• 제목/요약/키워드: Internet Address

검색결과 912건 처리시간 0.026초

차세대 인터넷주소체계(IPv6) 전환 방안 연구 (The Study on Next Generation Internet Protocol(IPv6) Switching Plan)

  • 김종명;서희석
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.107-116
    • /
    • 2010
  • The next generation Internet protocol(IPv6: Internet Protocol version 6) has been introduced to overcome the limitations of IPv4 and will be essential element for our industry environment. Transition to IPv6 is not simply replacing a protocol but complex work which affects the whole network. So, the accomplishment of appropriate plans and the systematic transition activities are required. In this paper, we examined the necessity of IPv6 transition and suggested the transition strategy in major parts of transition, such as networks, applications, and address management system.

멀티미디어를 활용한 의류학관련 교과목 콘텐츠의 개발 -의류소재 이해 및 분석- (Development of the Multimedia Contents for the Clothing & Textiles -Understanding h Analysis of Textile Materials-)

  • 이정순
    • 한국의류학회지
    • /
    • 제27권1호
    • /
    • pp.162-168
    • /
    • 2003
  • The purpose of this research is to develop the multimedia contents for the subject . is the subject to understand and analyze the characteristics of the textile materials and to be putting the key point to utilize the textile materials as the fashion materials. 1 developed the contents using multimedia system standing on the basis of Internet. The developed contents were organized to induce the interest. The sounds, pictures. computer graphics, animations, text, AOD and AOD etc. were utilized in these contents. These contents were consisted of preview, restudy, and the feedback through question. These contents can be executed directly in Web browser through Internet. Address is http://web.cnu.ac.kr/-fabric. Ⅰ applied this multimedia contents to actual class. It was utilized much more than textbook and it was turned out to be efficient in the experiment class. It was inspected that the most of students were satisfied with the utilizing these multimedia contents.

SIP 플러딩 탐지 차단 실험방법에 대한 연구 (An Experimental study on the Method of Detection and Blocking against SIP Flooding)

  • 최희식;박재표;전문석
    • 디지털산업정보학회논문지
    • /
    • 제7권2호
    • /
    • pp.39-46
    • /
    • 2011
  • Privacy IP hacking problems such as invasion of privacy, password cracking, voice wiretapping and internet over charged occurred, because VoIP internet voice phone service gradually spread. This thesis attempted to attack the VoIP service network by application. First use application to spoof IP address then attempted wiretap the VoIP service and sends a lot of messages to disturb service movement. At this point, we connected VoIP soft terminal, so we can operate real-time filtering operator to block the SIP Flooding offence by monitor the traffic and detect the location where it got attacked. This thesis used experiment to prove it is possible to detect the offence and defend from SIP Flooding offence.

Cryptographically-Generated Virtual Credit Card Number for Secure Card-Not-Present Transactions

  • Park, Chan-Ho;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1864-1876
    • /
    • 2016
  • Card-Not-Present (CNP) transactions taking place remotely over the Internet are becoming more prevalent. Cardholder authentication should be provided to prevent the CNP fraud resulting from the theft of stored credit card numbers. To address the security problems associated with CNP transactions, the use of a virtual card number derived from the transaction details for the payment has been proposed, instead of the real card number. Since all of the virtual card number schemes proposed so far are based on a password shared between the cardholder and card issuer, transaction disputes due to the malicious behavior of one of the parties involved in the transaction cannot be resolved. In this paper, a new virtual card number scheme is proposed, which is associated with the cardholder's public key for signature verification. It provides strong cardholder authentication and non-repudiation of the transaction without deploying a public-key infrastructure, so that the transaction dispute can be easily resolved. The proposed scheme is analyzed in terms of its security and usability, and compared with the previously proposed schemes.

