• Title/Summary/Keyword: IP traffic

Search Result 635, Processing Time 0.032 seconds

Pushback Based Advanced Packet Marking Mechanism for Traceback (Pushback 방식을 적용한 패킷 마킹 기반 역추적 기법)

  • Lee, Hyung-Woo;Choi, Chang-Won;Kim, Tai-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1120-1130
    • /
    • 2004
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Existing proactive tracing scheme(such as packet marking and messaging) prepares information for tracing when packets are in transit. But, these scheme require additional network overhead. In this paper, we propose a "advanced Traceback" mechanism, which is based on the modified Pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate marked packet for reconstructing origin DDoS attack source, by which we can diminish network overload and enhance Traceback performance.

  • PDF

Dynamic Routing and Wavelength Assignment Algorithm to Improve Energy Efficiency in IP over WDM Network with Multifiber (다중 광섬유 링크를 갖는 IP over WDM 망에서 에너지 효율 향상을 위한 동적 경로 배정 및 파장 할당 알고리즘)

  • Lee, Ki-Beom;Kang, Keun-Young;Kim, Do Young;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.370-379
    • /
    • 2014
  • Recently, the interest in optical network with multifiber link is continuing to rise since the network traffic has been growing exponentially. However, growing traffic in network leads to increasing the energy consumption of the network equipment. In this paper, we propose a dynamic routing and wavelength assignment (RWA) algorithm based on V-like cost function and layered graph to improve energy efficiency in IP over WDM network with multifiber link. The V-like cost function is used to decide the fiber cost according to the number of used wavelengths. The layered graph with multifiber link is used to select the energy efficient route and wavelength. The proposed RWA algorithm is compared and analyzed with conventional algorithm in view of average power consumption and blocking probability through OPNET modeler.

Advanced ICMP Traceback Mechanism Against DDoS Attack in Router (DDoS 공격에 대한 개선된 라우터 기반 ICMP Traceback iT법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2003
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive dating. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a 'advanced ICW Traceback' mechanism, which is based on the modified pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source, by which we can diminish network overload and enhance Traceback performance.

Transmission of Moving Image on the Internet Using Wavelet Transform and Neural Network (웨이블릿변환과 신경회로를 이용한 동영상의 실시간 전송)

  • Kim, Jeong-Ha;Lee, Hak-No;Nam, Boo-Hee
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.11
    • /
    • pp.1077-1081
    • /
    • 2004
  • In this Paper we discuss an algorithm for a real-time transmission of moving color image on the TCP/IP network using wavelet transform and neural network. The Image frames received from the camera are two-level wavelet-transformed in the server, and are transmitted to the client on the network. Then, the client performs the inverse wavelet-transform using only the received pieces of each image frame within the prescribed time limit to display the moving images. When the TCP/IP network is busy, only a fraction of each image frame will be delivered. When the line is free, the whole frame of each image will be transferred to the client. The receiver warns the sender of the condition of traffic congestion in the network by sending a special short frame for this specific purpose. The sender can respond to this information of warning by simply reducing the data rate which is adjusted with a neural network or fuzzy logic. In this way we can send a stream of moving images adaptively adjusting to the network traffic condition.

An Extended Service Filtering Technique for Mass Calling-Type Services Using Intelligent Peripheral in an SCP-Bound Network

  • Jeong, Kwang-Jae;Kim, Tae-Il;Choi, Go-Bong
    • ETRI Journal
    • /
    • v.20 no.2
    • /
    • pp.115-132
    • /
    • 1998
  • This paper proposes an extended service filtering technique to prevent overload in service control point (SCP) due to televoting (VOT) or mass calling (MAS) services with the heavy traffic characteristics. Also, this paper compares this extended technique with the existing overload control techniques, and calculates steady state call blocking probabilities in intelligent network (IN) under overload conditions. The proposed technique considers SCP overload and IN Capability Set (CS)-1 services (such as VOT or MAS service) that have to use the specialized resources of intelligent peripheral (IP). This technique uses first an activating step in which SCP requests service filtering to service switching point (SSP). Then, in the filtering step, SSP sends filtering results to SCP periodically or each N-calls. Also, when filtering time-out expires, SSP stops service filtering, and sends service filtering response to SCP in the deactivating step. This paper applies this technique to VOT/MAS service, and calculates SCP and SSP-IP (circuit) call blocking probabilities by using an analytical VOT/MAS service model. With the modeling and analyzing of this new technique, it shows that this technique reduces the traffic flow into SCP from SSP and IP prominently.

