• Title/Summary/Keyword: IP 10

Search Result 2,663, Processing Time 0.029 seconds

E-mail Sending-Server Authorization Method using a Distance Estimation Algorithm between IP Addresses for Filtering Spam (스팸메일 차단을 위해 IP 주소간 거리 측정 알고리즘을 이용하는 전자우편 발송서버의 권한확인 방법)

  • Yim Hosung;Shim Jaehong;Choi Kyunghee;Jung Gihyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.765-772
    • /
    • 2005
  • In this paper, we propose E-mail sending-server authorization method using a distance estimation algorithm between W addresses to check whether the E-mail sending server is registered in the domain of mail sending server or belongs to the domain for filtering spam mail. This method utilizes the distance between the IP address of sending server and IP addresses registered in the DNS to figure out that the E-mail sending server exists in the domain to filter spam mail. The experimental result of applying the proposed algorithm to sample E-mails gathered in a large size laboratory says that 88 percents of legitimate E-mails and only 10 percents of spam mails are sent by servers in the same domains of senders. The algorithm may be effectively used to block spam mails sent by servers outside of the domains of mail senders. It may be also hired as a temporary E-mail protecting system until the standard E-mail authorization protocol is fully deployed.

Adaptive Buffer and Burst Scheme and Its Characteristics for Energy Saving in Core IP Networks (에너지 절약을 위해 적응적 버퍼링 기법을 이용한 버스트 구성 방법 및 특성)

  • Han, Chimoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.34-42
    • /
    • 2012
  • This paper analyses the energy saving basic power models in core IP networks, and proposes the adaptive buffer and burst scheme which is a possible energy saving method, and its implementation algorithm in core IP networks. Especially this paper describes the adaptive buffer and burst scheme dynamically varying the buffering interval B according to the input traffic volume of ingress router, and explains the operation principle of proposed scheme. This method is to adjust the buffering interval B according to input traffic volume of ingress router, that is increasing the interval B when input traffic volume is low, and decreasing the interval B when input traffic volume is high between some given interval regions. This method can gets the high energy saving effect as decreasing the transition number of idle/active in networks when input traffic volume is low, and decreasing the transition number of idle/active by the continuous of burst packets in transit router when input traffic volume is high. This paper shows the increasing of asleep rate for the energy saving of core IP networks and confirms the energy saving of core IP networks by the computer simulation. We confirmed that proposed method can be save the energy of IP networks by properly trade off network performances.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Effects of Dietary Rna and Adenine on Feed Intake and Kidney Weight and Function in Adult Cockerels

  • Kubota, T.;Karasawa, Yutaka
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.10 no.3
    • /
    • pp.260-264
    • /
    • 1997
  • This study was conducted with adult cockerels to determine whether dietary RNA affects feed intake and renal weight and function, and if the responses are similar to dietary adenine. Chickens were ad libitum fed a RNA diet (100 g/kg) or an adenine diet (9.1 g/kg) for 14 d and catheterized in right jugular vein, hepatic portal vein and both urethers, and saline together with para-amino hippuric acid and sodium thiosulfate was continuously infused into them to evaluate renal functions. Dietary RNA reduced feed intake and body weight, and dietary adenine increased kidney weight expressed as a proportion of body weight (P < 0.05). Feed intake and body weight on the adenine diet and kidney weight on the RNA diet showed similar though non significant tendencies. No calculi were detected in the kidney in chickens fed either the RNA or adenine diets. Plasma inorganic phosphate (IP), Ca and 1,25 $(OH)_2$ vitamin $D_3$ concentrations were increased by dietary RNA and adenine, although the increases of IP and Ca in adenine-fed chickens were not significant. Uric acid and urea concentrations in the blood plasma were unaffected by dietary RNA or adenine. Both dietary RNA and adenine increased renal blood flow rates 3.5-3.7 fold, renal plasma flow rates 3.4-3.7 fold and glomerular filtration rates (GFR) 2.9-3.0 fold (p < 0.01). Clearance of urea, IP and Ca were also enhanced by dietary RNA, but not by dietary adenine. However, neither RNA nor adenine affected uric acid clearance. Only IP clearance was significantly augmented at the glomerular level by dietary RNA (p < 0.05). Glomerular filtration of uric acid, urea, IP and Ca and reabsorption of urea, IP and Ca at the renal tubule were increased by dietary RNA and adenine (p < 0.05), whereas tubular secretion of uric acid was decreased by both dietary treatments. It is concluded that dietary adenine is effective in changing renal function and P and Ca metabolism in chickens.

