• Title/Summary/Keyword: 패킷ID

Search Result 74, Processing Time 0.027 seconds

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

A new MAC protocol to improve a performance in IEEE 802.11 wireless LANs (IEEE 802.11 무선 랜의 성능 향상을 위한 새로운 MAC프로토콜)

  • Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.759-764
    • /
    • 2009
  • A new backoff scheme for infrastructure mode in IEEE 802.11 wireless LANs is proposed to improve a performance. Each station generates a unique backoff number using total number of stations, fairness parameter included in beacon frame and an user's ID that is assigned by AP. The station sends a packet after its own backoff number of idle slots, which makes a collision free access among stations within AP's coverage. The proposed method shows better performance in the view of channel utilization and packet delay than an original IEEE 802.11 CSMA/CA backoff scheme.

Basic MOFI Testbed Implementation for Host ID-based Communication (호스트 ID 기반 통신을 위한 기본 MOFI 테스트베드 구축)

  • Jung, Whoi-Jin;Min, Seok-Hong;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.17-27
    • /
    • 2011
  • In recent years, the interest and research for Future Internet are rapidly increasing. In domestic, MOFI (Mobile Oriented Future Internet) is proposed as one architecture of Future Internet. MOFI is a data transmission architecture which provides a mobility, name-based communication and routing scalability. In this paper we implement a basic MOFI testbed that supports HID-based communication, and verify the feasibility of HID-based communication through experimentation of general service such as PING and WWW service. We used "VirtualBox" as a virtual machine and implement a packet processing and a HCP header addition and translation function using "Click Modular Router".

Performance Evaluation of IDS on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 IDS 성능 분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1077-1082
    • /
    • 2016
  • IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

Implementation of a Relay Module for Coverage Extension in Visible Light Communication (가시광 통신의 커버리지 확장을 위한 릴레이 모듈 구현)

  • Lee, Sang-Gwon;Lee, Jong-Sung;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.738-740
    • /
    • 2017
  • Visible light communication is a communication method using light, and it has advantage of ensuring security in a single space as compared with RF communication. However, in the area outside the visible line of the light, communication disconnection occurs. Therefore, this paper proposes a relay module to overcome the coverage extension and communication disconnection phenomenon of visible light communication. The proposed relay module transmits and receives data of visible light communication by sequentially transmitting data packets including target ID through adjacent visible light module. Through experimentation of data transmission, we confirmed the extension of the transmission range and the data reception in the area outside the line of sight.

  • PDF

A Study on Hacking Attack when Free WiFi Internet Access In Smart Phone (Smart Phone에서 무료 WiFi 인터넷 접속 때 해킹 공격)

  • Chang, Young-Hyun;Pyo, Seong-Bae;Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.95-99
    • /
    • 2011
  • 최근 무료 WiFi Zone이 확대되고 있고, Smart Phone으로 무료 WiFi에 접속하여 인터넷으로 접속하여 메신저를 하거나, 메일확인, 정보검색 등을 한다. 하지만 무료 WiFi Zone에서 Smart Phone으로 인터넷을 할 때, 개인정보를 해킹 당 할 수가 있다. 본 논문에서 안드로이드 O,S, Smart Phone에서 무료 WiFi를 이용하여 접속한다. 먼저 메신저와 웹사이트 로그인을 한다. 이때 AirPcap을 이용하여 패킷을 캡처한다. Packet 분석 툴인 WireShark를 사용하여 Packet의 내용을 분석하고, ID, PW와 메신저 대화 내용을 해킹한다. 해킹한 개인정보 ID, 비밀번호를 이용하여 인터넷 사이트에 접속을 하여 관리자 권한을 획득한다. 그리고 Smart Phone에서 WiFi접속 시 공격에 대한 보안대책을 제시한다. 본 연구는 Smart Phone에서 무료 WiFi 접속 때, 보안성 강화연구와 무선 해킹과 방어 기술 발전에 초석이 될 것이다.

  • PDF

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

DDoS Attack Path Retracing Using Router IP Address (라우터 IP주소를 이용한 DDoS 공격경로 역추적)

  • 원승영;구경옥;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.223-226
    • /
    • 2003
  • The best way in order to protect the system resource front Distributed Denial of Service(DDoS) attack is cut off the source of DDoS attack with path retracing the packet which transferred by attacker. Packet marking method can not use ICMP cause by using IP identifier field as marking field. And in case of increasing the number of router, retracing method using router ID has the size of marking field's increasing problem. In this paper, we propose that retracing method can be available the ICMP using marking field for option field in IP header and the size of making Held do not change even though the number of router is increased using the mark information which value obtained through XOR operation on IP address.

  • PDF

An Active Queue Management Algorithm Based on the Temporal Level for SVC Streaming (SVC 스트리밍을 위한 시간 계층 기반의 동적 큐 관리 알고리즘)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.425-436
    • /
    • 2009
  • In recent years, the user demands have increased for multimedia service of high quality over the broadband convergence network. These rising demands for high quality multimedia service led the popularization of various user terminals and large scale display equipments, which needs a variety type of QoS (Quality of Service). In order to support demands for QoS, numerous research projects are in progress both from the perspective of network as well as end system; For example, at the network perspective, QoS guaranteeing by improving of internet performance such as Active Queue Management, while at the end system perspective, SVC (Scalable Video Coding) encoding scheme to guarantee media quality. However, existing AQM algorithms have problems which do not guarantee QoS, because they did not consider the essential characteristics of video encoding schemes. In this paper, it is proposed to solve this problem by deploying the TS- AQM (Temporal Scalability Active Queue Management) which employs the differentiated packet dropping for dependency of the temporal level among the frames, based on SVC encoding characteristics by exploiting the TID (Temporal ID) field of the SVC NAL unit header. The proposed TS-AQM guarantees multimedia service quality through video decoding reliability for SVC streaming service, by differentiated packet dropping when congestion exists.

A New Decoding Algorithm and Arbitration Logic in IEEE 1394 Communications (새로운 IEEE 1394 송수신 디코딩 알고리즘과 Arbitration 회로)

  • 이제훈;박광로;서은미;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.3B
    • /
    • pp.347-354
    • /
    • 2001
  • IEEE 1394 버스는 데이터 패킷 전송시 반이중(half duplex)으로, 0과 1의 두 상태를 이용하여 전송한다. 그러나 버스 자동 구성 및 중재 기간에서 양방향으로 버스 중재 선 상태(arbitrtation line state) 신호를 주고받으며, 이는 Z, 0. 1의 세 논리 상태를 가지고 있다. IEEE 1394 버스를 채택한 노드는 시스템에 연결시 자동으로 네트웍을 트리 구조로 구성하고, 6 비트 물리 ID를 할당하며, 이는 버스 리셋, 트리 식별, 자기 식별의 세과정을 통해 구성된다. 또 전송할 데이터가 있는 경우 노드는 버스의 사용권을 얻기 위한 버스 중재(arbitration) 후 전송을 시작한다. 이러한 시스템 자동 구성을 위한 과정들과 버스 중재 과정에서 양방향으로 아날로그 0, 1, Z의 중재 선 상태 신호를 주고받게 된다. 본 논문에서는 기존 IEEE 1394를 채택한 노드들과 화환되며 중재 선 상태를 0과 1의 논리 상태만을 사용하여 버스 자동 구성 및 버스 중재를 디지털 회로로 구성할 수 있는 중재 선 상태 디코딩 알고리즘을 제안하였고, VHDL을 이용하여 전체 시스템의 동작을 시뮬레이션하였다.

  • PDF