• Title/Summary/Keyword: HTTP protocols

Search Result 37, Processing Time 0.021 seconds

A Study on Next Generation HTTP-based Adaptive Streaming Transmission Protocol for Realistic Media (실감미디어 전송을 위한 차세대 HTTP 기반 적응적 스트리밍 전송 프로토콜 연구)

  • Song, Minjeong;Yoo, Seong-geun;Park, Sang-il
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.602-612
    • /
    • 2019
  • Various streaming technologies are being studied to guarantee the QoE of viewers due to the development of realistic media. HTTP adaptive streaming is a typical example, and it is based on HTTP / 1.1 and TCP. These protocols have become one of the causes of delaying the image delay and increasing the waiting time of web pages. Therefore, in this paper, we propose a QUIC-DASH system applying the UDP-based transmission protocols QUIC and HTTP / 2 to the MPEG-DASH system after analyzing various transmission protocols and development process of HTTP. Through experiments, the QUIC-DASH system confirmed the possibility of providing optimal performance in terms of transmission speed of LTE environment than existing system. We also suggest various future studies for better performance.

Performance Comparison of HTTP, HTTPS, and MQTT for IoT Applications

  • Sukjun Hong;Jinkyu Kang;Soonchul Kwon
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Recently, IoT technology has been widely used in many industries. Also research on integrating IoT technology with IoT sensors is actively underway. One of the important challenges in IoT is to support low-latency communication. With the development of communication networks and protocols, a variety of protocols are being used, and their performance is improving. In this paper, we compare the performance and analyze the characteristics of some of the major communication protocols in IoT application, namely MQTT, HTTP, and HTTPS. IoT sensors acquired data by connecting an Arduino equipped with ESP8266 and a temperature and humidity sensor (DHT11). The server measured the performance by building servers for each protocol using AWS EC2. We analyzed the packets transmitted between the Arduino and the server during the data transmission. We measured the amount of data and transfer time. The measurement results showed that MQTT had the lowest data transmission time and data amount among the three protocols.

Transmission Performance Comparison and Analysis with Different Publish/Subscribe Protocol (발행-구독 프로토콜에서 전송 성능의 비교 및 분석)

  • Fan, Zujie;Kim, JaeSoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.77-80
    • /
    • 2020
  • In this paper, we analyze and compare the performance of different publish and subscribe protocols in the real application environment. This paper provides a horizontal comparison of current publish/subscribe protocols in terms of security, throughput, and delay performance. Thanks to the use of lightweight frameworks, the MQTT protocol has demonstrated excellent performance in terms of delay performance. However, the AMQP protocol has more advantages in security and throughput. Although the REST/HTTP protocol has the worst delay performance, it is excellent in terms of compatibility because it is based on the HTTP protocol.

  • PDF

HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets

  • Kim, Sung-Jin;Lee, Sungryoul;Bae, Byungchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1801-1816
    • /
    • 2014
  • Because HTTP-related ports are allowed through firewalls, they are an obvious point for launching cyber attacks. In particular, malware uses HTTP protocols to communicate with their master servers. We call this an HTTP-based command and control (C&C) server. Most previous studies concentrated on the behavioral pattern of C&Cs. However, these approaches need a well-defined white list to reduce the false positive rate because there are many benign applications, such as automatic update checks and web refreshes, that have a periodic access pattern. In this paper, we focus on finding new discriminative features of HTTP-based C&Cs by analyzing HTTP activity sets. First, a C&C shows a few connections at a time (low density). Second, the content of a request or a response is changed frequently among consecutive C&Cs (high content variability). Based on these two features, we propose a novel C&C analysis mechanism that detects the HTTP-based C&C. The HAS-Analyzer can classify the HTTP-based C&C with an accuracy of more than 96% and a false positive rate of 1.3% without using any white list.

Research on Service-Level Integration of ETSI M2M Platform with Heterogeneous Web Applications based on WSDL 2.0 (WSDL 2.0을 이용한 ETSI 표준 M2M 플랫폼과 이종의 웹 애플리케이션 간의 서비스 차원의 통합 방안 연구)

  • Park, Yunjung;Min, Dugki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1842-1850
    • /
    • 2013
  • ETSI M2M Platforms provide general infra services for machine-to-machine communication. In this paper, we propose a service-level integration methodology which can integrate a ETSI M2M platform with heterogeneous web applications based on WSDL 2.0. Considered heterogeneous web applications are the ones that use SOAP, HTTP and CoAP protocols for inter-communication. The proposed WSDL 2.0-based service-level integration methodology includes the followings; (1) We present a method of how to describe standardized M2M platform service interfaces into a WSDL 2.0 document. (2) A proposed web client generator is used to generates SOAP, HTTP and CoAP client codes from the WDSL 2.0 document. (3) We propose protocol conversion proxies which translate protocols into other protocols in web service run-time.

Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.1-8
    • /
    • 2016
  • Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.

IoT Data Collection Platform Based on Selective Protocols (선택적 프로토콜 기반의 사물인터넷 데이터 수집 플랫폼)

  • Oh, Hyeong-Seok;Kim, Dong-Hwi;Jeon, Hyun-Sig;Park, Hyun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.871-878
    • /
    • 2017
  • As the interest of things to the Internet increases, the market of IoT grows larger and devices and protocols related with IoT are evolving.As these IoT devices and protocols evolve, There was a problem with interoperability. As a result, market and standard of IoT are confused, and communication between objects and objects is being hindered by different platforms. Currently, various IoT platforms are being developed and interoperability with heterogeneous platforms is under study, but the protocols used on each platform are limited and designed to have no generalized structure. Therefore, in this paper, we analyze services of HTTP, CoAP, and MQTT protocols, which are typical in the Internet market, and design services that enable selective protocol communication. We also design resources that apply the RESTful API to generalize platform usage. and We implemented the platform through database modeling for quick processing and safety of the collected data. Through this process, devices communicating with different protocols can be interworked on one platform and We propose a "generalized selective protocol based Internet object data collecting platform" that can be applied to various protocols.

Business Process Meta Model

  • Kim, Dong-Soo
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.191-207
    • /
    • 2001
  • ■ The 1/sup st/ Driver: Electronic Documents ■ EDI via VAN ■ Limited use of electronic processing ■ The 2/sup nd/ Driver: Internet Infrastructure ■ Web/EDI, HTTP, FTP, MIME ■ Open network ■ The 3/sup rd/ Driver: XML ■ Enables the definition of platform-independent protocols for the exchange of data ■ Business Processes and Documents in XML format ■ XML/EDI ■ XML message exchange: SOAP(omitted)

  • PDF

Recent Advances in Web Services Composition and Their Implications to Seamless Business Process Integration.

  • Park, Jong-Hun
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.191-196
    • /
    • 2004
  • Web Service ·A software application identified by a URI, whose interface and bindings are capable of being defined, described, and discovered as XML artifacts A Web service supports direct interactions with other software agents using XML-based messages exchanges via Internet-based protocols(W3C) ·Utilize the WWW infrastructure ·Example : http://etech.kaist.ac.kr:8080/search.html(omitted)

  • PDF

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.