• Title/Summary/Keyword: 페이로드

Search Result 136, Processing Time 0.033 seconds

Flow-based P2P Traffic Identification using SVM (SVM을 이용한 플로우 기반 P2P 트래픽 식별)

  • Um, Nam-Kyoung;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.123-130
    • /
    • 2008
  • To avoid some protection systems such as firewall, P2P applications have recently used to apply dynamic port numbers. Reliable estimates of P2P traffic require examination of packet payload, a methodological land mine from legal, privacy technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P growth and dynamics. Despite various methods such as port-based and signature-based techniques, it still dose not satisfy the method which uses both qualitative and quantitative aspects. In this paper, a method using SVM mechanism which discriminate the P2P traffic from non-P2P traffics using differences between P2P and other application traffics is suggested. This is a systematic methodology to identify P2P networks, and without relying on packet payload.

  • PDF

Design of The High-Level Architecture of Mobile Integration SNS Gateway and The MQTT Based Push Notification Protocol (모바일 통합 SNS 게이트웨이의 상위 구조 및 MQTT 기반의 푸시 알림 프로토콜 설계)

  • Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.344-354
    • /
    • 2013
  • In this paper, In order to solve the traffic of the SNS to be executed on smartphone, we propose the design of the SNS integrated gateway server. Also, we capture the payload size in a variety of methods to send the MQTT protocol and QoS level of MQTT protocol for communication between the client and the Gateway. And we present the results and analysis of packet loss and end-to-end delay. By using analysis proposed, we present the results of the integrated SNS Gateway push notification protocol design.

The study for improvement performance to be alteration packet type on multi-buffer scheme in wireless lan Here (초고속무선통신 기반의 멀티버퍼 패킷구조 변경에 따른 성능 향상에 관한 연구)

  • Park, Chi-Ho;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.95-102
    • /
    • 2005
  • This paper is purpose for improvement performance wireless lan of IEEE802.11a/b/g. Access point utilized a single server, multi-queuing system, FIFS system model to adapted priority multi-bufferto be alteration packet type. The main purpose of the paper improve the transmission rate and the performance of access point to settle transmission delay for load in MAC, has priority multi-buffer. We use experimentation to obtain our model of the access point and buffer-related parameters. Using our test design, we are able to extract the parameters of an analytic equation giving the average service time of a packet as a function of packer IP payload.

Merged-Packet based Effective Queuing Mechanism for Underwater Networks (결합패킷 활용기반 수중네트워크 전송 큐 관리 기법)

  • Shin, Soo Young;Park, Soo-Hyun;Namgung, Jung Il
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.2
    • /
    • pp.61-67
    • /
    • 2017
  • In this paper, an adaptive MAC technique for various underwater environment with narrow-bandwidth and low transmission speed was proposed. In previously published Underwater Packet Flow Control (UPFC) technique, three transmission types (normal, block and parallel transmission) had been proposed using the number of transmission and transmission time. In addition to the UPFC, the proposed technique is an improved version of UPFC having more effective queuing technique for merge transmission. A mathematical model of the proposed queuing theory was constructed and its increased efficiency per unit transmission number was also verified based on simulations.

Design of launch pad for mitigating acoustic loads on launch vehicle at liftoff (우주발사체 발사 시 음향하중 저감을 위한 발사대 설계)

  • Tsutsumi, Seiji
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.4
    • /
    • pp.331-341
    • /
    • 2020
  • At liftoff, launch vehicles are subject to harmful acoustic loads due to the intense acoustic waves generated by propulsion systems. Because these waves can cause electronic and mechanical components of launch vehicles and payloads to fail, predicting and mitigating acoustic loads is an important design issue. This article presents the latest information about the generation of acoustic waves and the acoustic design methods applicable to the launch pad. The development of the Japanese Epsilon solid launcher is given as an example of the new methodology for launch pad design. Computational fluid dynamics together with 1/42 scale model testing were performed for this development. Effectiveness of the launch pad design to reduce acoustic loads was confirmed by the post-flight analysis.

Design and Implementation of a Bluetooth Encryption Module (블루투스 암호화 모듈의 설계 및 구현)

  • Hwang, Sun-Won;Cho, Sung;An, Jin-Woo;Lee, Sang-Hoon;Shin, We-Jae
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.276-279
    • /
    • 2003
  • 본 논문에서는 블루투스 장비 간 암호화를 위해 사용되는 암호화 모듈의 설계 및 구현에 관한 내용을 다룬다. 암호화 모듈은 기저 대역내에 암호화 키 생성 모듈과 암호화 엔진 모듈로 구성된다. 암호화 키 생성 모듈은 Cylink사에서 제안한 공개 도메인인 SAFER+(Secure And Fast Encryption Routine) 알고리즘을 사용하여 128bit 키를 생성한다. 그 구성은 키 치환을 위한 치환 함수(key-controlled substitution)와 선형 변환을 위한 PHT(Pseudo-Hadamard Transform)와 Armenian Shuffle 변환기로 구성된다. 암호화 엔진 모듈은 전송 패킷내의 페이로드 데이터와 생성된 사이퍼 키 스트림 데이터와 XOR연산을 통하려 암호화를 행하며 그 구성은 LFSR (Linear Feedback Shift Register)와 합 결합기로 구성된다. 이 중 암호화 키 생성 모듈은 LM(Link Manager)의 PDU(Protocol Data Unit) 패킷을 통해 상호 정보가 교환되므로 암호화키를 생성하는데 있어 시간적 제약이 덜 하다. 따라서 본 논문에서는 변형된 SAFER+ 알고리즘 구현하는데 있어 치환 함수의 덧셈과 XOR, 로그, 지수연산을 바이트 단위의 순차 계산을 수행함으로써 소요되는 하드웨어 용량을 줄이도록 설계하였다. 본 논문에서 제시한 모듈은 블루투스 표준안 버전 1.1에 근거하여 구현하였으며 시뮬레이션 및 테스트는 Xilinx FPGA를 이용하여 검증하였다.