Immunopotentiating Effect of Polysaccharides Extracted from Agrocybe cylindracea (Agrocybe cylindracea로부터 추출한 다당류의 면역증강활성)

  • 김선희;이항우;배만종;이재성
    • Korean Journal of Microbiology
    • /
    • v.36 no.1
    • /
    • pp.64-68
    • /
    • 2000
  • The immunopotentiating effects of the polysaccharides, both intracellular and extracellular, was examined by an animal feeding test. The results are summarized as follows. The oral administration of intracellular and extracellular polysaccharides of Agrocybe cylindracea for 10 days resulted in the enhanced phagocytic activity of peritoneal exudate cells(PEC), spleen cells(SC), and monolymphocytes(ML). In the experiment of PFC(plaque forming cell) and RFC(rosette forming cell), the results showed that all the polysaccharide fractions enhanced the immune related cells. The EAC II group(the extracellular polysaccharide of Agrocybe cylindracea 10 mg/0.2 ml distilled water/day/ mouse) increased the PFC and RFC by 46~50% and 43%, respectively, compared to the control group. On the other hand, the IAC I group(the intracellular polysaccharide of Agrocybe cylindracea 1 mg/0.2 ml distilled water/day/mouse) increased the PFC and RFC by 49~70% and 91%, respectively. In terms of the mitogenic activity, the extracellular polysaccharides of A. cylindracea showed a higher activity than the intracellular polysaccharides.

  • PDF

A buffer management scheme of GFR Service for fairness improvement of TCP/IP traffic (TCP/IP 트래픽의 공평성 향상을 위한 GFR 서비스의 버퍼관리 기법)

  • Kwak, Hyun-Min;Kim, Nam-Hee;Lee, Sang-Tae;Chon, Byong-Sil
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.595-602
    • /
    • 2003
  • In this paper, we proposed new buffer management and cell scheduling scheme of GFR service for improving fairness of TCP/IP traffic in ATM networks. The proposed algorithm used untagged cell, which came to ATM switch, to decide the policy for discard of frame and what kind of VC cell it would serve. Performance analysis through the simulation present that proposed scheme can meet fairness 2 (MCR Plus equal share), which are not met by conventional scheduling mechanism such as WRR. Also, proposed scheme is superior to WRR about 30% in throughput and more efficiency in fairness criteria.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

Consideration about Traffic Characteristics of DV and MPEG2 Streams on IP over ATM (IP over ATM 상에서 DV와 MPEG2 스트림의 트래픽 특성 고찰)

  • Lee, Jae-Kee;Saito, Tadao
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.937-942
    • /
    • 2003
  • In this paper, we measured and examined RTT delays and packet losses according to the changes of stationary loads for two typical stream-type traffics, a DV and a MPGE2 on the R&D Gigabit Network testbed, JGN. As the result of our actual measurements, we realized that the packet size of stationary load have no effects on a DV and a MPGE2 stream on the very high-speed network(50Mbps, IP over ATM). When its bandwidth and stationary load exceeds 95% of network bandwidth, packet losses appeared and RTT delay increased rapidly. Also we realized that the number and size of Receive & Transmit buffer on the end systems have no effects on packet losses and RTT delays.

System Integration for the Operation of Unmanned Audio Center based on AoIP

  • Lee, Jaeho;Hamacher, Alaric;Kwon, Soonchul;Lee, Seunghyun
    • International journal of advanced smart convergence
    • /
    • v.6 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, the development of the information communication industry has made many changes in the industrial acoustic industry. Especially, it has a great influence on the change of system and equipment of acoustic system. Analog equipment is changing to digital equipment, and integrated control equipment makes it easier to operate and manage the sound system. However, the integrated control system currently on the market is only controllable for some devices. In this paper, we propose a new AoIP - based system configuration method, which enables the operation status monitoring, unmanned operation and self - diagnosis of equipment. As a result of the study, it is confirmed that the proposed system can be operated, monitored, and self - diagnosed at remote sites. It is expected that an AoIP- based sound system will be the industry standard in the future.

A Low Bit Rate Speech Coder Based on the Inflection Point Detection

  • Iem, Byeong-Gwan
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.300-304
    • /
    • 2015
  • A low bit rate speech coder based on the non-uniform sampling technique is proposed. The non-uniform sampling technique is based on the detection of inflection points (IP). A speech block is processed by the IP detector, and the detected IP pattern is compared with entries of the IP database. The address of the closest member of the database is transmitted with the energy of the speech block. In the receiver, the decoder reconstructs the speech block using the received address and the energy information of the block. As results, the coder shows fixed data rate contrary to the existing speech coders based on the non-uniform sampling. Through computer simulation, the usefulness of the proposed technique is shown. The SNR performance of the proposed method is approximately 5.27 dB with the data rate of 1.5 kbps.