• 제목/요약/키워드: Network types

검색결과 2,699건 처리시간 0.026초

네트워크 공격 분석을 위한 마이닝 프로토타입 시스템 구현 (An Implementation of Mining Prototype System for Network Attack Analysis)

  • 김은희;신문선;류근호
    • 정보처리학회논문지C
    • /
    • 제11C권4호
    • /
    • pp.455-462
    • /
    • 2004
  • 네트워크 공격은 인터넷의 발달과 함께 유형도 다양하고 새로워지고 있다. 기존의 침입탐지 시스템들은 알려진 공격의 시그네처를 기반으로 탐지하기 때문에 알려지지 않거나 변형된 공격을 탐지하고, 대응하기 위해서는 많은 노력과 비용이 필요하다. 본 논문에서는 네트워크 프로토콜 속성 분석을 통해 알려지지 않거나 변형된 네트워크 공격을 예측할 수 있는 마이닝 프로토타입 시스템을 설계 하고 구현 하였다. 네트워크 프로토콜 속성을 분석하기 위해서 연관규칙과 빈발에피소드 기법을 사용하였으며, 수집된 네트워크 프로토콜은 TCP, UDP, ICMP와 통합된 형태의 스키마로 저장한다. 본 실험을 통해서 각 프로토콜별로 발생 가능한 네트워크 공격 유형을 예측할 수 있는 규칙들을 생성한다. 마이닝 프로토타입은 침입탐지 시스템에서 새로운 공격에 대응하기 위한 보조적인 .도구로서 유용하게 사용될 수 있다.

Resilient Packet Transmission (RPT) for the Buffer Based Routing (BBR) Protocol

  • Rathee, Geetanjali;Rakesh, Nitin
    • Journal of Information Processing Systems
    • /
    • 제12권1호
    • /
    • pp.57-72
    • /
    • 2016
  • To provide effective communication in the wireless mesh network (WMN), several algorithms have been proposed. Since the possibilities of numerous failures always exist during communication, resiliency has been proven to be an important aspect for WMN to recover from these failures. In general, resiliency is the diligence of the reliability and availability in network. Several types of resiliency based routing algorithms have been proposed (i.e., Resilient Multicast, ROMER, etc.). Resilient Multicast establishes a two-node disjoint path and ROMER uses a credit-based approach to provide resiliency in the network. However, these proposed approaches have some disadvantages in terms of network throughput and network congestion. Previously, the buffer based routing (BBR) approach has been proposed to overcome these disadvantages. We proved earlier that BBR is more efficient in regards to w.r.t throughput, network performance, and reliability. In this paper, we consider the node/link failure issues and analogous performance of BBR. For these items we have proposed a resilient packet transmission (RPT) algorithm as a remedy for BBR during these types of failures. We also share the comparative performance analysis of previous approaches as compared to our proposed approach. Network throughput, network congestion, and resiliency against node/link failure are particular performance metrics that are examined over different sized WMNs.

재전송을 고려한 무선 전송 단에서 실시간 데이터 전송 모델의 분석 (Analysis of a Wireless Transmitter Model Considering Retransmission for Real Time Traffic)

  • 김태용;김영용
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.215-217
    • /
    • 2005
  • There are two types of packet loss probabilities used in both the network layer and the physical layer within the wireless transmitter such as a queueing discard probability and transmission loss probability. We analyze these loss performances in order to guarantee Quality of Service (QoS) which is the basic of the future network. The queuing loss probability is caused by a maximum allowable delay time and the transmission loss probability is caused by a wireless channel error. These two types of packet loss probabilities are not easily analyzed due to recursive feedback which, originates as a result at a queueing delay and a number of retransmission attempts. We consider a wireless transmitter to a M/D/1 queueing model. We configurate the model to have a finite-size FIFO buffer in order to analyze the real-time traffic streams. Then we present the approaches used for evaluating the loss probabilities of this M/D/1/K queueing model. To analyze the two types of probabilities which have mutual feedbacks with each other, we drive the solutions recursively. The validity and accuracy of the analysis are confirmed by the computer simulation. From the following solutions, we suggest a minimum of 'a Maximum Allowable Delay Time' for real-time traffic in order to initially guarantee the QoS. Finally, we analyze the required service rate for each type utilizing real-time traffic and we apply our valuable analysis to a N-user's wireless network in order to get the fundamental information (types of supportable real-type traffics, types of supportable QoS, supportable maximum number of users) for network design.

