• Title/Summary/Keyword: Information Network

Search Result 30,882, Processing Time 0.051 seconds

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

Wireless Network Health Information Retrieval Method Based on Data Mining Algorithm

  • Xiaoguang Guo
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.211-218
    • /
    • 2023
  • In order to improve the low accuracy of traditional wireless network health information retrieval methods, a wireless network health information retrieval method is designed based on data mining algorithm. The invalid health information stored in wireless network is filtered by data mapping, and the health information is clustered by data mining algorithm. On this basis, the high-frequency words of health information are classified to realize wireless network health information retrieval. The experimental results show that exactitude of design way is significantly higher than that of the traditional method, which can solve the problem of low accuracy of the traditional wireless network health information retrieval method.

A study on the Information interchange degree, Network density, Information reliability, Network sense of solidarity of According to the motive difference on Using social networks (SNS 이용동기 수준에 따른 정보교류, 네트워크 밀도, 정보신뢰성, 유대인식의 차이에 관한 연구)

  • Park, Won-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.657-664
    • /
    • 2014
  • This study is targeted at users of social networks to investigate motives, motives based on information exchange, network density, and reliability of information, recognizing network. Result motivation is a social network analysis of information-seeking motivation, social influence motivation, entertainment motivation, motivation network formation, respectively. Network density is also information seeking motivations, social influence motivation, entertainment showed differences in motivation, information about the reliability of the difference between the difference was in all the motivational factors.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

A Study on Organization of Information Network for Efficient Construction of U-City - Focused on Economic Analysis of Municipal Network and Leased Network - (효율적 U-City 구축을 위한 정보통신망 선정방안에 관한 연구 - 자가망과 임대망 경제성 분석을 중심으로 -)

  • Park, Sang-Soo;Park, Seung-Hee;Kim, Seong-Ah;Chin, Sang-Yoon;Joo, Hyeong-Woo
    • Journal of KIBIM
    • /
    • v.5 no.1
    • /
    • pp.54-62
    • /
    • 2015
  • The Cities that recently developed have been applied to private network for establishing information communication network system. The local governments planning or pursuing U-City construction should also choose the private network in consideration of operation and maintenance. In viewpoint of agency operating u-City, it is necessary to integrate traditional and new network. However, there has been lack of guides to choose U-City network considering the economic analysis between private and leased network. This study analyzed the characteristics of private and leased network, and the cost-benefit by estimating the network cost and communication demand focused on U-services that are recently applied. This study purpose a guide for efficient U-City information network selected by estimating ROI(Return On Investment) and BEP(Break Even Point) for establishing private and leased network.

Design of Hiding Secret Information System on Home Network Devices (홈 디바이스 기밀정보 은폐시스템 설계)

  • Kim, Do-Woo;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.841-844
    • /
    • 2007
  • Security services required by a home network depend on the definition of a home. That depends on which of home network technologies is included. Various devices in home network environments connected with access network. These home devices can be attacked. So essential parts is needed to protect secret information stored in home network devices. In this paper we design the system that protects secret information in home network devices to offer secure home network services.

  • PDF

Maximizing Network Utilization in IEEE 802.21 Assisted Vertical Handover over Wireless Heterogeneous Networks

  • Pandey, Dinesh;Kim, Beom Hun;Gang, Hui-Seon;Kwon, Goo-Rak;Pyun, Jae-Young
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.771-789
    • /
    • 2018
  • In heterogeneous wireless networks supporting multi-access services, selecting the best network from among the possible heterogeneous connections and providing seamless service during handover for a higher Quality of Services (QoSs) is a big challenge. Thus, we need an intelligent vertical handover (VHO) decision using suitable network parameters. In the conventional VHOs, various network parameters (i.e., signal strength, bandwidth, dropping probability, monetary cost of service, and power consumption) have been used to measure network status and select the preferred network. Because of various parameter features defined in each wireless/mobile network, the parameter conversion between different networks is required for a handover decision. Therefore, the handover process is highly complex and the selection of parameters is always an issue. In this paper, we present how to maximize network utilization as more than one target network exists during VHO. Also, we show how network parameters can be imbedded into IEEE 802.21-based signaling procedures to provide seamless connectivity during a handover. The network simulation showed that QoS-effective target network selection could be achieved by choosing the suitable parameters from Layers 1 and 2 in each candidate network.

A Design and Implementation of the Middleware for the Home Network Service (홈 네트워크 서비스 구축을 위한 미들웨어 설계 및 구현)

  • Lee, Seung-Joo
    • The Journal of Information Technology
    • /
    • v.10 no.4
    • /
    • pp.57-67
    • /
    • 2007
  • In this paper, we propose a design and implementation of Home Network Middleware which offer integrated service of electronic products. Most senior nations setting to core paradigm to ubiquitous computing techniques and effort to get the novel information and making more power about information techniques. But, they don't have a skill to Home Network Middleware in electronic products. It is a more important in Home Network Middleware. So, we will try to study about Home Network Middleware skill. And suggest to proposition that is a novel Home Network Middleware.

  • PDF

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Development of Sustainable Home-Network Security Tool

  • Hamid, Erman;Hasbullah, M. Syafiq E.;Harum, Norharyati;Anawar, Syarulnaziah;Ayop, Zakiah;Zakaria, Nurul Azma;Shah, Wahidah Md
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.257-265
    • /
    • 2021
  • Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.