• Title/Summary/Keyword: 플러딩

Search Result 193, Processing Time 0.032 seconds

Contribution-Level-Based Opportunistic Flooding for Wireless Multihop Networks (무선 다중 홉 환경을 위한 기여도 기반의 기회적 플러딩 기법)

  • Byeon, Seung-gyu;Seo, Hyeong-yun;Kim, Jong-deok
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.791-800
    • /
    • 2015
  • In this paper, we propose the contribution-level-based opportunistic flooding in a wireless multihop network which achieves outstanding transmission efficiency and reliability. While the potential of the the predetermined relay node to fail in its receipt of broadcast packets is due to the inherent instability in wireless networks, our proposed flooding actually increases network reliability by applying the concept of opportunistic routing, whereby relay-node selection is dependent on the transmission result. Additionally, depending on the contribution level for the entire network, the proposed technique enhances transmission efficiency through priority adjustment and the removal of needless relay nodes. We use the NS-3 simulator to compare the proposed scheme with dominant pruning. The analysis results show the improved performance in both cases: by 35% compared with blind flooding from the perspective of the transmission efficiency, and by 20~70% compared to dominant pruning from the perspective of the reliability.

Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks (링크 플러딩 공격 완화를 위한 소프트웨어 정의 네트워크 기반 허니넷)

  • Kim, Jinwoo;Lee, Seungsoo;Shin, Seungwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.152-155
    • /
    • 2018
  • Over the past years, Link Flooding Attacks (LFAs) have been introduced as new network threats. LFAs are indirect DDoS attacks that selectively flood intermediate core links, while legacy DDoS attacks directly targets end points. Flooding bandwidth in the core links results in that a wide target area is affected by the attack. In the traditional network, mitigating LFAs is a challenge since an attacker can easily construct a link map that contains entire network topology via traceroute. Security researchers have proposed many solutions, however, they focused on reactive countermeasures that respond to LFAs when attacks occurred. We argue that this reactive approach is limited in that core links are already exposed to an attacker. In this paper, we present SDHoneyNet that prelocates vulnerable links by computing static and dynamic property on Software-defined Networks (SDN). SDHoneyNet deploys Honey Topology, which is obfuscated topology, on the nearby links. Using this approach, core links can be hidden from attacker's sight, which leads to effectively building proactive method for mitigating LFAs.

  • PDF

A SIP INVITE Flooding Detection algorithm Considering Upperbound of Possible Number of SIP Messages (발생 메시지의 상한값을 고려한 SIP INVITE 플러딩 공격 탐지 기법연구)

  • Ryu, Jea-Tek;Ryu, Ki-Yeol;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.797-804
    • /
    • 2009
  • Recently, SIP(Session Initiation Protocol) is used to set up and manage sessions for multimedia applications such as VoIP(Voice over IP) and IMS(IP Multimedia Subsystem). However, because SIP operates over the Internet, it is exposed to pre-existed internet security threats such as service degradation or service disruptions. Multimedia applications which are delay sensitive even suffers more from the threats mentioned above. The proposed methods so far to detect SIP INVITE flooding are CUSUM(Cumulative Sum), Hellinger distance and adaptive threshold, but among methods only take normal state into consideration. So, it is not capable of adapting the condition of the network congestion which are dynamically changing. In this paper, SIP INVITE flooding detection algorithm considering network congestion which enables efficient detections of such attacks is proposed. The proposed algorithm is expected to detect other types of attacks such as BYE and CANCEL more precisely compared to other methods.

Selection Method of Group Leader based on VMBC Algorithm in VANET (VANET에서의 VMBC 알고리즘을 이용한 그룹 리더 선정 방법)

  • Kim, Jae-Myoung;Jung, Eun-Ju;Jung, Sung-Dae;Lee, Sang-Sun
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.392-393
    • /
    • 2008
  • 서버와 클라이언트 기능을 모두 수행하면서 피어들끼리 직접 데이터를 주고받는 P2P 환경에서는 정보의 다양성으로 인하여 원하는 정보를 한 흡 이내에서 찾을 확률이 매우 낮다. 따라서 정보 검색을 위한 플러딩을 수행하게 되는데 플러딩 방법은 모든 피어가 네트워크에 참여하기 때문에 많은 부하가 생기고 네트워크 성능을 저하시킨다. 이러한 문제점은 차량 네트워크에서도 그대로 나타나게 된다. 이를 해결하기 위해 본 논문에서는 JXTA의 랑데부 피어 컨셉을 이용하여 정보 검색을 수행하도록 하였다. 랑데부 피어를 사용한 세 가지의 시나리오와 플러딩 방식을 사용하는 한 가지 시나리오를 시뮬레이션 한 결과 랑데부 피어를 사용하는 방식이 네트워크에 부하를 덜 주면서 효율적인 정보검색을 한다는 것을 확인하였다. 또한 차량 네트워크에서 이동성을 지원하기 위하여 기존의 클러스터링에 VMBC알고리즘을 이용한 그룹 리더(랑데부 피어)선정 방법을 제안하였다. 제안한 그룹 리더 선정 방법을 토대로 시뮬레이션 한 결과 이동성이 존재 할 경우에도 플러딩 방식보다 효율적으로 정보 검색이 이루어지는 것을 확인할 수 있었다.