  • PDF

사물 서브 망과 모바일 인터넷을 연계하는 무선 게이트웨이 타입들의 상태천이모델 기반 설계와 성능 평가 (State Transition Model-based Design of Wireless Gateway Types to Connect between a Sub-network of Things and Mobile Internet and their Performance Evaluations)

  • 성철제;김창화
    • 한국시뮬레이션학회논문지
    • /
    • 제25권3호
    • /
    • pp.1-14
    • /
    • 2016
  • 본 논문은 사물 무선 서브 망을 모바일 망과 인터넷을 차례로 연계하는 무선 게이트웨이 처리 방식을 중심으로 데이터 유실이 있는 전송 방법과 데이터 무손실 전송 방법으로 구분하여 각 방법에 대한 일반적 전송 방식들을 두 가지 씩 4가지 타입을 제안하고, 각 타입의 일반적 처리 절차를 상태천이모델(Sate Transition Model)을 이용하여 설계한다. 도출된 각 상태천이도를 기반으로 각 타입들의 기능들을 실제로 구현하고 테스트함으로써 이들 방식들의 성능을 평가한다. 평가 결과로서, 다른 타입들과 비교해 볼 때, 여러 대기 상태들에서 데이터 혹은 응답 수신을 위해 저전력 Sleep모드-인터럽트와 폴링을 조합한 타입이 폴링만 사용하거나 Sleep모드-인터럽트만을 사용하는 방법보다 데이터 전송 실시간성, 데이터 유실도, 에너지 소모 등에서 가장 좋은 성능을 보인다.

Detecting and predicting the crude oil type inside composite pipes using ECS and ANN

  • Altabey, Wael A.
    • Structural Monitoring and Maintenance
    • /
    • 제3권4호
    • /
    • pp.377-393
    • /
    • 2016
  • The present work develops an expert system for detecting and predicting the crude oil types and properties at normal temperature ${\theta}=25^{\circ}C$, by evaluating the dielectric properties of the fluid transfused inside glass fiber reinforced epoxy (GFRE) composite pipelines, by using electrical capacitance sensor (ECS) technique, then used the data measurements from ECS to predict the types of the other crude oil transfused inside the pipeline, by designing an efficient artificial neural network (ANN) architecture. The variation in the dielectric signatures are employed to design an electrical capacitance sensor (ECS) with high sensitivity to detect such problem. ECS consists of 12 electrodes mounted on the outer surface of the pipe. A finite element (FE) simulation model is developed to measure the capacitance values and node potential distribution of ECS electrodes by ANSYS and MATLAB, which are combined to simulate sensor characteristic. Radial Basis neural network (RBNN), structure is applied, trained and tested to predict the finite element (FE) results of crude oil types transfused inside (GFRE) pipe under room temperature using MATLAB neural network toolbox. The FE results are in excellent agreement with an RBNN results, thus validating the accuracy and reliability of the proposed technique.

Structuring of Unstructured SNS Messages on Rail Services using Deep Learning Techniques

  • Park, JinGyu;Kim, HwaYeon;Kim, Hyoung-Geun;Ahn, Tae-Ki;Yi, Hyunbean
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권7호
    • /
    • pp.19-26
    • /
    • 2018
  • This paper presents a structuring process of unstructured social network service (SNS) messages on rail services. We crawl messages about rail services posted on SNS and extract keywords indicating date and time, rail operating company, station name, direction, and rail service types from each message. Among them, the rail service types are classified by machine learning according to predefined rail service types, and the rest are extracted by regular expressions. Words are converted into vector representations using Word2Vec and a conventional Convolutional Neural Network (CNN) is used for training and classification. For performance measurement, our experimental results show a comparison with a TF-IDF and Support Vector Machine (SVM) approach. This structured information in the database and can be easily used for services for railway users.

