• Title/Summary/Keyword: DoIP

Search Result 348, Processing Time 0.023 seconds

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

Analysis of Security Problems of Deep Learning Technology (딥러닝 기술이 가지는 보안 문제점에 대한 분석)

  • Choi, Hee-Sik;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.5
    • /
    • pp.9-16
    • /
    • 2019
  • In this paper, it will analyze security problems, so technology's potential can apply to business security area. First, in order to deep learning do security tasks sufficiently in the business area, deep learning requires repetitive learning with large amounts of data. In this paper, to acquire learning ability to do stable business tasks, it must detect abnormal IP packets and attack such as normal software with malicious code. Therefore, this paper will analyze whether deep learning has the cognitive ability to detect various attack. In this paper, to deep learning to reach the system and reliably execute the business model which has problem, this paper will develop deep learning technology which is equipped with security engine to analyze new IP about Session and do log analysis and solve the problem of mathematical role which can extract abnormal data and distinguish infringement of system data. Then it will apply to business model to drop the vulnerability and improve the business performance.

Pharmacognostical Study on the Korean Folk Medicine 'Jin Hae Cho Ip' (한국 민간약 "진해초잎"의 생약학적 연구)

  • Lee, Joon-Do;Lee, Yu-Jin;O, Jong-Yung;Park, Jong-Hee
    • Korean Journal of Pharmacognosy
    • /
    • v.35 no.3 s.138
    • /
    • pp.215-228
    • /
    • 2004
  • The Korean folk medicine 'Jin Hae Cho Ip' has been used as a remedy for neuralgia and as an invigorating drug after a childbirth, etc in Korea. With regard to the botanical origin of 'Jin Hae Cho Ip', several species of Potentilla (Rosaceae) has been refired, but no pharmacognostical study has yet been performed in this regard. To clarify the botanical origin of the 'Jin Hae Cho Ip', the morphological and anatomical characteristics of the leaflets and petioles of Potentilla and Sibbaldia species growing in Korea, such as P. chinensis, P. cryptotaeniae, P. dickinsii, P. discolor, P. fragarioides var. major, P. freyniana, P. kleiniana, P. matsumurae, P. paradoxa, and S. procumbens, were compared. As a result, it was found that 'Jin Hae Cho Ip' was composed of the leaves of P. Chinensis and P. discolor.

Lightpaths Routing for Single Link Failure Survivability in IP-over-WDM Networks

  • Javed, Muhammad;Thulasiraman, Krishnaiyan;Xue, Guoliang(Larry)
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.394-401
    • /
    • 2007
  • High speed all optical network is a viable option to satisfy the exponential growth of internet usage in the recent years. Optical networks offer very high bit rates and, by employing technologies like internet protocol over wavelength division multiplexing(IP-over-WDM), these high bit rates can be effectively utilized. However, failure of a network component, carrying such high speed data traffic can result in enormous loss of data in a few seconds and persistence of a failure can severely degrade the performance of the entire network. Designing IP-over-WDM networks, which can withstand failures, has been subject of considerable interest in the research community recently. Most of the research is focused on the failure of optical links in the network. This paper addresses the problem of designing IP-over-WDM networks that do not suffer service degradation in case of a single link failure. The paper proposes an approach based on the framework provided by a recent paper by M. Kurant and P. Thiran. The proposed approach can be used to design large survivable IP-over-WDM networks.

A Media Key Distribution Scheme for Lawful Interception in Secured VoIP Systems (보안이 적용된 VoIP 시스템의 합법적 감청을 위한 미디어 키 분배 기법)

  • Roh Hyo-Sun;Jung Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8B
    • /
    • pp.730-735
    • /
    • 2006
  • This paper proposes a media key distribution scheme for lawful interception in secured VoIP systems. A problem of the current US or EU standards for lawful interception is that they do not provide a mechanism for collecting keys used for encrypting media streams between two end points. In the proposed scheme, dual encryption was applied on the media keys using two shared secrets: one between the ISP AAA server and user agent, and the other between the TSP registrar and user agent. Only the lawful agency with court warrant can collect both keys from the service providers. This scheme can still provide a privacy by preventing the misusage of the keys by the service providers.

Study of Zero-copy Mechanism in TCP/IP (TCP/IP 에서의 Zero-copy 매커니즘 연구)

  • Chae, Byoung soo;Tcha, Seung Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.131-136
    • /
    • 2008
  • From the reciprocal connection by this Internet network researchs about the efficiency improvement of the whole system is accomplished with the method which reduces delays in message transmission. From here, we will do a comparative study between the user data program protocol (UDP) and the zero copy which does not use the buffer cache to fine out the valid method to improve the efficiency. In this thesis, I will change the message copy from execution process of the buffer cache of the TCP/IP on Unix OS with process on Linux OS. The object of conversion is to show you that the zero copy which doesn't use the buffer cache from transfer control class improves the communication efficiency.

