energy-Efficient Transmission (에너지 효율적인 전송을 위한 지연 허용 패킷의 유지시간 제어 알고리즘)

  • Ryu, Seung Min;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.87-94
    • /
    • 2016
  • This paper proposes an energy transmission method to maximize energy efficiency of a based station. This method makes use of classification of service type to solve an inefficient use of transmission power, which is from exponential relationship between the legacy data throughput and transmission power. The proposed one is a way to find the most energy-efficiency points with the transmitted optimal amount of data on users in a base station of wireless network environment. For this, we propose EETA (Energy-Efficient Transmission Algorithm) which can control the amount of data and the holding time at the base station. As a result, the proposed method can improve the energy efficiency of about 10% compared to the legacy base station.

A Method for Detecting Unauthorized Access Point over 3G Network (3G망을 사용하는 인가되지 않은 AP 탐지 방법)

  • Kim, I-luk;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.259-266
    • /
    • 2012
  • Malicious rogue AP has been used for variety attacks such as packet sniffing and Man-In-The-Middle Attack. It is used for the purpose of data leakage via 3G network within companies, and the unauthorized AP could be a reason of security incidents even though it is not intended. In this paper, we propose the method for detecting unauthorized access point over 3G networks throughout the RTT (Round Trip Time) value for classification. Through the experiments, we show that the method can classify the AP which is installed by normal way and the AP over 3G networks successfully.