• Title/Summary/Keyword: Internet Address

Search Result 887, Processing Time 0.025 seconds

Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting (이진 코드 변환을 이용한 효과적인 버퍼 오버플로우 방지기법)

  • Kim Yun-Sam;Cho Eun-Sun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.323-330
    • /
    • 2005
  • Buffer overflow is one of the most prevalent and critical internet security vulnerabilities. Recently, various methods to prevent buffer overflow attacks have been investigated, but they are still difficult to apply to real applications due to their run-time overhead. This paper suggests an efficient rewrite method to prevent buffer-overflow attacks only with lower costs by generating a redundant copy of the return address in stack frame and comparing return address to copied return address. Not to be overwritten by the attack data the new copy will have the lower address number than local buffers have. In addition, for a safer execution environment, every vulnerable function call is transformed during the rewriting procedure.

Design of Short Messaging Service based Public Address System for Industrial Architectures over Wireless Networks

  • Caytiles, Ronnie D.;Park, Byungjoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.2
    • /
    • pp.15-27
    • /
    • 2019
  • This paper deals with a web-based public address system for conveying information for different institutions. An architecture for a Short Messaging Service (SMS) based public address (PA) system that can be programmed by an authorized mobile phone or device is proposed. This PA system will facilitate information transfer from heads of offices, managers, directors, and deans of the institutions to its constituents or unit area as well as enable postings of information with proper authentication and validation remotely. The system supports high priority messaging, allowing the conveyance of critical and time sensitive information. The mobility management support for the PA system will be based on the Hierarchical Mobile Internet Protocol version 6 (HMIPv6), hence, allowing for a seamless connectivity to the system. The major advantage of this proposed PA system as compared with the traditional electronic displays and bulletin boards is seamless mobility wherein the display devices can be programmed remotely by heads of the institutions and business organization. It also allows faster communication and immediate actions concerning the different institutions, organizations, and businesses, thus, ensuring high productivity.

Applying the Policy scheme to the IntServ

  • Song, Wang-Cheol
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.3
    • /
    • pp.109-114
    • /
    • 2003
  • There is an emergence of Internet applications that have real-time requirements. These applications require IP to support guaranteed capacity, higher priority and lower packet loss rate. To address this, the Internet Engineering Task Force (IETF) is developing a set of protocols and standards for Integrated Services on the Internet. Using RSVP and policies to manage the allocation of network resources in order to provide different levels of service is a topic of great interest to service providers. Currently, it is not possible to dynamically reallocate resources during an application's session. This paper discusses how policies in conjunction with new service class can provide a more enhanced network resource allocation by allowing for this dynamic reallocation.

Lyapunov-based Fuzzy Queue Scheduling for Internet Routers

  • Cho, Hyun-Cheol;Fadali, M. Sami;Lee, Jin-Woo;Lee, Young-Jin;Lee, Kwon-Soon
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.3
    • /
    • pp.317-323
    • /
    • 2007
  • Quality of Service (QoS) in the Internet depends on queuing and sophisticated scheduling in routers. In this paper, we address the issue of managing traffic flows with different priorities. In our reference model, incoming packets are first classified based on their priority, placed into different queues with different capacities, and then multiplexed onto one router link. The fuzzy nature of the information on Internet traffic makes this problem particularly suited to fuzzy methodologies. We propose a new solution that employs a fuzzy inference system to dynamically and efficiently schedule these priority queues. The fuzzy rules are derived to minimize the selected Lyapunov function. Simulation experiments show that the proposed fuzzy scheduling algorithm outperforms the popular Weighted Round Robin (WRR) queue scheduling mechanism.

A study on the IP Router detection system using parallel multi-detection method (복수의 검출방법을 병렬화한 IP 공유기 검출 시스템에 관한 연구)

  • Ma, Jungwoo;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.793-796
    • /
    • 2013
  • 스마트폰, IPTV(Internet Protocol Television), VoIP(Voice over Internet Protocol) 등의 인터넷을 활용한 서비스의 증가는 IPv4(Internet Protocol Version4)의 주소 부족문제를 야기시켰으며 이를 해결하기 위한 장기적인 해결방안으로는 IPv6(Internet Protocol Version6)가 제시되었고 단기적으로는 NAT(Network Address Translator)가 제안되었다. NAT는 사설 IP 주소를 공인 IP 주소로 활용하여 네트워크에 접속할 수 있도록 지원하며 주소 부족 문제를 해결하고 내부 네트워크를 보호하는 긍정적인 기능도 하지만 역으로 해커들에게 숨은 공간을 제공하는 역할을 하기도 한다. 본 논문에서는 NAT 기능을 활용한 IP 공유기를 통해 내부 보안 프로세스를 우회할 수 있는 단말기를 검출하는 탐색 알고리즘을 분석하고 이를 병렬화하여 정확도를 높일 수 있는 검출 시스템을 연구하고자 한다.