  • PDF

Design and Implementation MoIP Wall-pad platform using ARM11 (ARM11 을 이용한 MoIP 월패드 플랫폼 구현)

  • Jung, Yong-Kuk;Kim, Dae-Sung;Heo, Kwang-Seon;Kweon, Min-Su;Choi, Young-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.46-49
    • /
    • 2011
  • This paper is to implement MoIP platform to send and receive video and audio at the same time by using high-performance Dual Core Processor. Even if Wall-Pad key component of a home network system is released by using embedded processors, it's lacking of performance in terms of multimedia processing and feature of video telephony through which video and voice are exchanged simultaneously. The main reason could be that embedded processors currently being used do not provide enough performance to support both MoIP call features and various home network features simultaneously. In order to solve these problems, Dual processor could be used, but in the other hands it brings another disadvantage of high cost. Therefore, this study is to solve the home automation features and video telephony features by using Dual Core Processor based on ARM 11 Processor and implement the MoIP Wall-Pad which can reduce the board design costs and component costs, and improve performance. The platform designed and implemented in this paper verified performance of MoIP to exchange the video and voice at the same time under the situation of Ethernet network.

An efficient Uplink Scheduling Scheme and Performance Analysis of MAC Layer fer VoIP Service in IEEE 802.16j System (IEEE802.16j System의 VoIP 서비스를 위한 MAC Layer에서 효율적인 업링크 스케줄링 기법 및 성능 분석에 관한 연구)

  • Lee, Seung-Do;Lee, Tae-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.602-607
    • /
    • 2007
  • 최근 4G 이동통신 시스템의 진화를 위한 단계로 기존의 이동통신 시스템을 유지하면서 효율 극대화를 통한 비용 절약 측면과 고 주파수 대역을 이용한 셀 간격의 협소화로 인해 나타나는 문제점에 대한 대안으로 커버리지 확대와 데이터 처리율 향상을 위한 IEEE 802.16j 표준화 작업이 진행 중에 있다. 향후 VoIP 서비스를 위한 업링크 스케줄링 기법으로 몇 가지가 IEEE 802.16j에 제시되어 있으나, 본 논문에서는 보이스 트래픽 특성 및 수학적 모델링을 통하여 기존 방법들보다 더 효율적인 대역 이용을 통해 같은 대역폭 대비 성능과 용량 면에서 개선된 스케줄링 기법인 eertPS를 제시하여 IEEE 802.16j Multi-Hop 환경하에서도 대역 효율적인 VoIP 서비스를 이용할 수 있도록 한다.

  • PDF

Implementation of Advanced IP Network Technology for IPTV Service

  • Joo, Young-Do
    • Journal of Information Processing Systems
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 2009
  • It is absolutely essential to implement advanced IP network technologies such as QoS, Multicast, High Availability, and Security in order to provide real-time services like IPTV via IP backbone network. In reality, the existing commercial networks of internet service providers are subject to certain technical difficulties and limitations in embodying those technologies. On-going research efforts involve the experimental engineering works and implementation experience to trigger IPTV service on the premium-level IP backbone which has recently been developed. This paper introduces the core network technologies that will enable the deployment of a high-quality IPTV service, and then proposes a suitable methodology for application and deployment policies on each technology to lead the establishment and globalization of the IPTV service.

Detecting Abnormal Patterns of Network Traffic by Analyzing Linear Patterns and Intensity Features (선형패턴과 명암 특징을 이용한 네트워크 트래픽의 이상현상 감지)

  • Jang, Seok-Woo;Kim, Gye-Young;Na, Hyeon-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.21-28
    • /
    • 2012
  • Recently, the necessity for good techniques of detecting network traffic attack has increased. In this paper, we suggest a new method of detecting abnormal patterns of network traffic data by visualizing their IP and port information into two dimensional images. The proposed approach first generates four 2D images from IP data of transmitters and receivers, and makes one 2D image from port data. Analyzing those images, it then extracts their major features such as linear patterns or high intensity values, and determines if traffic data contain DDoS or DoS Attacks. To comparatively evaluate the performance of the proposed algorithm, we show that our abnormal pattern detection method outperforms the existing algorithm in terms of accuracy and speed.