• Title/Summary/Keyword: Bloom Filter

Search Result 104, Processing Time 0.028 seconds

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Mobile Application and Service Discovery Protocol for Device-to-Device Communication (기기 간 직접통신을 위한 모바일 어플리케이션 및 서비스 디스커버리 프로토콜)

  • Choi, Kae Won;Lee, Hyun;Chang, Sung Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.10
    • /
    • pp.908-917
    • /
    • 2013
  • In this paper, we propose a discovery protocol for finding nearby mobile applications and services in a device-to-device communications system. The device-to-device communication technology enables proximity-based services such as mobile social networks and mobile marketing. For realizing these proximity-based services, it is essential to design a discovery protocol which pinpoints the devices with mobile applications of interest among hundreds and thousands of devices in proximity. In the infrastructure-less networks such as ad hoc networks, we can design the discovery protocol that periodically broadcasts a short discovery code containing the compressed information of the mobile applications. In this paper, we design the discovery protocol with the discovery code generated by using a hash function and a Bloom filter. We also mathematically analyze the performance of the proposed protocol.

A Mechanism of Medical Data Encryption Method Using Bucket Index and Bloom filter with the range property. (버킷인덱스와 블룸필터를 이용한 범위형 의료정보 암호화기법)

  • Kim, Chang-Kyu;Kim, Jung-Tae;Yu, Choun-Young;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.371-381
    • /
    • 2011
  • Recently, there are some social issues that personal sensitive data in database were let out. The best method to protect these personal sensitive data is used by the database encryption method. But the encrypting database makes the query difficult. So, there are a lot of study to protect the database and increase the query efficiency as well. In this paper, we analysed recent research trend to protect the sensitive data and propose the combined method using buckets and the bloom filter for the medical database with range property. Compared to bucket index model, the proposed method can increase bucket index value and protect data distribution exposure. We can estimate that this proposed method can improve searching time and efficiency.

AdvanSSD-Insider: Performance Improvement of SSD-Insider using BloomFilter with Optimization (블룸 필터와 최적화를 이용한 SSD-Insider 알고리즘의 탐지 성능 향상)

  • Kim, JeongHyeon;Jung, ChangHoon;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.5
    • /
    • pp.7-19
    • /
    • 2019
  • Ransomware is a malicious program that requires the cost of decryption after encrypting files on the user's desktop. Since the frequency and the financial damage of ransomware attacks are increasing each year, ransomware prevention, detection and recovery system are needed. Baek et al. proposed SSD-Insider, an algorithm for detecting ransomware within SSD. In this paper, we propose an AdvanSSD-Insider algorithm that substitutes a hash table used for the overwriting check with a bloom filter in the SSD-Insider. Experimental results show that the AdvanSSD-Insider algorithm reduces memory usage by up to 90% and execution time by up to 77% compared to the SSD-Insider algorithm and achieves the same detection accuracy. In addition, the AdvanSSD-Insider algorithm can monitor 10 times longer than the SSD-Insider algorithm in same memory condition. As a result, detection accuracy is increased for some ransomware which was difficult to detect using previous algorithm.

Memory-efficient Public Key Encryption with Keyword Search in Server (서버에서 효율적인 메모리 사용량을 제공하는 공개키 기반 검색 암호 시스템)

  • Kwon, Eun-Jeong;Seo, Jae-Woo;Lee, Pil-Joong;Park, Young-Man;Lee, Hae-Gyu;Kim, Yeong-Heon;Chong, Hak-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.3-15
    • /
    • 2008
  • In 2000, Song. et. al. firstly proposed the Searchable Keyword Encryption System that treated a problem to search keywords on encrypted data. Since then, various Searchable Keyword Encryption Systems based on symmetric and asymmetric methods have been proposed. However, the Searchable Keyword Encryption Systems based on public key system has a problem that the index size for searching keywords on encrypted data increases linearly according to the number of keyword. In this paper, we propose the method that reduces the index size of Searchable Keyword Encryption based on public key system using Bloom Filter, apply the proposed method to PEKS(Public key Encryption with Keyword Search) that was proposed by Boneh. et. al., and analyze efficiency for the aspect of storage.

