• Title/Summary/Keyword: IP blocking

Search Result 61, Processing Time 0.029 seconds

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

No-reference Measurement of Blocking Artifacts to Assess the Quality of IP Based Video Service (IP 기반 비디오 서비스의 화질 측정을 위한 비참조 블록 열화 측정 방법)

  • Lee, Seon-Oh;Min, Kyung-Yeon;Sim, Dong-Gyu;Lee, Hyun-Woo;Ryu, Won;Kim, Jin-Sul
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.78-87
    • /
    • 2009
  • In this paper, we propose a new method of blocky artifacts measurement for IP based video service. In order to assess the quality of IP based video service, we classify degradation into blocking artifacts by network error or by transmission error. in order to assess blocking artifacts based on No-reference, we estimate blocky artifacts from network errors and image compression by calculating amount of difference between target block and neighbor blocks and error concealment algorithm in a video receiver. To ensure accuracy of proposed method, we compare our result to MOS data using SSCQE method. Experimental results show that the proposed algorithm is better than a conventional method by around 1.3.

An Agent System for Searching of Host Computer and Blocking Network Access in IPv6 Environment (IPv6 환경에서 호스트 탐색 및 네트워크 접속 차단 에이전트 시스템)

  • Chung, Youn-Ky;Moon, Hae-Eun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.144-152
    • /
    • 2011
  • As IPv4 addresses are exhausting, the use of IPv6 addresses is increasing. IPv6 environment provides address auto-configuration function. If addresses are allocated to each host automatically, network management system has difficulty in inspecting every IP of all devices and keeping the relevant informations. Also, as IP addresses are configured automatically, problems such as malicious users accessing network devices with no restriction can occur. To solve these problems, managing and blocking of malicious user is necessary. In this paper, we suggest agent system for searching of host computer and blocking network access which manages and protects the major network resources efficiently by searching host and blocking unauthorized host access to network in IPv6 environment. According to the test results of function of this agent system in IPv6 environment, we have checked that this system performs searching and blocking function normally.

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

A High Speed IP Address Lookup using Pipelined CAM Architecture(PICAM) (파이프라인 CAM 구조를 이용한 고속 IP주소룩업)

  • Ahn, Hee-Il;Cho, Tae-Won
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.24-34
    • /
    • 2001
  • IP address lookup is a major bottleneck of IP packet processing in high speed router. Existing IP lookup methods are focused only on lookup throughput without considering lookup table update. So their slow update can lead to lookup blocking or wrong routing decision based on obsolete routes. Especially existing IP lookup methods based on CAM(content addressable memory) have slow update of O(n) cycles in spite of their high throughput and low area complexity In this paper we proposes a new IP address lookup method based on pipelined CAM architecture(PICAM) with fast update of O(1) cycle of lookup table and high throughput and low area complexity.

  • PDF

Study on Properties of OLEDS using Zn(HPB)2 as Hole Blocking Layer (Zn(HPB)2를 Hole Blocking Layer로 이용한 OLEDS의 특성 연구)

  • Kim, Dong-Eun;Kim, Doo-Seok;Lee, Burm-Jong;Kwon, Young-Soo
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.18 no.12
    • /
    • pp.1139-1142
    • /
    • 2005
  • Recently, organic light emitting diodes(OLEDs) is widely used as one of the information display techniques. We synthesized 2-(2-hydroxyphenyl)benzoxazole($Zn(HPB)_2$). We studied the luminescent properties of OLEDs using $Zn(HPB)_2$. The ionization potential(IP) and the electron affinity(EA) of $Zn(HPB)_2$ investigated using cyclic-voltammetry(C-V). The IP and EA were 6.5 eV and 3.0 eV, respectively. The PL and EL spectra of $Zn(HPB)_2$ were observed at the wavelength of 450 nm. We used $Zn(HPB)_2$ as an emitting layer and hole blocking layer. At the experiment about hole blocking effect, we inserted $Zn(HPB)_2$ between emiting material layer(EML) and cathode, and between hole transport layer(HTL) and emitting material layer(EML). We measured current density-voltage and luminance-voltage characteristics at room temperature.

High Reliability Rx Power System Design for Military VoIP Phone (군용 VoIP 전화기를 위한 고신뢰성 Rx 전력 시스템 설계)

  • Park, Kyung-Hwa;Park, Hyun-Jeong;Kim, Hyeon-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.857-864
    • /
    • 2020
  • The multi-functional VoIP phone supports the Ethernet protocol in the TIPS(: Tactical IP Switch), which is one of the sub-systems of the tactical information and communication system (TICN). It provides secured voice / video calls in conjunction with VoIP exchanges and supports differential services such as multi-party calls and command functions. In this paper, improving methods have been proposed to reduce power supply defects in the field of multi-functional VoIP phones. The power supply part was improved by applying TVS of the output voltage inlet of the dedicated adapter of the multi-functional VoIP phone, TVS of the PoE module input, adding blocking diodes, and adding DC / DC converters behind the poly-switch. Also, functional and environmental tests were performed to verify the validity of the proposed methods.

Effect of Head of the Line Blocking on Session Initiation Protocol Session Establishment Delays

  • Camarillo, Gonzalo;Schulzrinne, Henning;Loreto, Salvatore;Hautakorpi, Jani
    • Journal of Communications and Networks
    • /
    • v.11 no.1
    • /
    • pp.72-83
    • /
    • 2009
  • We have studied the effect of head of the line blocking (HOLB) on session initiation protocol (SIP) session establishment delays. Our results are based on experiments performed in a test bed and on the public Internet. We used the stream control transmission protocol (SCTP) as a transport for SIP because SCTP can be configured to suffer or to avoid HOLB. Our experiments show that the effect of HOLB on session establishment delays generally starts to be significant starting at fairly low packet loss rates. However, there are scenarios where network conditions are good enough to make the effect of HOLB insignificant.

An Experimental study on the Method of Detection and Blocking against SIP Flooding (SIP 플러딩 탐지 차단 실험방법에 대한 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • Privacy IP hacking problems such as invasion of privacy, password cracking, voice wiretapping and internet over charged occurred, because VoIP internet voice phone service gradually spread. This thesis attempted to attack the VoIP service network by application. First use application to spoof IP address then attempted wiretap the VoIP service and sends a lot of messages to disturb service movement. At this point, we connected VoIP soft terminal, so we can operate real-time filtering operator to block the SIP Flooding offence by monitor the traffic and detect the location where it got attacked. This thesis used experiment to prove it is possible to detect the offence and defend from SIP Flooding offence.

QuTFTP: Quick UDP Trivial File Transfer Protocol (QuTFTP: UDP 기반의 빠른 파일전송)

  • Kim, Byoung-Kug
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.5
    • /
    • pp.438-443
    • /
    • 2020
  • To transfer files between nodes on network based on Ethernet, file transfer protocol (FTP) on TCP/IP and trivial file transfer protocol (TFTP) on UDP/IP are mostly used. Due to the lack of resources (processor, memory and so on) in the embedded system where we generally use for simple works with small firmware like ones; many of the systems implement only UDP/IP for their network stacks. Thus, TFTP is greatly to be preferred. For examples, environmental sensor devices for sensor networks, Boot Loader for general embedded device and preboot execution environment (PXE) boot for PC provide the TFTP. The logic of TFTP is simple for file transmission but, there is Stop-And-Wait problem during the process which occurs long blocking time. In this paper, we propose an algorithm which called QuTFTP(Quick UDP Trivial File Transfer Protocol) to reduce the length of the blocking time and to be compatible with the legacy TFTP.