• Title/Summary/Keyword: IP blocking

Search Result 61, Processing Time 0.051 seconds

Extended Design And Implementation of SIP Proxy Server or Improved Additional Internet Telephony Service (향상된 부가 서비스 지원을 위한 SIP 프락시 서버의 확장 설계 및 구현)

  • 민경주;이종화;강신각;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.875-879
    • /
    • 2002
  • CPL is a technique that serves various additional service in Internet telephony such as call forwarding, call blocking etc. IETF IPTEL working group developed this CPL standard. Users could request various additional services such as call forwarding, call blocking etc. by registering XML scripts to location servers. This paper would describe the design and the implementation skill of SIP proxy server that support these improved functionalities in detail. SIP registrar and SIP proxy server are designed and implemented in Linux platform because this platform serves fast and low cost development environment.

  • PDF

A Study on Multi-Wavelength-Minimum Interference Path Routing Algorithm Mapping Scheme OSPF-TE+ Establishing Optimal Optical-LSPs in OVPN (OVPN에서 최적의 Optical-LSP를 설립하기 위한 OSPF-TE+ 내의 다중파장 최소간섭 경로 라우팅 알고리즘 적용 방안 연구)

  • 정창현;현혜경;강오한;조광현;김성운
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.136-138
    • /
    • 2004
  • IP망을 활용한 VPN(Virtual Private Network)에서의 QoS 보장 및 광대역 서비스 제공에 대한 해결 방안으로 차세대 광 인터넷을 통한 OVPN(Optical VPN) 기술이 제시되고 있다. 차세대 광 인터넷의 구현이 IP/GMPLS(Generalized Multi-Protocol Label Switching) over DWDM(Dense Wavelength Division Multiplexing) 프로토콜 프레임워크로 표준화되고 있는 현실에 비추어 볼 때 IP/GMPLS over DWDM 백본망을 통한 OVPN은 차세대 가상사설망으로써 멀티미디어 서비스 제공을 위한 최적의 방안이다. 이러한 멀티미디어 서비스 제공을 위한 OVPN에서는 최적의 Optical-LSP(Label Switched Path)의 설립이 요구되고 있다. 따라서 본 논문에서는 차세대 OVPN의 모델 및 망의 blocking probability를 향상하기 위한 미래의 잠재적인 연결 요구에 대해 간섭을 최소화하면서 경로를 설정하는 MW-MIPR 라우팅 알고리즘을 제시하고 이를 라우팅 프로토콜인 OSPF-TE+(OSPF Extensions in Support of Generalized MPLS)에 맵핑하기 위한 방안을 제안한다.

  • PDF

Improvement of Handoff-state and QOS in Wireless Environment

  • Jeong, You-Sun;Choe, U-Gin
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • In this paper, we propose for improving QoS in wireless micro cellular network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP and propose for performance of realtime and non-real time handoff service using Handoff state machine Paging Route Cache. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it bas its vulnerability in frequent handoff environment. On the other hand, Cellular IP combines the capability of cellular networks to provide high performance handoff and efficient location management of active and idle mobile users with the inherent flexibility, robustness and scalability found in IP networks. Also Cellular-IP/PRC use semi-soft handoff. During semi-soft hand off a mobile host may be in contact with either of the old and new base stations and receive packets from them. Packets intended to the mobile node are sent to both base stations and buffered, so when the mobile host eventually moves to the new location it can continue to receive packets without interruption. It should be suitable for realtime service such as multimedia traffic. But, much waste of resource will occur in this method, especially for non-real time services such as FTP and E-mail. Therefore, a new algorithm that performs different handoff according to characteristic of each traffic by use of reserved field in IP packet is proposed in this thesis. This hand off state machine using differentiated handoff improves quality of services in Cellular-IP/PRC. Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. Matlab simulation results are improving QoS, show call drop and call blocking provided to Paging Router Cache during handoff state machine in Cellular-IP/PRC.

TCP/IP for safety operation for EMU** and DMU*** Trains by PoE (전기동차와 디젤동차에서의 TCP/IP운용을 위한 PoE*의 사용에 의한 안전성 방안)

  • Hong, Seon-Ho;Ha, Jae-Ho;Kim, Yung-Tae
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.848-854
    • /
    • 2009
  • Of the rapid development of modem civilization development is one of the IT industry. The Network is the root of the discrete industry. Most of the Protocol is used by LAN and the TCP / IP. Slowly in the railway operation of this Network is being applied. It also used to train and they are operated. The concept of the road, the Network TCP / IP using a non-Star structure of the Main Unit and the Bus Network is designed to structure consists of the Network. This structure is a simplified DATA. Data of complex operations is easy to feel the speed limit is. In addition, all devices must be independent to the operating system with the ability to manage the operation and stability in terms of exactly how the transmission of Data is gonna work pass. And transmission occurs in the middle of the Noise and the device is available to manage the power. Noise in the power of the railway to ensure the efficient transfer of Data is by blocking. Also, by presenting the entire system's operational safety should be guaranteed the safety of the railway.

