• Title/Summary/Keyword: Network based DoS

Search Result 470, Processing Time 0.032 seconds

Classification of Traffic Classes for Application Services in Military Communication Networks (군 통신망 응용서비스를 위한 트래픽 클래스 분류 방법)

  • Choi, Geun-Kyung;Kim, Bo-Sung;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.76-88
    • /
    • 2012
  • Traffic classification for application services in military communication networks is one of the core requirements to provide efficient resource management for NCW operations. Though several standards and organizations provided their own traffic classification methods, the methods have been mainly focused on commercial services, but not reflected military specifics. In addition, though various military application services have been emerged, some of those services have been classified into different traffic classes due to implicit criteria for the classification among organizations. In this paper, we propose a methodology to classify traffic classes and to determine delivery requirements for military application services based on various standards by DoD as well as several commercial standards based on Y.1541. The validation of the proposed methodology was carried out by comparing the results by proposed one with the traffic classification suggestions by existing commercial standards, DoD and FCS. We expect that the proposed methodology can contribute to achieve efficient operations of limited military network resources, since the proposed method can provide systematic and consistent way to assign traffic classes for new and existing military applications services.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

An Adaptive UDT Rate Control Method on Network Traffic Condition (네트워크 트래픽 상태에 적응적인 UDT Rate Control 기법)

  • An, Do-Sik;Wang, Gi-Cheol;Kim, Seung-Hae;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.19-27
    • /
    • 2011
  • Due to the growth of optical fiber network technologies, most networks recently support several tens of Gb/s bandwidth. UDT(UDP-based Data Transfer protocol) is an optimized protocol for bulk data transmission on the network, which has the high bandwidth and long delay time. It periodically controls the sending rate on the fixed sync-interval, 0.01 sec. Here, if the network traffic status varies quickly, available network bandwidth is not able to be properly utilized in-between the sync-intervals. In this paper, we propose an adaptive rate control method with considering the network traffic status in-between the sync-interval periods. The network traffic status is determined based on the RTT variances. With dividing the network status into four classes, the proposed method performs a new rate control by adjusting the inter-packet sending period for a corresponding class. As a simulation result, the proposed method improves the message delivery throughput as well as stability than that of the existing UDT Protocol.

Hierarchical Visualization of Cloud-Based Social Network Service Using Fuzzy (퍼지를 이용한 클라우드 기반의 소셜 네트워크 서비스 계층적 시각화)

  • Park, Sun;Kim, Yong-Il;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.7
    • /
    • pp.501-511
    • /
    • 2013
  • Recently, the visualization method of social network service have been only focusing on presentation of visualizing network data, which the methods do not consider an efficient processing speed and computational complexity for increasing at the ratio of arithmetical of a big data regarding social networks. This paper proposes a cloud based on visualization method to visualize a user focused hierarchy relationship between user's nodes on social network. The proposed method can intuitionally understand the user's social relationship since the method uses fuzzy to represent a hierarchical relationship of user nodes of social network. It also can easily identify a key role relationship of users on social network. In addition, the method uses hadoop and hive based on cloud for distributed parallel processing of visualization algorithm, which it can expedite the big data of social network.

Establishing Urban Green Network by Estimating Birds Moving Pattern (야생조류 이동통로 예측을 통한 도시녹지네트워크 설정연구)

  • Hong, Suk-Hwan;Choi, Song-Hyun;Lee, Soo-Dong;Bae, Jung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.2
    • /
    • pp.99-110
    • /
    • 2009
  • This study is to establish urban green network on the urbanized area using characteristics of fragmented and ornamental green area distribution. To do this, the survey for the green area characteristics was carried out in Changwon City. In order to analyze network, a virtual network in whole city sky for bird's movement, which is consisted with 30m grid lines was prepared. To analyze which network routes depend on the direction, we estimated bird's movement between 8-direction and 16-direction's outskirt forest's source point and inner city's fragmented green area. In the analysis of two types different direction models, the results of green network routes are mostly matched. So green network plan by this results is more reasonable for enhancing bird's movement to inner city. Based on the these findings, this green network planning will be providing for inner city to influx outside forest's birds and maximize the ecological connectivity.

  • PDF

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF

An Intelligent Web based e-Learning Multi Agent System (웹기반 이러닝 멀티에이전트 시스템)

  • Cho, Young-Im
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.1
    • /
    • pp.39-45
    • /
    • 2007
  • In this paper, we developed an intelligent web based e-learning system based on multi agents. To do development of the system, we applied an inclination test that is based on the education theory to do grouping the desirable e-learning community. The proposed system, Intelligent Web based e-learning Multi Agent System (IMAS), is used the multi agents paradigm including learning manner by neural network for grouping of e-learning community and a new distributed multi agent framework proposed here.

An Onboard Printer Server Based on Embedded Linux (Embedded Linux 기반의 내장형 프린터 서버)

  • Cha, Kyung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.309-314
    • /
    • 2009
  • PC users could experience some inconvenience when they use their PC that was physically connected to network printers shared by other People in the network due to the overload. This paper shows how to resolve this kind of overload problem and established the embedded printer system based on embedded Linux system which performs the printer server in order for any users in the of ice to do printing work more smoothly via current network. It's own capabilities and functions were verified throughout the various tests in practical environment.

Influence of R&D Employees' Social Network and Self-Esteem on Organizational Commitment and Career Orientation (R&D 인력의 사회적 네트워크와 자아존중감이 조직몰입과 경력지향성에 미치는 영향)

  • Lee, Dongbeag;Bak, Seonghwan;Kang, Minhyung
    • Knowledge Management Research
    • /
    • v.17 no.4
    • /
    • pp.77-104
    • /
    • 2016
  • The effective management of R&D employees is critical for a small or medium sized firm's sustainable growth. R&D employees have professional skills and choose expertise-oriented or management-oriented careers in the process of organizational socialization. This study synthetically verifies the direct and indirect effects of R&D employees' social network and self-esteem on their career orientation by organizational commitment based on social network theory and social recognition theory. The research model has been analyzed through structural equation modeling using survey responses from 220 R&D employees at small- and medium-sized firms in Korea. The analysis results show that internal network activities have direct and indirect impacts on organizational commitment and career orientation, but external network activities do not have significant effects on self-esteem, organizational commitment, or career orientation. There is no consensus in prior studies on whether expert orientation and management orientation are distinct concepts. In this study, these two types of orientation are verified as distinct concepts. It is also found that R&D employees' internal network activities are significant factors for a company's growth. A company should implement an educational system of roles and duties using which individuals can pursue career progression. In addition, it is necessary to provide career development programs such as job rotation, mentoring, and career counseling.

Design the Smart Object based on WBAN(Wireless Body Area Network) - Smart Belt (WBAN(Wireless Body Area Network) 기반 스마트 오브젝트 설계 - 스마트벨트)

  • Burn, U-In;Kim, Tae-Su;Cho, Weduke
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.674-678
    • /
    • 2008
  • Our research is for development of smart object in WBAN environment. Too many smart object in various computing device were developed, but users always attention to their lot of smart objects and any personal things now. So we need smart object that classification and management all of user's personal devices and any effects in invisible and seamless system. We discussed how develop do that object in WBAN(Wireless Body Area Network) system and how make components in this system to wireless network in this paper.

  • PDF