• Title/Summary/Keyword: Ip convergence

Search Result 425, Processing Time 0.021 seconds

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

A Study on the Creation List of Game Scenarios (게임시나리오 창작 리스트 연구)

  • Lee, Jae Hong
    • Journal of Korea Game Society
    • /
    • v.17 no.5
    • /
    • pp.61-70
    • /
    • 2017
  • The fusion of virtual and reality and the revolution of gamification are beginning in human culture. As the quaternary industrial revolution enters the era, major developments of convergence main content games are expected as human-made play products. Now that we need a diverse game IP, we need a methodology that makes it easy to approach game scenario creation. The creation of the game scenario has a very large difference due to interactivity with the general video scenario. Therefore, without interactive knowledge, it is difficult to challenge game scenario creation. In this paper, 'Game Scenario Creation List' was created in order to lower the barriers to entering game scenario creation. I hope that this paper will be even a little positive for the development of game contents.

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1601-1612
    • /
    • 2011
  • In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.

Performance Evaluation of IDS on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 IDS 성능 분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1077-1082
    • /
    • 2016
  • IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

Determining the shortest paths by using the history of IP network traffic records (IP 네트워크에서 트래픽 레코드를 이용한 최단 거리 결정 기법)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.223-228
    • /
    • 2012
  • There are many algorithms to improve the network traffic and to avoid losing packets in the network. This paper proposed determining the shortest paths for hops, which are in the middle of the source and destination. The shortest path in this paper means the fastest path between them. Recently, dynamic routing algorithm is currently used now but this paper suggests the fastest paths between the source and the destination is by using the record of the network traffic history. People are using the networking and the network traffic is always corresponding to how many people use the networking in specific time. Therefore, I can predict the network condition by referring to the history of network traffic record, and then the shortest path can be produced without using RIP too much. It will be helpful to improve the network traffic.

A Study on the Development of IPMG for Multimedia Service with the Convergence of Broadcasting and Communications (통신방송의 융합형 멀티미디어 서비스를 지원하는 IPMG(IP Media Gateway) 개발에 관한 연구)

  • Cho, Kwang-Hyun;Won, Heon;Cho, Yok-Yon;Kim, Hyun-Cheol;Ahn, Kwang-Yong
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.45-46
    • /
    • 2007
  • In order to go digital broadcasting in Korea, it is conducted various policies in the country which be expanded network, be increased digital broadcasting hours. And broadcasting stations in the country close down analog broadcasting until 2012. Moreover IPTV is a method of delivering broadcast television and on-demand, rich media content that uses an IP(Internet protocol network) as the medium. And an IP is regarded as a very favorable approach for the future "Medium for Digital TV". However It is not easy to replace the entire digital infrastructure. And there are some problems in the digital infrastructure for Digital TV(i.e. channel zapping delay). Moreover user require service. IPMG is to solve these problems. IPMG is digital converter that allows receive and transmit signal by using many kinds of medium for Digital TV. Moreover IPMG provides users a Network PVR service. In this paper we developing, manufacturing IPMG and analyze its performance.

  • PDF

A Survey on IEEE 802.11 Standardization for Supporting Emergency Services in WLANs (무선랜에서 긴급 서비스 지원을 위한 IEEE 802.11 표준 동향)

  • Lee, Kye-Sang;Jung, Ok-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.456-458
    • /
    • 2010
  • VoIP services are growing fast and WLAN VoIP phones are being used in widespread. Emergency services are very critical in WLAN VoIP as in other traditional networks. This paper summarize recent standards of IEEE 802.11 supporting emergency services in WLANs. Two standards are discussed. The 11u deals with the aspect of access in WLAN emergency services, and the 11v deals with the location services.

  • PDF

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

TA Study of Deployment Strategies and The Next Generation Convergence Networks Telecom Service Model (차세대 통합망의 텔레콤 서비스 모델 및 진화 방향에 대한 고찰)

  • 김동일
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1228-1233
    • /
    • 2004
  • Character of the technology that is going to lead the next generation convergence network which has been discussed recently can be represented by Integrating and Convergence. As Wireless Telecommunication and Broadband Transport Technology make rapid progress for several years, and those of two important technical advance, Integrating, Convergence will combine with the latest terminal technology. so it becomes a big issue of utmost importance. This paper, therefore, investigates the network deployment strategies and relating technology toward Broadband Convergence Network(BcN) and makes a survey of up-to-date technique based on Telecom Service businesses which have been required.

SIP Protocol Vulnerability Analysis on FMC based Mobile Phone (FMC 기반 모바일 폰 환경에서 SIP 프로토콜 부가서비스 보안 취약성 분석)

  • Cho, Sik-Wan;Lee, Hyung-Woo;Kim, Jeong-Wook;Kim, Hwan-Kuk;Jeong, Hyun-Cheol
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.184-188
    • /
    • 2010
  • 현재 FMC 폰을 통해 제공되는 동시착신, 착신전환, 3인통화 등과 같은 다양한 부가서비스가 제공되고 있어 보다 편리하면서도 다양한 기능을 제공하고 있다. 하지만 FMC폰에 적용된 SIP 프로토콜은 송수신 패킷에 대해 쉽게 위변조가 가능하고 송신자 인증기능에 문제점이 발견되고 있어 보안성이 취약하다. 또한 FMC 폰을 이용하여 여러 가지 부가서비스를 이용할 경우 서비스 자체의 취약점을 이용한 공격 등이 가능하다. 따라서 본 연구에서는 현재 상용화 되어 제공되는 SIP기반 주요 VoIP 부가서비스를 대상으로 각각의 Call Flow를 분석하였으며 이를 토대로 각 부가서비스에 대한 취약성에 대해 분석하였다.

  • PDF