  • PDF

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

A Study on the efficiency improvement of OLED using Zn-Complex (Zn-complex를 이용한 OLED 효율향상에 관한 연구)

  • Jang, Yoon-Ki;Kim, Byoung-Sang;Lee, Burm-Jong;Kwon, Young-Soo
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.23-24
    • /
    • 2006
  • We have synthesized electroluminescence materials. including [2-(2-hydroxyphenyl)benzoxazole] (Zn(HPB)$_2$), [(2-(2-hydroxyphenyl)benzoxazole)(8-hydoxyquinoline)] (Zn(HPB)q) and [(1, 10-phenanthroline)(8-hydroxyquinoline)] Zn(phen)q. The ionization potential (IP) and electron affinity (EA) of each Zn-complex was measured using cyclic-voltammetry (C-V). Basing on the consideration of matched in the energy levels of the materials. We investigated the electron transporting properties of Zn(HPB)q and Zn(phen)q compared with $Alq_3$, and also we investigated the hole blocking properties of Zn(HPB)$_2$, compared with BCP. As a result, we used Zn-complex to enhance the performance of OLED. Therefore, we demonstrate that Zn(HPB)q and Zn(phen)q are useful as an electron transporting material. Zn(HPB)$_2$ is also good a hole blocking material.

  • PDF

A Study on Heuristic Approaches for Routing and Wavelength Assignment in WDM All-Optical Networks (WDM 전광망에서 라우팅과 파장할당을 위한 휴리스틱 방법에 대한 연구)

  • Kim, Ki-Won;Chung, Young-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.19-29
    • /
    • 2001
  • The recent explosion in the Internet applications, Internet. host number and the traffic in the IP backbone network is posing new challenges for transport network. This requires a high-speed IP backbone network that has a substantially higher bandwidth than the one offered by current networks, which prompts the development of all-optical network. To obtain optical network utilization gains, we need a software which establishs logical topology to make possible the efficient use or physical topology, and control the optical network in combination with the IP layer routing protocols. Finally, the logical topology is required higher efficient than physical topology. For this an efficient algorithm for the routing and wavelength assignment(RWA) in the WDM all-optical network is necessary. In this paper, two kinds of heuristic algorithms to establish logical topology for WDM networks and arc applied to the design of logical topology of domestic backbone network. These algorithms are found to work quite well and they arc compared with each other in terms of blocking rate, etc.

  • PDF

System for Real Time Intrusion Detection and Blocking (실시간 침입탐지 및 차단을 위한 시스템)

  • 김익수;김명호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.844-846
    • /
    • 2002
  • 기존에 보안을 위해 개발되어온 취약점 검색도구는 최근 들어 불법침입을 위한 도구로 이용되고 있으며 이제는 웹사이트에서도 쉽게 취약점 검색도구와 악의적인 프로그램들을 구할 수 있게 되었다. 이에 대한 방안으로 현재 침입차단 기능을 가지는 방화벽과 침입탐지 기능을 가지는 침입탐지시스템이 개발되어 왔다. 방화벽은 외부 네트워크와 내부 네트워크 사이에 위치하여 인증된 트래픽만을 허용함으로써 보안을 유지할 수 있으나 사전에 미리 IP 주소나 포트 등을 등록하여 해당 IP 주소와 포트로부터의 접근을 허용하거나 막는 정적인 방법이었다. 또한 침입탐지시스템은 침입탐지에 대한 룰을 내장하여 칩입행동을 실시간으로 탐지하는 기능을 가지지만 그에 대한 대응이 실시간 차단이 아니라 공격자와 관리자에게 경고메일을 보내는 수준이므로 침입탐지 이후에 생기는 불법행동에 대한 커다란 위험이 따른다 본 논문에서는 그에 대한 해절 방안으로 방화벽의 침입차단 기능과 침입탐지시스템의 실시간 침입탐지 기능을 갖춘 실시간 침입탐지 및 차단을 위한 시스템을 제안한다.

  • PDF

The proposal of access blocking methods in messenger (메신저의 통신 구조 분석 및 사용 차단 방식의 제안)

  • Ahn, Kyu-Sung;Chey, Jin-Ku
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.91-94
    • /
    • 2010
  • 기업 내에서 메신저 사용으로 인한 정보 유출이나 근무태만에 대하여 대처하기위해 메신저 사용을 차단하는 방법은 제안한다. 차당방법을 제안하기에 앞서 현재 범용의 메신저를 실제 IP 스니핑을 통한 테스트로 구조를 분석하고 그 분석된 구조를 바탕으로 메신저 차단 제어의 3가지 방법을 제안 한다.

  • PDF

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.