• Title/Summary/Keyword: HTTP protocols

Search Result 37, Processing Time 0.022 seconds

A Vulnerability Analysis of Paid Live Streaming Services Using Their Android Applications (안드로이드 앱을 이용한 실시간 유료 방송 취약점 분석)

  • Choi, Hyunjae;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1505-1511
    • /
    • 2016
  • Live streaming is a method to provide media service by sending recoded media to a user's video player. In order to provide video and audio contents in real-time for a large number of users simultaneously, live streaming compatible protocols such as RTMP (Real Time Messaging Protocol), HLS (Http Live Streaming), are required. In this paper, we analyzed vulnerability of paid live streaming services with the captured packets from the applications used by six major OTT (over-the-top) companies in Korea supporting live streaming services. We found that streaming channels were not encrypted and access control mechanisms were not properly used. Thus, guest users can freely use paid live streaming services.

Development of a Bi-Directional Security Light Control System based on Low-Bandwidth Wireless Sensor Network (저대역 센서 네트워크 기반의 양방향 보안등 관제 시스템 개발)

  • Lee, Ho-Gun;Lee, Sang-Ho;Lee, Suk-Gyu;Choi, Jeong-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.10
    • /
    • pp.58-66
    • /
    • 2010
  • This paper shows an implementation and management result of wireless networks based security light control system, which performs a great role in protection of pedestrians and prevention of crime. Conventional security light units have severe limits in confirmation and inspection of security light unit failure, like wilful damage by someone or failure by influence of other equipment or failure by spontaneous heat-increase, and so on. In addition, local government offices are responsible for maintenance of security light units and as a matter of fact, most of civil complaints are about security light units. It is an obvious that the existing security light maintenance system reaches the limit and the security light maintenance problem is a difficulty of local government. Therefore, efficient security light control system is needed, which enables central control and intelligent maintenance. Moreover, the system has to be easy to control and has to be stable. In this study, wireless sensor network based security light control system is implemented, which is independent of programming language and platform, and which is simple to control and extend the system. The proven protocols, HTTP and SOAP, are utilized in order to improve the system reliability. This paper shows the excellence of our proposed system by implementing and operating it in real environment.

Development of the Small Gas Boiler Controller Using Web Browser (Web browser를 이용한 가정용 가스보일러 제어기술 개발)

  • Shon, Su-Goog
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.6
    • /
    • pp.213-219
    • /
    • 2004
  • This paper describes the developmnet of a web-based boiler controller which can be in parallel operated with an existing boiler controller. The web-based boiler controller mainly consists of RTL8019AS NIC and TS80C32 microcontroller. In order to communicate over the Internet, we need to develop network driver, IP, TCP, UDP, ICMP, and HTTP. For a specific application like web-boiler controller, we have proposed a common global data buffer algorithm to minimize the RAM memory usage. Finally, the correctness and performance of the protocols are tested and verified using CommView and Dummynet. The development is satisfactorily operated only for few hundreds of bytes of RAM usage without sacrificing interoperability between hosts.

IoT Healthcare Communication System for IEEE 11073 PHD and IHE PCD-01 Integration Using CoAP

  • Li, Wei;Jung, Cheolwoo;Park, Jongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1396-1414
    • /
    • 2018
  • With the proliferation of the Internet of Things (IoT) healthcare devices, significant interoperability issue arises where devices use proprietary data transfer protocols. The IHE PCD-01 standard has been suggested for the exchange of healthcare data in ISO/IEEE 11073 PHD data model. However, the PCD-01 is not efficient to be used in the IoT environment. This is because the use of SOAP for PCD-01 may be too complex to be implemented in the resource-constrained IoT healthcare devices. In this paper, we have designed a communication system to implement ISO/IEEE 11073 and IHE PCD-01 integration using the IETF CoAP. More specifically, we have designed the architecture and procedures, using CoAP, to seamlessly transmit the bio-signal from the tiny resource-constrained IoT healthcare devices to the server in a standardized way. We have also built the agent, gateway, and PCD-01 interface at the server, all of which are using the CoAP as a communication protocol. In order to evaluate the performance of the proposed system, we have used the PCD data to be transmitted over CoAP, MQTT, and HTTP. The evaluation of the system performance shows that the use of CoAP results in faster transaction and lesser cost than other protocols, with less battery power consumption.

