• Title/Summary/Keyword: All-IP

Search Result 614, Processing Time 0.023 seconds

An Improved Model Design for Traceback Analysis Time Based on Euclidean Distance to IP Spoofing Attack (IP 스푸핑 공격 발생 시 유클리드 거리 기반의 트레이스 백 분석시간 개선 모델)

  • Liu, Yang;Baek, Hyun Chul;Park, Jae Heung;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.11-18
    • /
    • 2017
  • Now the ways in which information is exchanged by computers are changing, a variety of this information exchange method also requires corresponding change of responding to an illegal attack. Among these illegal attacks, the IP spoofing attack refers to the attack whose process are accompanied by DDoS attack and resource exhaustion attack. The way to detect an IP spoofing attack is by using traceback information. The basic traceback information analysis method is implemented by comparing and analyzing the normal router information from client with routing information existing in routing path on the server. There fore, Such an attack detection method use all routing IP information on the path in a sequential comparison. It's difficulty to responding with rapidly changing attacks in time. In this paper, all IP addresses on the path to compute in a coordinate manner. Based on this, it was possible to analyze the traceback information to improve the number of traceback required for attack detection.

Standardizations on IP Mobility Management for Future FMC Network (차세대 유무선통합망에서의 IP 이동성 기술 표준화 동향)

  • Jung, H.Y.;Park, W.G.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.3
    • /
    • pp.13-23
    • /
    • 2009
  • 유선통신망과 이동통신망은 그 동안 개별적으로 발전되어 왔으나 망 운영자의 강한 요구에 따라 차세대 유무선통합망으로 발전하고 있다. 차세대 유무선통합망은 IP 기반의 All-IP 망으로서 사용자는 다양한 액세스 망을 통하여 자유롭게 접속하며, 무선 액세스의 활성화로 고정 사용자보다는 이동 사용자가 주가 되는 망이 될 것으로 전망된다. 이러한 망 환경에서 가장 중요한 요구사항 중의 하나가 다양한 액세스망 간을 이동하는 사용자에 대한 심리스한 서비스 제공이다. 이러한 다양한 이기종 액세스망 간의 이동은 기본적으로 IP 이동성 지원을 필요로 하기 때문에 최근 IP 이동성 지원 기술의 중요성이 커지고 있다. 따라서 IP 기술의 대표적인 기관인 IETF 뿐만 아니라 유선통신망과 이동통신망의 대표적인 표준화 기관인 ITU-T, 3GPP에서도 관련 표준화가 활발히 진행되고 있다. 본 논문은 IP 이동성 지원 기술에 대하여 주요 표준화 기관에서 이루어지고 있는 표준화 동향을 살펴보고 이에 대한 대응방안에 대하여 논한다.

Trend of Emergency Service Regulation on VoIP in U.S.A. (미국의 VoIP 긴급 통화 정책 동향)

  • Huh, M.Y.;Park, S.O.;Kang, S.G.
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.1 s.103
    • /
    • pp.140-150
    • /
    • 2007
  • 차세대 유무선 통신망이 급속하게 All-IP 기반으로 전환되어 감에 따라 전세계적으로 인터넷전화 서비스가 기존 유선전화를 빠르게 대체해 나가고 있다. 그러나, 이와 관련된 적절한 규제없이 서비스가 진행됨에 따라 시민의 안전을 위협하는 사례가 발생되고있다. 따라서, 미국의 연방통신위원회(FCC)에서는 2005년 5월 인터넷전화 서비스 제공업체에게 긴급통화 서비스 제공에 대한 의무를 규정한 VoIP E911 고시(order)를 제정하였다. VoIP E911 고시는 고시의 대상이 되는 서비스를 정의하고, 고시의 발표일이후 120일 이내인 2005년 11월 28일까지 E911 서비스 요구사항을 준수하라는 내용을 담고 있다. 이후 2005년 11월 7일에 연방통신위원회(FCC)에서는 인터넷전화 서비스 제공업체들에게 VoIP E911 고시의 이행현황에 대하여 2005년 11월 28일까지 제출하라고 하였다. 따라서, 본 고에서는 연방통신위원회(FCC)의 VoIP E911 고시(order)를 중심으로 미국의 VoIP 긴급통화 정책동향에 대하여 분석하고자 한다.

Implementation and Analysis of Tunneling Method for Mobile Service (이동 서비스를 위한 터널링 기법의 구현과 성능분석)

  • 천정훈;정진우강현국
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.47-50
    • /
    • 1998
  • In recent years, it is required that computing support mobile user with computer. The advantage of mobile computing is that users may access all their applications from any location, whether they are in another building or a different state. So, Internet combines with mobile computing technology to make new communication environment for supporting mobility. The research for solving the problem of mobility is actively in progress. This paper describes the implementation of tunneling method for flexible bypass between specific region. Tunneling method provide mobile service to mobile hosts. IP datagram's address tranform method is IP-within-IP encapsulation by which an IP datagram may be encapsulated within an IP datagram. The developed IP-within-IP protocol can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library. Verification of IP packet tunneling was text file transfer program.

