• Title/Summary/Keyword: IP System

Search Result 2,128, Processing Time 0.033 seconds

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Implementation of QoS Control Function in SIP based VoIP System (SIP 기반 VoIP 시스템에서 QoS 제어기능 구현)

  • 라정환;윤덕호;김영한;김은숙;강신각
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.18-26
    • /
    • 2003
  • In this paper, we design and implement a QoS control function in the SIP-based VoIP system. As a network infrastructure for VoIP service, we select the Intserv over Diffserv architecture where the network resources are managed by a call admission control mechanism. The SIP protocol extended to support QoS signaling procedure is modulized to operate independently with the infrastructure. The performance of the QoS-enabled VoIP system is verified by experiments.

Security Certification for DHCP Power-Saving System (DHCP 절전시스템을 위한 보안 인증)

  • Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.1-9
    • /
    • 2010
  • Abstract The DHCP power saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the vulnerability to IP spoofing attacks, therefore we need to solve the mistake that disrupt the entire network system rather than saving electric power. In this paper, we propose the authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the saving power system.

OASIS : Large-scale, wide-area storage system based on IP (OASIS : IP 기반의 대규모 광역 스토리지 시스템)

  • Kim, Hong-Yeon;Kim, Young-Chul;Jin, Ki-Sung;Kim, Young-Kyun;Lee, Mi-Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.275-279
    • /
    • 2004
  • In this paper, a large-scale, wide-area storage system based on IP is proposed which is under development. OASIS is a storage system enforced with very high-scalability up to hundreds and thousands of clients over IP network, and it is able to extend the service to the wide area network. For this purpose, we adopt an storage interconnection technology based on IP, the object based storage technology and a clustered server architecture which provides high-scalability and availability to our system. This system can be utilized to provide network storage service which gains more reality with the incoming FTTH and WiBro services.

  • PDF

Information Technology System-on-Chip (정보기술 시스템온칩)

  • Park, Chun-Myoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.769-770
    • /
    • 2011
  • This paper presented a method constructing the ITSoC(Information Technology System-on-Chip). In order to implement the ITSoC, designers are increasing relying on reuse of intellectual property(IP) blocks. Since IP blocks are pre-designed and pre-verified, the designer can concentrate on the complete system without having to worry about the correctness or performance of the individual components. Also, embedded core in an ITSoC access mechanisms are required to test them at the system level. That is the goal, in theory. In practice, assembling an ITSoC using IP blocks is still an error-prone, labor-intensive and time-consuming process. This paper discuss the main challenge in ITSoC designs using IP blocks and elaborates on the methodology and tools being put in place for addressing the problem. It explains ITSoC architecture and gives algorithmic details on the high-level tools being developed for ITSoC design.

  • PDF

Study on QoE of the VoIP Service for QoS levels over LTE Mobile Communication System (LTE 이동통신 시스템에서 QoS 변화에 따른 VoIP 서비스의 사용자 체감 품질 변화에 대한 연구)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.309-316
    • /
    • 2016
  • Recently, the voice service over a mobile communication system tends to be provided based on the packet-based technology. Even though the sufficient transmission rate is supported by LTE mobile communication system, the quality of VoIP service that is experienced by the user can be degraded by the change in the transmission conditions and the terminal mobility. This paper has established an environment on which experiments are conducted for the different values of the major parameters that represent the transmission conditions. The result can contribute to the decision of the requirement that the mobile system should meet for maintaining the quality of VoIP service.

Design of a Remote Distributed Embedded System Using the Internet and CAN (인터넷과 CAN을 이용한 원격 분산 Embedded System 설계)

  • Lee, Hyun-suk;Lim, Jae-nam;Park, Jin-woo;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.5
    • /
    • pp.434-437
    • /
    • 2002
  • A small size and light-weight DSP board is newly designed for a real time multi-distributed control system that overcomes constraints on time and space. There are a variety of protocols for a real-time distributed control system. In this research, we selected CAN for the multi distributed control, which was developed by the BOSCH in the early 1980's. If CAN and Internet are connected together, the system attains the characteristics of a distributed control system and a remote control system simultaneously. To build such a system. The TCP/IP-CAN Gateway which converts a CAN protocol to TCP/IP protocol and vice verse, was designed. Moreover, the system is required to be small and light-weighted for the high mobility and cost effectiveness. The equipment in remote place has a TCP/IP-CAN Gateway on itself to be able to communicate with another systems. The received commands in the remote site are converted from TCP/IP protocol to CAN protocol by the TCP/IP-CAN Gateway in real time. A simulation system consists of a TCP/IP-CAN Gateway in remote place and a command PC to be connected to Ethernet.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

Design and Implementation of Audio Transmission System Based on AoIP (AoIP 기반 음향전송시스템의 설계 및 구현)

  • Kang, Min-Soo;Sung, Kil-Young;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1415-1419
    • /
    • 2008
  • In this paper, we investigate various Audio Transmission Systems to implement Audio Transmission System based on AoIP of Internet transmission technology TCP/IP Network and we design and implement a Audio transmission system based on AoIP by adopting the most efficient one. The implemented system can be applied for various professional audio systems with large-scale audio distribution network as well as small-scale PA systems. Moreover, this can be applied in various fields which need audio transmission.

The Gateway for Internet Server Implementation using Dynamic IP Address (동적 IP Address를 사용하는 인터넷 서버 구축을 위한 게이트웨이)

  • Kim, Won-Jung;Yang, Hyeon-Taek
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.145-152
    • /
    • 2002
  • Recently most of the home and small-size company use ADSL(Asymmetric Digital subscriber Line) or Cable Modem for using Internet Services. The number of Internet IP Address in current Internet IP Address System(IPv4) that is consisted of 4byte is almost empty, so generally the IP Address assigned dynamically is used. This way is just OK in general uses, but not OK in Internet Servers operation. This paper designed the gateway(Gate-D) system which is enable any system that get IP Address assigned dynamically to serve Internet Server Services(Telnet, FTP, HTTP, Mail, etc …), and made sure the worth by using Telnet Server.