An Empirical Study of Influencing Factors of the Purchase Intention to the Internet Shopping Mall in Gangwon Region (강원지역 인터넷쇼핑몰의 구매의도 영향요인 분석)

  • Park, Young-Ki
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.177-197
    • /
    • 2009
  • In this study we presented the plans to activate the Internet Shopping Mall for GWmart under its present situation recording a rapid growth in sales and recognized as a local new distribution channel since its early stage, using the analysis that affects the purchases of consumers. On studying the reliance of a shopping mall, only the shopping mall image and the efficiency in providing information are significant. Regarding the concentration on the shopping site by shoppers, what becomes significant are the efficiency in providing information and the convenience in searching for products, which is one of the important factors in increasing sales, does not affect the reliance of a shopping mall and the concentration on the shopping site by shoppers. Therefore, this finding suggests that it is not easy to access the internet shopping mall when consumers go shopping for certain products. Because of this, it is necessary to change the design and structure of internet shopping mall to focus on the consumers. Moreover, this study showed that the efficiency in providing information to customers and the image of the shopping mall do not affect the consumers' intention to purchase, which means that shopping mall lacks in its information service and the management of its structure. To address this, it is required to advance the User Interface and contents of internet shopping mall.

  • PDF

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Hidar, Tarik;Abou el kalam, Anas;Benhadou, Siham;Kherchttou, Yassine
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.15-22
    • /
    • 2022
  • The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.

A Study on The Internet Connectivity in The Philippines

  • Salac, Romeo Agan;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.1
    • /
    • pp.67-88
    • /
    • 2016
  • This study aims to help address concerns about the growing demand of wider bandwidth Internet connection in the Philippines. Using articles and research of international organizations and content from official websites of the Philippine government, this paper has carefully examined the slow Internet connectivity and the high cost that the end-users pay for it. This paper suggests that this inefficiency hampers the motivation of users to innovate in a way that could contribute to inclusive growth and the development of an inclusive information society. Through a comparison of the current global ICT situation with the current situation in the Philippines, this paper shows that the country's Internet infrastructure lags behind among those of contemporary developing countries in Asia, particularly in terms of Internet connectivity. In 2015, Thailand had an average Internet speed of 7.4 Mbps, Sri Lanka 7.4, and Malaysia 4.3. Meanwhile, the Philippines had a meager average Internet speed of 2.8 Mbps, placing the country at 104 among 160 countries, with developed countries in Asia such as South Korea (23.6 Mbps) and Singapore (12.9 Mbps) ranking 1 and 12, respectively. Findings show that the lack of competition in the Internet connectivity market, among other reasons, is at the root of the dilemma of slow and costly Internet connection. Assessing the accomplishments of the Republic of Korea and other broadband-leading countries has provided practical insights and recommendations that can promote competitiveness. Furthermore, related literature argues how ISP practices may affect Internet speed and cost. This study offers an approach in improving Internet connectivity in the Philippines by bridging the gap between the Internet infrastructure market and government policies.

A Parallel Multiple Hashing Architecture Using Prefix Grouping for IP Address Lookup (프리픽스 그룹화를 이용한 병렬 복수 해슁 IP 주소 검색 구조)

  • Kim Hye ran;Jung Yeo jin;Yim Chang boon;Lim Hye sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.65-71
    • /
    • 2005
  • The primary function of the Internet routers is to forward incoming packets toward their final destinations. IP address lookup is one of the most important functions in evaluating router performance since IP address lookup should be performed in wire-speed for the hundred-millions of incoming packets per second. With CIDR, the IP prefixes of routing table have arbitrary lengths, and hence address lookup by exact match is no longer valid. As a result, when packets arrive, routers compare the destination IP addresses of input packets with all prefixes in its routing table and determine the most specific entry among matching entries, and this is called the longest prefix matching. In this paper, based on parallel multiple hashing and prefix grouping, we have proposed a hardware architecture which performs an address lookup with a single memory access.

Multiple Hashing Architecture using Bloom Filter for IP Address Lookup (IP 주소 검색에서 블룸 필터를 사용한 다중 해싱 구조)

  • Park, Kyong-Hye;Lim, Hye-Sook
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.84-98
    • /
    • 2009
  • Various algorithms and architectures for IP address lookup have been studied to improve forwarding performance in the Internet routers. Previous IP address lookup architecture using Bloom filter requires a separate Bloom filter as well as a separate hash table in each prefix length, and hence it is not efficient in implementation complexity. To reduce the number of hash tables, it applies controlled prefix expansion, but prefix duplication is inevitable in the controlled prefix expansion. Previous parallel multiple-hashing architecture shows very good search performance since it performs parallel search on tables constructed in each prefix length. However, it also has high implementation complexity because of the parallel search structure. In this paper, we propose a new IP address lookup architecture using all-length Bloom filter and all-length multiple hash table, in which various length prefixes are accomodated in a single Bloom filter and a single multiple hash table. Hence the proposed architecture is very good in terms of implementation complexity as well as search performance. Simulation results using actual backbone routing tables which have $15000{\sim}220000$ prefixes show that the proposed architecture requires 1.04-1.17 memory accesses in average for an IP address lookup.