A study on the management and improvement of alert system according to algal bloom in the Daecheong Reservoir (대청호 조류발생에 따른 경보제 운영 및 개선 방안 고찰)

  • Jeong, Dong-Hwan;Lee, Jaejeong;Kim, Kyoyoung;Lee, Daehee;Hong, Sunhwa;Yoon, Johee;Hong, Sukyoung;Kim, Taeseung
    • Journal of Environmental Impact Assessment
    • /
    • v.20 no.6
    • /
    • pp.915-925
    • /
    • 2011
  • Following the industrialization and urbanization in Korea, algal bloom causes aesthetic displeasure and many other problems such as taste and odor, coloration, scum, increase in pH, filter-bed blockage. There were some cases involving human death by microcystins during summertime in foreign countries. In Korea, Harmful cyanobacteria such as Microcystis and Anabaena develop in summer in the Daecheong reservoir, one of the main water resources, with the retention time of above 200 days. To better control algal bloom, the Ministry of Environment has been running algal bloom alert system from 1998 for the Daecheong reservoir, which needs to be improved to reflect the characteristics of river-type lakes. For this reason, we try to find new measures to improve an algal bloom alert system for each water zone considering the characteristics of harmful cyanobacteria in this study.

Utilizing the grazing effect of fresh water clams (Unio douglasiae) for the remediation of algal bloom during summer

  • Nam, Ki-Woong;Lee, Jeong-Ryul;Park, Kyung-Il
    • The Korean Journal of Malacology
    • /
    • v.31 no.1
    • /
    • pp.61-67
    • /
    • 2015
  • The occurrence of 'algal bloom', caused by the mass proliferation of phytoplankton, causes serious problems in streams and lakes in Korea. Therefore, in this study, the phytoplankton filter-feeding trait of Unio douglasiae, a type of freshwater clam, was used to reduce the algal bloom in outdoor water tanks during the summer. This involved the construction of a U. douglasiae cultivation apparatus, wherein 1,000 clams were divided into 8 rectangular baskets arranged in the shape of an empty square. The control tank was manufactured in exactly the same shape within the water tank, but without the addition of clams. The algal bloom-reducing effect of U. douglasiae was confirmed by the measurement of (and comparing between) the water quality at the center and periphery of the test and control cultivation apparatus. Water quality measurements included the measurement of water temperature, pH, turbidity, dissolved oxygen (DO) content, and chlorophyll-${\alpha}$ concentrations; the water quality was measured twice a month between June and November 2014.The results of these analyses did not show a significant difference in water quality (temperature, pH, turbidity, DO) between the center and periphery of the test and control tanks. However, the chlorophyll-${\alpha}$ concentration was observed to be much lower at the center of the test tank compared to that at the center and periphery of the control tank, as well as at the periphery of the test tank. This was believed to be a result of the U. douglasiae surrounding the center of the test tank, which prevented the influx of plankton from the periphery. Accordingly, the results of these analyses suggest the possibility that U. douglasiae cultivation could reduce the proliferation of algal blooms in lakes and streams during the summer. In particular, these results indicate possible improvements in U. douglasiae activity (reduction in algal blooms) by their effective arrangement in the water bodies.

The performance analysis of the selective element encryption method (선택적 요소 암호화 방식에 대한 성능 분석)

  • Yang, Xue;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.848-854
    • /
    • 2015
  • There are a lot of encryption methods to secure database proposed recently. Those encryption methods can protect the sensitive data of users effectively, but it deteriorates the search performance of database query. In this paper, we proposed the selective element encryption method in order to complement those drawbacks. In addition, we compared the performance of the proposed method with that of tuple level encryption method using the various queries. As a result, we found that the proposed method, which use the selective element encryption with bloom filter as a index, has better performance than the other encryption method.

Multi-match Packet Classification Scheme Combining TCAM with an Algorithmic Approach

  • Lim, Hysook;Lee, Nara;Lee, Jungwon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2017
  • Packet classification is one of the essential functionalities of Internet routers in providing quality of service. Since the arrival rate of input packets can be tens-of-millions per second, wire-speed packet classification has become one of the most challenging tasks. While traditional packet classification only reports a single matching result, new network applications require multiple matching results. Ternary content-addressable memory (TCAM) has been adopted to solve the multi-match classification problem due to its ability to perform fast parallel matching. However, TCAM has a fundamental issue: high power dissipation. Since TCAM is designed for a single match, the applicability of TCAM to multi-match classification is limited. In this paper, we propose a cost- and energy-efficient multi-match classification architecture that combines TCAM with a tuple space search algorithm. The proposed solution uses two small TCAM modules and requires a single-cycle TCAM lookup, two SRAM accesses, and several Bloom filter query cycles for multi-match classifications.

EC-ELGAMAL Homomorphic Cryptography based E-voting System (EC-ELGAMAL 준동형 암호화기반 전자투표)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.909-916
    • /
    • 2013
  • Since realization of E-voting system expands participation of voters and efficient count of voting, political and social and technical revolution is possible. However, without secure e-voting system, practical usages are infeasible. In the paper, we propose an e-voting system which is able to open votes in server without decryption during midst process using EC-ELGAMAL homomorphic cryptography. Users ensure anonymity with pseudo id from server and check their voting with Bloom Filter technology. Furthermore, we combine attributes and voters' information, so we can collect information of voter under the condition of anonymity.