Update Protocols for Web-Based GIS Applications (웹 기반 GIS 응용을 위한 변경 프로토콜)

  • An, Seong-U;Seo, Yeong-Deok;Kim, Jin-Deok;Hong, Bong-Hui
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.321-333
    • /
    • 2002
  • As web-based services are becoming more and more popular, concurrent updates of spatial data should be possible in the web-based environments in order to use the various services. Web-based GIS applications are characterized by large quantity of data providing and these data should be continuously updated according to various user's requirements. Faced with such an enormous data providing system, it is inefficient for a server to do all of the works of updating spatial data requested by clients. Besides, the HTTP protocol used in the web environment is established under the assumption of 'Connectionless'and 'Stateless'. Lots of problems may occur if the scheme of transaction processing based on the LAN environment is directly applied to the web environment. Especially for long transactions of updating spatial data, it is very difficult to control the concurrency among clients and to keep the consistency of the server data. This paper proposes a solution of keeping consistency during updating directly spatial data in the client-side by resolving the Dormancy Region Lock problem caused by the 'Connectionless'and 'Stateless'feature of the HTTP protocol. The RX(Region-eXclusive) lock and the periodically sending of ALIVE_CLIENTi messages can solve this problem. The protocol designed here is verified as effective enough through implementing in the main memory spatial database system, called CyberMap.

Protocol Implementations for Web Based Control Systems

  • Shoo Sugoog
    • International Journal of Control, Automation, and Systems
    • /
    • v.3 no.1
    • /
    • pp.122-129
    • /
    • 2005
  • We describe the MiniWeb[7] TCP/IP stack (mIP), which is an extremely small implementation of the TCP/IP protocol suite running 8 or 32-bit micro controllers intended for embedded control systems, and satisfying the subset of RFC1122 requirements needed for host­to-host interoperability over different platforms. Our TCP/IP implementation does sacrifice some of TCP's mechanisms such as fragmentation, urgent data, retransmission, or congestion control. Our implementation is applicable to web based controllers. The network protocols are tested in operational networks using CommView and Dummynet where the various operational parameters such as bandwidth, delay, and queue sizes can be set and controlled.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Implementation of Smart Home Network System based on CoAP/6LoWPAN in Mobile Environment (모바일 환경에서 CoAP/6LoWPAN 기반의 스마트 홈네트워크 시스템 구현 및 성능 분석)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.99-105
    • /
    • 2018
  • As the Internet of Thing(IoT) technology recently has become a big issue, many researches have been carried out to link the Internet of things with the home network system. Various home network systems are being implemented to connect many devices used in the home with the Internet and to control and operate the devices using a smart phone. However, existing protocols that operate on the Internet are not suitable for a limited environment such as low power, low capacity, and low performance. Therefore, the Internet Engineering Task Force (IETF) Working Group proposed the CoAP/6LoWPAN technology as a suitable protocol for internetworking IoT devices with the Internet in a limited environment and adopting it as a standard. In this paper, a smart home network system is implemented to control and operate various IoT devices in a home using CoAP/6LoWPAN in mobile environment. The performance of HTTP and CoAP such as data transmission time, data transmission rate is analyzed.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

Trends in Research on Children with Cancer and Their Families in Korea (소아암 아동과 가족에 관한 국내 연구 동향)

  • Cho, Hun-Ha;Yoon, Ji-Won
    • Child Health Nursing Research
    • /
    • v.16 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Purpose: This study was designed to analyze recent trends in pediatric oncology research in Korea and suggest future research directions in this area. Methods: Studies (105) selected from http://www.riss4u.net for last 15 yr were used. They were analyzed by publication type, field and design of the study, study participants, main theme, and outcome variables used in intervention studies. Results: 1. Of the 105 studies, 67 were master and doctoral dissertations and 49.5% of studies were conducted in nursing. 2. There were 73 (69.5%) quantitative studies and 20 (19.1%) qualitative research studies and the most frequently used study design was that of a descriptive study. 3. Children with cancer undergoing treatment and their parents, mostly mothers, were the participants most frequently studied. 4. Most themes were psychological/spiritual problems, coping, and family function. 5. Most frequently measured outcome variables were nausea/vomiting, fear/anxiety and adjustment. Conclusion: The results indicate that future research should include more well-designed intervention studies to develop new intervention protocols and to confirm the effect of previous study findings. It is also necessary to use an interdisciplinary approach to deal with physical and psychosocial needs of these children and their families including siblings and fathers of children with cancer.