공격 횟수와 공격 유형을 고려하여 탐지 성능을 개선한 차량 내 네트워크의 침입 탐지 시스템 (Intrusion Detection System for In-Vehicle Network to Improve Detection Performance Considering Attack Counts and Attack Types)

  • 임형철;이동현;이성수
    • 전기전자학회논문지
    • /
    • 제26권4호
    • /
    • pp.622-627
    • /
    • 2022
  • 본 논문에서는 공격 횟수와 공격 유형을 모두 고려하여 차량 내 네트워크에서 해킹을 탐지하는 침입 탐지 시스템의 성능을 개선하는 기법을 제안한다. 침입 탐지 시스템에서 침입을 정상으로 잘못 인식하는 FNR(False Negative Rate)과 정상을 침입으로 잘못 인식하는 FPR(False Positive Rate)은 모두 차량의 안전에 큰 영향을 미친다. 본 논문에서는 일정 홧수 이상 공격으로 탐지된 데이터 프레임을 자동적으로 공격으로 처리하며, 자동 공격으로 판단하는 방법도 공격 유형에 따라 다르게 적용함으로서 FNR과 FPR을 모두 개선하는 침입 탐지 기법을 제안하였다. 시뮬레이션 결과 제안하는 기법은 DoS(Denial of Service) 공격과 Spoofing 공격에서 FNR과 FPR을 효과적으로 개선할 수 있었다.

역지식이전에서 지식의 원천과 현지 시장 지식 간 관계에 관한 연구 (A Study on the Relationship between Knowledge Sources and Local Market Knowledge in Reverse Knowledge Transfer)

  • 최혜원;방호열
    • 무역학회지
    • /
    • 제47권1호
    • /
    • pp.43-61
    • /
    • 2022
  • The purpose of this study is to classify the types of local market knowledge and knowledge sources in reverse knowledge transfer and analyze their relevance. To do so, first, we searched for papers related to the types of local knowledge published in 9 international business academic journals between 1988 and 2020, and derived four types of local market knowledge. Second, in order to classify the source of knowledge, we searched for papers related to network types published in 9 international business academic journals between 1988 and 2020, and divided them into 4 types to derive characteristics. Third, by examining the types of local market knowledge that can be obtained according to network types, a conceptual model was developed between them, and the suitability between local market knowledge and sources of knowledge was revealed through empirical analysis. Through empirical research on what kind of knowledge can be obtained depending on the knowledge sources, various business and academic implications can be provided to many companies.

Network Analysis on Ageing Problems : Identifying Network Differences between Types of Cities

  • Seo, Bojun;Lee, Soochang
    • International Journal of Advanced Culture Technology
    • /
    • 제5권2호
    • /
    • pp.19-25
    • /
    • 2017
  • The research is to identify social networks of problems that have an influence on the quality of ageing people's lives by using social network analysis, based on the premise that there are differences in networks of ageing problems in urban and rural areas. From analyzing network of ageing people's problems using NodeXL, vertices in the networks of both urban and rural areas are well-connected. For urban areas, financial poverty is the core problem related to the quality of life. It has direct connections with illness and health, family responsibility, housing, role loss in community, and employment, which have positive or negative interactions with the quality of older people's lives. For rural areas, on the other hand, role loss in community is the major problem. It has direct connections with the elderly abuse, financial poverty, leisure activity, divorce, isolation and loneliness from society, education, and suicide. As a result, the research shows that the problems of ageing people have strong linkages and interactive effects with a structure of network, and the networks are different depending on types of places for living.

CAN을 이용한 자동차용 Network 구현 (Network Implementation for automobiles using CAN)

  • 허화라
    • 경영과정보연구
    • /
    • 제2권
    • /
    • pp.335-354
    • /
    • 1998
  • In this study I construct CAN(Controller Area Network) for automobiles similar to LAN(Local Area Network) and build communication modules in the major part of an automobile to link several sub-systems. Since each station replaces the communication function of sub-systems and has various types of sensor, actuator, controller, and switch, every information about automobile's status is obtained from the network. The manufactured system showed a superior capability. The following is the contents of study. 1. The definition of communication packet through the analysis of CAN protocol. 2. The Design of modules using micro-controller 80C196CA. 3. The Network configuration.

  • PDF