  • PDF

An Improved Message Broadcast Scheme over Wireless Sensor Networks (무선 센서 네트워크에서 효율적인 메시지 방송 기법)

  • Kim, Kwan-Woong;Kim, Byun-Gon;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.588-594
    • /
    • 2010
  • In a multi-hop wireless sensor network, broadcasting is an elementary operation to support command message sending, route discovery and other application tasks. Broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which is referred to as the broadcast storm problem. Many broadcasting schemes have been proposed to give better performance than simple flooding in wireless sensor network. How to decide whether re-broadcast or not also poses a dilemma between reach ability and efficiency under different host densities. In this paper, we present popular broadcasting schemes, which can reduce re-broadcast packets and improve SRB(Saved ReBroadcast). Simulation results show different levels of improvement over the simple flooding scheme.

Restricted Multi-path Flooding for Efficient Data Transmission in Wireless Sensor Networks (무선 센서 네트워크 상에서 효율적인 데이터 전송을 위한 제한된 다중경로 플러딩)

  • Cho Hyun-Tae;Baek Yun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.534-539
    • /
    • 2005
  • The key in wireless sensor networks, which consist of a number of sensor nodes, is an energy efficiency. Many routing protocols have been proposed for prolonging network lifetime and reducing traffic in wireless sensor networks. Wireless sensor networks usually use wireless ad-hoc network protocols for routing, but these protocols are not well-suited for wireless sensor networks due to many reasons. In this paper, RM-flooding protocol is proposed for reducing routing overhead occurred when packet flooding. The nodes using this routing protocol can consume the limited energy effectively, and exchange information with remote nodes usulg information receiving from multipath. So, RM-flooding prolongs the network's lifetime.

Study on Flooding Phenomena at Various Stoichiometries in Transparent PEM Unit Fuel Cell (PEM 단위 연료전지 가시화 셀을 이용한 당량비 변화에 따른 플러딩 현상에 관한 연구)

  • Nam, Ki-Hoon;Byun, Jae-Ki;Choi, Young-Don
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.6
    • /
    • pp.625-632
    • /
    • 2012
  • The objective of this paper is to demonstrate the cathode channel flooding effects at different stoichiometries in proton exchange membrane (PEM) fuel cells by using visualization techniques. The phenomena of liquid water formation and removal caused by current variations were also examined experimentally. Tests were conducted at cathode stoichiometries of 1.5 and 2.0, and the anode stoichiometry was fixed at 1.5. It is found that at an air-side stoichiometry of 2.0, liquid water begins to form and the flooding occurs faster than at an air-side stoichiometry of 1.5. Also, when the air-side stoichiometry of 1.5 is maintained, the dry-out phenomena is observed in the dry-out area 7.8 A following the field of flooding. Thus, a stoichiometry of 1.5 produced better performance in terms of membrane electrode assembly (MEA) durability and hydrogen ion conductivity than did a stoichiometry of 2.0, in which dry-out occurs beyond 8A.

Effect of Humidity and Flooding on the Performance of Proton Exchange Membrane Fuel Cell (고분자전해질 연료전지의 성능에 미치는 습도와 플러딩의 영향)

  • Hwang, Byungchan;Chung, Hoi-Bum;Song, Myung-Hyun;Oh, Sung-June;Na, Il-Chai;Park, Kwonpil
    • Korean Chemical Engineering Research
    • /
    • v.55 no.3
    • /
    • pp.302-306
    • /
    • 2017
  • Humidity affect performance and durability of proton exchange membrane fuel cell (PEMFC). High humidity of gases generally enhance the performance, but high humidity have the danger of flooding. I-V performance, linear sweep voltammetry, cyclo voltammetry, and impedance of micro-channel cell measured with change of relative humidity (RH). Flooding phenomena started at RH 70%. Ion conductivity of membrane reached maximum value at RH 80%. Maximum current density of $1,700mA/cm^2$ (at 0.6 V) was obtained at RH 80%. Therefore the effect of ion conductivity increasement was higher than that of mass transfer decrease by flooding at RH 80%.

M-PULSE: Sensor Network Routing Protocol for Mobile Sync Node (M-PULSE: 싱크 노드의 이동성 지원을 위한 센서 네트워크 라우팅 프로토콜)

  • Lee, Shin-Hyoung;Yoo, Hyuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.719-722
    • /
    • 2006
  • 무선 센서 네트워크는 센서 노드가 센싱한 정보를 무선 네트워크를 통해서 싱크 노드에게 전달한다. 지금까지의 센서 네트워크는 에너지 소모를 최소화하기 위한 연구가 주로 진행되어 왔다. 그러나 데이터를 수집하는 싱크 노드의 이동성이 보장된다면 더욱 다양한 서비스를 제공할 수 있다. PULSE 프로토콜은 센서 네트워크상에서 에너지 효율적으로 경로를 설정하는 프로토콜이다. 본 논문에서는 기존의 PULSE 프로토콜의 펄스 플러딩 사이에 네트워크 일정 범위 내의 플러딩이 가능하도록 수정한 인터 펄스 플러딩을 추가하여 싱크 노드의 이동성을 지원하고 에너지 효율성도 높인 M-PULSE 프로토콜을 제안한다.

  • PDF

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.