  • PDF

A Study on the Analysis of Risk Factor on Highway Alignment Using RTK GPS (RTK GPS를 이용한 도로선형 위험요소 분석에 관한 연구)

  • Jang, Ho-Sik;Seo, Dong-Ju;Lee, Jong-Chool
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.10 no.1 s.19
    • /
    • pp.67-76
    • /
    • 2002
  • At a recent, with an increase of traffic demand and a spread of automobile culture, the safety, convenience and speed of highway is required. On this study, using the real time kinematic GPS, observation value at a center line of ready-built road is obtained and then design specification of highway, IP, IA and R are obtained by least square method. Using those IP, IA and R, we analysed the risk factor of highway alignment by the standard for structure and facility of the road. With using RTK GPS, we could analyse dangerous element of highway alignment rapidly and cope with dangerous area of the existing road. It is also proved to apply availably whether we determine alignment improvement is needed or not or analyze source of accident related with alignment in the region having a high traffic accident rate.

  • PDF

GMPLS-based Recovery Scheme Handling the Requirements for Various Service Types (다양한 서비스들의 요구사항을 만족하는 GMPLS 기반 복구 기법)

  • Lee, Yonggyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.714-724
    • /
    • 2022
  • The spread of mobile devices comes to increase explosive data traffic and then results in various types of service demands. In order to satisfy the increment of traffic and the requirements for various services, optical internet technologies that transmit several Tbps through only a single optical fiber have been actively studied. Because of the large bandwidth, an optical link can accommodate a large number of service types. Therefore, new technologies are required to guarantee the survivability of optical internet and handle the requirements of each service. So, in this article, a new scheme based on GMPLS technologies is proposed to deal with the various service demands and survivability issues in IP over WDM networks.

Impact Analysis of Traffic Patterns on Energy Efficiency and Delay in Ethernet with Rate Adaptation (적응적 전송률 기법을 이용한 이더넷에서 트래픽 패턴이 에너지 절약률 및 지연 시간에 미치는 영향)

  • Yang, Won-Hyuk;Kang, Dong-Ki;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1034-1042
    • /
    • 2010
  • As many researchers have been interested in Green IT, Energy Efficient Ethernet(EEE) with rate adaptation has recently begun to receive many attention. However, the rate adaptation scheme can have different energy efficiency and delay according to the characteristics of various traffic patterns. Therefore, in this paper, we analyze the impact of different traffic patterns on the energy efficiency and delay in Ethernet with rate adaptation. To do this, firstly we design a rate adaptation simulator which consists of Poisson based traffic generator, Pareto distribution based ON-OFF generator and Ethernet node with rate adaptation by using OPNET Modeler. Using this simulator, we perform the simulation in view of the total number of switching, transmission rate reduction, energy saving ratio and average queueing delay. Simulation results show that IP traffic patterns with high self-similarity affect the number of switching, rate reduction and energy saving ratio. Additionally, the transition overhead is caused due to the high self-similar traffic.

Monitoring Network Security Situation Based on Flow Visualization (플로우 시각화 기반의 네트워크 보안 상황 감시)

  • Chang, Beom-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.41-48
    • /
    • 2016
  • In this paper we propose a new method of security visualization, VisFlow, using traffic flows to solve the problems of existing traffic flows based visualization techniques that were a loss of end-to-end semantics of communication, reflection problem by symmetrical address coordinates space, and intuitive loss problem in mass of traffic. VisFlow, a simple and effective security visualization interface, can do a real-time analysis and monitoring the situation in the managed network with visualizing a variety of network behavior not seen in the individual traffic data that can be shaped into patterns. This is a way to increase the intuitiveness and usability by identifying the role of nodes and by visualizing the highlighted or simplified information based on their importance in 2D/3D space. In addition, it monitor the network security situation as a way to increase the informational effectively using the asymmetrical connecting line based on IP addresses between pairs of nodes. Administrator can do a real-time analysis and monitoring the situation in the managed network using VisFlow, it makes to effectively investigate the massive traffic data and is easy to intuitively understand the entire network situation.

Packet Delay and Loss Analysis of Real-time Traffic in a DBA Scheme of an EPON (EPON의 DBA 방안에서 실시간 트래픽의 패킷 손실률과 지연 성능 분석)

  • Shim, Se-Yong;Park, Chul-Geun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.86-88
    • /
    • 2004
  • As the rapid incensement of the number of internet users has occurred recently, many multimedia application services have been emerging. To improve quality of service, traffic can be suggested to be classified with priority in EPON(Ethernet Passive Optical Network), which is supporting the multimedia application services. In this paper, multimedia application services treat bandwidth classifying device in serving both delay sensitive traffic for real-time audio, video and voice data such as VoIP(Voice over Internet Protocol), and nonreal-time traffic such as BE(Best Effort). With looking through existing mechanisms, new mechanism to improve the quality will be suggested. The delay performances and packet losses of traffic achieved by supporting bandwidth allocation of upstream traffic in suggested mechanism will be analyzed with simulation.

  • PDF