  • PDF

Effect of Leg Stiffness on the Running Performance of Milli-Scale Six-Leg Crawling Robot with Payload (소형 6족 주행 로봇의 페이로드와 다리 강성이 로봇의 주행 성능에 미치는 영향)

  • Chae, Soo-Hwan;Baek, Sang-Min;Lee, Jongeun;Yim, Sojung;Ryu, Jae-Kwan;Jo, Yong-Jin;Cho, Kyu-Jin
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.4
    • /
    • pp.270-277
    • /
    • 2019
  • Inspired by small insects, which perform rapid and stable locomotion based on body softness and tripod gait, various milli-scale six-legged crawling robots were developed to move rapidly in harsh environment. In particular, cockroach's leg compliance was resembled to enhance the locomotion performance of the crawling robots. In this paper, we investigated the effects of changing leg compliance for the locomotion performance of the small light weight legged crawling robot under various payload condition. First, we developed robust milli-scale six-leg crawling robot which actuated by one motor and fabricated in SCM method with light and soft material. Using this robot platform, we measured the running velocity of the robot depending on the leg stiffness and payload. In result, there was optimal range of the leg stiffness enhancing the locomotion ability at each payload condition in the experiment. It suggests that the performance of the crawling robot can be improved by adjusting stiffness of the legs in given payload condition.

Implementation of Mapping Function for 400 Gigabit Flexible Ethernet Signal in OTN (OTN에서의 400Gb/s급 Flexible 이더넷 신호수용 위한 맵핑 기능 구현)

  • Lee, Chang-Ki
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.257-264
    • /
    • 2019
  • Recently, ITU-T recommends that FlexE, which allows the flexible configuration of Ethernet signals, be received by OTN for transparent transmission through OTN. To compensate for the difference in bit rate that can occur when mapping FlexE signals to OTN payload, an idle codeword is removed or inserted. However, the detailed functional blocks required to implement this method are not yet available. In this paper, based on the recent ITU-T requirements, a detailed functional block for OTN mapping of FlexE signals is proposed based on 400G class. In addition, based on the detailed functional blocks, mathematical analysis was performed to obtain the characteristics of removing and inserting idle code words, and the simulation results are shown.

Performance Improvement of Real-time Traffic Classification Algorithm based on Application Signature (시그니처 기반의 실시간 트래픽 분류 알고리즘의 성능 향상)

  • Oh, Young-Seok;Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1233-1236
    • /
    • 2009
  • 현재 다량의 네트워크 대역폭을 소모하는 응용 프로그램 트래픽을 확인하고 분류하는데 많은 방법들이 사용되고 있지만 정통적인 트래픽 분류 방법론인, 포트 번호, ip 등 등의 헤더 정보만으로는 응용 프로그램의 트랙픽을 정확하게 분류하지 못한다. 최근 동적인 포트 번호를 사용하는 새로운 트래픽 응용의 등장과 방화벽을 통과하기 위한 포트번호 변경으로 인하여 전통적인 TCP/UDP 헤더 기반의 트랙픽 분류 방법은 부정확해지고 있다. 이러한 트래픽을 정확하게 식별하고 분류하기 위해서는 패킷의 페이로드 내용에 대한 조사도 병행되어야 하고 시그니처 기반의 식별 방법을 사용하여야 한다. 하지만 이 방법은 정확도가 높은 반면 시그니처의 목록을 매번 최신 상태로 유지하여야 하는 단점과 길어지는 탐색 시간에 따른 시스템 부하의 문제를 가지고 있다. 본 연구에서는 이러한 단점을 향상시키는 목적으로 새로운 시그니처 기반의 해쉬 테이블에 캐시를 이용한 방법론인 효율적인 알고리즘을 제안하고 시그니처의 자료구조와 실제 패킷과 시그니처의 비교 방식을 수정함으로써 효율성을 높이는데 목적을 두고 있다.

Detection Framework for Advanced and Persistent Information Leakage Attack (지능적이고 지속적인 정보유출 공격 탐지 프레임워크)

  • Kil, Ye-Seul;Jeon, Ga-Hye;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.203-205
    • /
    • 2022
  • As digital transformation and remote work environment advanced by Covid-19 become more common, the scale of leakage damage to industrial secrets and personal information caused by information leakage attacks is increasing. Recently, advanced and persistent information leakage attacks have become a serious security threat because they do not quickly leak large amounts of information, but continuously leak small amounts of information over a long period of time. In this study, we propose a framework for detecting advanced and persistent information leakage attacks based on traffic characteristics. The proposed method can effectively detect advanced and persistent information leakage attacks using traffic patterns, packet sizes, and metadata, even if the payload is encrypted.

  • PDF