• Title/Summary/Keyword: AIS 네트워크

Search Result 23, Processing Time 0.022 seconds

Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks (WDM 망에서 인공면역체계 기반의 네트워크 공격 탐지 제어 모델 및 대응 기법 설계)

  • Yoo, Kyung-Min;Yang, Won-Hyuk;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.566-575
    • /
    • 2010
  • In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.

Performance Analysis of Channel Compensation and Channel Coding Techniques based on Measured Maritime Wireless Channel in VHF-band Ship Ad-hoc Network (VHF 대역 선박 간 애드혹 네트워크에서 실측 해상채널에 기반한 채널 보상과 채널 부호화 기법의 성능분석)

  • Jeon, Kwang-Hyun;Hui, Bing;Chang, Kyung-Hi;Kim, Seung-Geun;Kim, Sea-Moon;Lim, Yong-Kon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.517-529
    • /
    • 2011
  • In this paper, the parameters of the RTT (Radio Transmission Techniques) for SANET (Ship Ad-hoc NETwork), which is considered for the next generation maritime communication systems, are set up. A channel model has been analyzed based on the practical measured maritime wireless channel in VHF (Very-High Frequency) for SANET system. Also, by considering the frame structure including preamble, guard time and pilots for both single and multi-carrier systems, the BER (Bit Error Rate) performances are evaluated and analyzed in the aspects of channel compensation and channel coding techniques. Based on the simulation results, optimal modulation & coding schemes are suggested for SANET. That is, in single-carrier system by using differential modulation schemes, channel compensation is not necessary. However, channel coding is helpful to achieve additional gain. On the other hand, when 16-QAM modulation is employed in multi-carrier system, the implementation of both channel compensation and channel coding techniques show huge performance gain for various of K values, which are related to different maritime environments, and the rolling effects of wave.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.