초고속 인터넷상에서 위치기반 서비스를 위한 실시간 IP/위치 매핑 시스템 구현 (A Implementation of Real-Time IP Address-Location Mapping System for LBS on High-Speed Internet)

  • 김민경;백규태
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2005년도 하계학술대회
    • /
    • pp.10-15
    • /
    • 2005
  • In the area of mobile communication, Location Based Services (LBS) using the location of mobile terminal to provide their services are rapidly spreading as communication network and terminal evolves. Despite the LBS are highly demanded in high speed internet area, the services are very rare due to the difficulty locating terminals. In this paper, we propose the method to locate terminals in real time and describe its implementation system. The proposed system is designed to collect the information in real time for more than a terminal connecting internet. And, the system shows high performancecollecting and generating location information through simulation tests.

  • PDF

이기종 침해사고 모니터링 시스템에서 탐지한 공격 IP 연관성 분석 (Relative Analysis of Attack IP Address between Heterogeneous Intrusion Monitoring Systems)

  • 이재국;안종훈;임채태
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2012년도 한국컴퓨터종합학술대회논문집 Vol.39 No.1(C)
    • /
    • pp.215-217
    • /
    • 2012
  • 인터넷 사용이 보편화 되면서, 이를 악용하는 공격도 지속되고 있다. 이와 같이 네트워크를 통해 전파되는 다양한 공격으로부터 시스템을 보호하기위하여 DDoS 공격 대응 시스템과 스캐닝 공격 탐지 시스템, 스팸형 악성코드 탐지 시스템 등 다양한 보안 시스템들이 사용되고 있다. 본 논문에서는 다양한 인터넷 침해사고에 대응하기 위한 이기종 보안 시스템에서 탐지한 공격 로그를 분석하여 각 시스템별 공격 IP의 공격 지속시간을 확인하고, 서로 다른 침해사고 모니터링 시스템에서 탐지된 공격 IP의 연관 관계를 분석한다.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Remote Fault Diagnosis Method of Wind Power Generation Equipment Based on Internet of Things

  • Bing, Chen;Ding, Liu
    • Journal of Information Processing Systems
    • /
    • 제18권6호
    • /
    • pp.822-829
    • /
    • 2022
  • According to existing study into the remote fault diagnosis procedure, the current diagnostic approach has an imperfect decision model, which only supports communication in a close distance. An Internet of Things (IoT)-based remote fault diagnostic approach for wind power equipment is created to address this issue and expand the communication distance of fault diagnosis. Specifically, a decision model for active power coordination is built with the mechanical energy storage of power generation equipment with a remote diagnosis mode set by decision tree algorithms. These models help calculate the failure frequency of bearings in power generation equipment, summarize the characteristics of failure types and detect the operation status of wind power equipment through IoT. In addition, they can also generate the point inspection data and evaluate the equipment status. The findings demonstrate that the average communication distances of the designed remote diagnosis method and the other two remote diagnosis methods are 587.46 m, 435.61 m, and 454.32 m, respectively, indicating its application value.

식별자 기반 미래 인터넷에서의 요구사항 분석 (Requirements Analysis in ID-based Future Internet)

  • 곽병옥;이상호
    • 중소기업융합학회논문지
    • /
    • 제6권3호
    • /
    • pp.43-48
    • /
    • 2016
  • 현재의 주소 기반 인터넷은 인터넷의 성장과 더불어 여러 가지 한계를 노출하기 시작하였다. 대부분의 문제는 인터넷에 새로운 기능을 추가하거나 기존 기능을 일부 수정하여 해결되었지만 일부 문제는 인터넷의 구조적인 한계로 인하여 해결이 불가능한 것으로 여겨진다. 기존 인터넷의 한계를 원천적으로 극복하려는 식별자 기반 미래 인터넷 연구가 미국과 유럽의 경쟁적 분위기에서 활발한 연구가 진행 중에 있다. 하지만 대부분의 연구가 특정 분야에서 제한된 영역에 집중되어 추진되고 있다. 미래 인터넷을 위하여는 기존 연구의 특징 및 장점을 수용하고 한계점을 극복하기 위한 요구사항을 도출할 필요성이 있다. 본 논문에서는 식별자 기반의 미래 인터넷 연구들에 대한 특징 및 장단점을 비교 분석하고, 식별자 기반의 미래 인터넷이 가져야 할 요구사항들에 대하여 기술하였다.