  • PDF

공기업(公企業)의 차세대(次世代) VoIP 구축전략(構築戰略)에 관한 사례(事例) 연구(硏究)

  • Jeong, Myeong-Seon;Kim, Jong-U
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.460-465
    • /
    • 2007
  • 국내 지방자치단체나 기업에서 기존의 TDM 방식의 교환설비를 차세대 VoIP 방식의 교환설비로 전환하면 고품질의 영상전화, 멀티미디어 서비스 등 다양한 기능과 효율성 통신비가 절감되는 효과가 있다. VoIP의 기술적용은 급속한 신기술 환경변화에 능동적인 대응의 필요성에 따라 추진되는데 많은 시간적 비용적 부분이 소요될 것으로 판단된다. 본 논문은 서울특별시 도시철도공사에서 운영중인 TDM 방식의 행정교환설비가 수명이 만료되어 "국내 최초" All IP 기반의 VoIP 방식으로 전면 교체한 사례를 가지고 연구하였다. 이 논문에서는 교체배경, 사업추진의 전략과 VoIP 구축작업 완료의 효과분석이 정리되어 있으며, 기업의 VoIP 도입시 고려사항 등을 제시하고 있다.

  • PDF

Enhanced Paging Mechanism in IP-based IMT Network Platform($IP^2$) (IP기반의 IMT망에서의 페이징기법연구)

  • Shin, Soo-Young;Jung, Byeong-Hwa;Park, Soo-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.77-86
    • /
    • 2005
  • [ $IP^2$ ] (IP-based IMT Network Platform) is a ubiquitous platform supporting mobility using two step If address IPha (IP host address) and IPra (IP routing address) - in a backbone network. MN (Mobile Node) in $IP^2$ maintains either Active or Dormant state, which is transferred to Active state through Paging process when communication is required. In this paper, we proposed a Paging method using proxy to resolve the problem of the conventional Paging method which transmits the Paging messages to all cells in LA (Location Area) resulting in the excessive use of network resources. Performanceevaluation of the proposed method using NS-2 showed that the usage of network resources becomes more efficient by reducing paging loads, especially under the condition of increased nodes.

  • PDF

An Analysis and modeling of Mobile IP network in VoIP Network (VoIP Network에서 Mobile IP 분석 및 설계)

  • Eom, Ki-Bok;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.414-418
    • /
    • 2003
  • VoIP is a core technology used to transmit both voice and data in an integrated packet' form. Within this technology, SIP is the signaling protocol used for 'real time' call services; particularly those where H323 is used. Yet, when considering the needs of mobile users, it is essential we integrate VoIp within the mobile technology so the mobile host is able to receive the 'packet' transported and by, and connected to, any available internet-address. For all this to occur, we need to improve Network Delay by reducing transmission problems associated with mobile services. If we are to obtain an optimal service then we must reduce any network delays which may arise from joining Mobile IP and VoIp services. This paper, therefore, considers how, unlike previous research, these delays may be improved through the use of the signaling technology\ulcorner SIP. It also considers how this research may be introduced into current wired and wireless integrated services enabling them to use the IP 'packet'.

  • PDF

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

Lightweight IP Traceback Mechanism (경량화된 IP 역추적 메커니즘)

  • Heo, Joon;Hong, Choong-Seon;Lee, Ho-Jae
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.17-26
    • /
    • 2007
  • A serious problem to fight attacks through network is that attackers use incorrect or spoofed IP addresses in attack packets. Due to the stateless nature of the internet structure, it is a difficult problem to determine the source of these spoofed IP packets. While many IP traceback techniques have been proposed, they all have shortcomings that limit their usability in practice. In this paper we propose new IP marking techniques to solve the IP traceback problem. We have measured the performance of this mechanism and at the same time meeting the efficient marking for traceback and low system overhead.

A Study of Hacking Attack Analysis for IP-PBX (IP-PBX에 대한 해킹 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.273-276
    • /
    • 2011
  • Voice over Internet Protocol(VoIP) compared to the traditional PSTN communications costs and because of the ease of use has been widespread use of VoIP. Broadband Convergence Network (BCN) as part of building with private Internet service provider since 2010, all government agencies are turning to the telephone network and VoIP. In this paper, we used the Internet on your phone in the IETF SIP-based IP-PBX is a hacking attack analysis studies. VoIP systems are built the same way as a test bed for IP-PBX hacking attacks and vulnerabilities by analyzing the results yielded. Proposes measures to improve security vulnerabilities to secure VoIP.

  • PDF