• Title/Summary/Keyword: ICMP

Search Result 70, Processing Time 0.029 seconds

A Study on the Algorithms of One-way Transmission for Stable Data Sharing (안정적인 데이터 공유를 위한 일방향 전송 알고리즘에 대한 연구)

  • Kang, Min Kyung;Koh, Keun Ho;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.61-68
    • /
    • 2016
  • As many high-tech researches are shown in various field by sharing data via computer network, a necessity for stable data-sharing environment has suggested steadily. This research covers one-way communication protocol which is newly developed through the necessity. In this protocol, data is transmitted only in one way. One-way transmission has strong possibility to protect system from uncertain and potential risk, but it is impossible to receive ACK(Acknowledge Character) packet about data. Therefore, we need to find a way which duplex protocol such as TCP, ICMP works properly and practical communication falls under one-way transmission environment. To conclude, we analysed possible scenario in each protocol from three layers - interface layer, internet layer and transmission layer and approached how to resolve the problem in each way.

A Network Monitoring System with Automatic Network Configuration (자동 망 구성 기능을 갖는 네크워크 모니터링 시스템)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.93-102
    • /
    • 2011
  • In this paper we describe an efficient and easy to use network monitoring system which can identify network configuration automatically by means of capturing and analyzing the ARP broadcasting packets. After identifying network nodes, it gathers detail information of each node such as NETBIOS name and number of hop counts using ICMP and then shows subnet configuration with graphical method. This monitoring system also has a subset of intrusion detection system that can monitor any port scanning trial. With this automatic network configuration functions, it helps to lessen address keeping track overhead which is crucial for network monitoring so that it provides efficient network management.

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

Genome Wide Analysis of the Potato Soft Rot Pathogen Pectobacterium carotovorum Strain ICMP 5702 to Predict Novel Insights into Its Genetic Features

  • Mallick, Tista;Mishra, Rukmini;Mohanty, Sasmita;Joshi, Raj Kumar
    • The Plant Pathology Journal
    • /
    • v.38 no.2
    • /
    • pp.102-114
    • /
    • 2022
  • Pectobacterium carotovorum subsp. carotovorum (Pcc) is a gram-negative, broad host range bacterial pathogen which causes soft rot disease in potatoes as well as other vegetables worldwide. While Pectobacterium infection relies on the production of major cell wall degrading enzymes, other virulence factors and the mechanism of genetic adaptation of this pathogen is not yet clear. In the present study, we have performed an in-depth genome-wide characterization of Pcc strain ICMP5702 isolated from potato and compared it with other pathogenic bacteria from the Pectobacterium genus to identify key virulent determinants. The draft genome of Pcc ICMP5702 contains 4,774,457 bp with a G + C content of 51.90% and 4,520 open reading frames. Genome annotation revealed prominent genes encoding key virulence factors such as plant cell wall degrading enzymes, flagella-based motility, phage proteins, cell membrane structures, and secretion systems. Whereas, a majority of determinants were conserved among the Pectobacterium strains, few notable genes encoding AvrE-family type III secretion system effectors, pectate lyase and metalloprotease in addition to the CRISPR-Cas based adaptive immune system were uniquely represented. Overall, the information generated through this study will contribute to decipher the mechanism of infection and adaptive immunity in Pcc.

Development of Embedded Network Processor (임베디드 네트웍용 프로세서 개발)

  • 유문종;최종운
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.6
    • /
    • pp.1078-1082
    • /
    • 2001
  • This is an example of ABSTRACT format. We made a HTTP server using 8 bit microprocessor It was TMP84c015 which applied a z80 core and RTL8019AS was installed for an ethernet physical layer. Assembly language was used to optimized a performance of the MPU, to overcome an restriction of memory sire and to maximize the throughput of packet using TCP, UDP, IP, ICMP, ARP protocol. We used LabVIEW to verify the each protocol on the client side.

  • PDF

Harmful Traffic Analysis on the IPv6 Environment (IPv6 환경에서의 유해 트래픽 분석)

  • Koo Hyang-Ohk;Baek Soon-Hwa;Oh Chang-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.195-199
    • /
    • 2005
  • The IPv6 environment combined the home network and the Internet with has arrived, the damages cased by the attacks from the worm attacks and the various virus has been increased. In this paper we analyze the traffics of TCP, UDP and ICMP, and propose for a method to detect harmful traffics in the IPv6 environment.

  • PDF

The IPv6 Router Design on Embedded Linux (임베디드 리눅스를 이용한 IPv6 라우터의 설계에 관한 연구)

  • 류재훈;김정태;류광렬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.243-246
    • /
    • 2003
  • The design of router that converts IP packets from IPv4 network to IPv6 network using embedded Linux toolkit based on processor is presented. As an address transition platform, IPv6 module is transplanted to Linux using processor and the experiment was done with IPv4 and IPv6. In order to build the test network, it is constructed with Tunneling mechanism of IPv4 and IPv6 network. The packet value is obtained about 2$\mu$sec on average a 2 hops on the ICMP ping6.

  • PDF

A Study of Client Side Defence Method of UDP/ICMP Attack (UDP/ICMP 플러딩 공격에 대한 클라이언트 측 방어 기법 연구)

  • Kim, Dong-Hoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.667-669
    • /
    • 2012
  • Traditional DDoS defence methods are performed at server side which was attacked. If servers detect DDoS attack, they use some methods for defending the attack such as increasing the bandwidth, bypassing the traffic, blocking the IP addresses or blocking the ports by the firewall. But as lots of people use smart-phones, it is possible a smart-phone to be a zombie and DDoS attack could be much more a huge and powerful forms than now. Victims are not only a server but also a host which becomes a zombie. While it performs DDoS attack, zombie smart-phone users have to pay the extra charge. After finish the attack, DDoS try to destroy hard drives of zombie hosts. Therefore the situation is changed rather than to defend DDoS server side only, we should protect a client side who needs to prevent DDoS attacks. In this paper, we study a defence method that we terminates a process which perform the attack, send the information to different hosts when a zombie PC or smart-phone perform DDoS attacks.

  • PDF

A Posterior Annuloplasty, Papillary Muscle Plication and Left Ventricle Reduction Through Left Ventriculotomy in Severe Ischemic Cardiomyopathy with Mitral Regurgitation (승모판 폐쇄 부전을 동반한 허혈성 심근병증에서 좌심실 절개를 통한 승모판 성형술 및 유두근 단축술과 좌심실 용적 축소술)

  • Jung Jong-Pil;Cho Won-Chul;Kim Joon-Bum;Lee Jae-Won
    • Journal of Chest Surgery
    • /
    • v.39 no.7 s.264
    • /
    • pp.549-552
    • /
    • 2006
  • In the mitral regurgitation (MR) accompanied with a serious ischemic cardiomyopathy (ICMP), coronary revascularization to viable myocardium, LV reduction and mitral reconstruction become the main surgery under the bad conditions that the cardiac transplantation is not so easy. The MR in ischemic cardiomyopathy appears as various pathologic factors, among them, the papillary muscle displacement in addition to the annular dilatation is pointed out as the important cause. Our hospital would like to report the experience of the surgery about coronary revascularization to the left main with 3-vessel coronary disease, severe ICMP patients accompanied with the MR, posterior mitral annuloplasty and papillary muscle plication through the LVtomy.

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.