• Title/Summary/Keyword: Packet Capture

Search Result 61, Processing Time 0.023 seconds

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

Design and Implementation of Integrated Network Performance Management System (통합적인 통신망 성능관리 시스템의 설계 및 구현)

  • Chung Youn-Ky;Moon Hea-Eun;Na Youn-Kyoung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1389-1399
    • /
    • 2004
  • Modern computer networks are growing wider, more complicated. Therefore, we have needed so much the function of the performance management to, by making this kind of the network performance best fitted, guarantee Quality of Service which the users require. Currently, Netflow, RMON and Packet Capture methods are used to analyze Traffic, the principal function of the performance management, but they are not the fundamental solution from the integrated point of view. In this paper, we suggest the integrated performance management architecture and, by means of it, design and implement the performance man-agement system so that we can manage the performance of multi-technology and multi-vender devices.

  • PDF

Design and Implementation of a Recording System Based on H.323 (H.323 기반의 녹음장비 설계 및 구현)

  • 정정용;방혜자
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.34-36
    • /
    • 2004
  • 인터넷의 확산과 더불어 인터넷을 이용한 음성전달 기술은 급속히 발전하고 있으며 음성전달 기술을 이용해 개발된 소프트웨어를 통칭해 인터넷 전화라 부른다. 인터넷 전화는 비싼 전화요금 대신 인터넷 사용료나 매우 저렴한 요금으로 음성 대화를 가능하게 한다. 저렴한 요금이라는 큰 장점으로 인해 콜센터나 일반고객들이 인터넷전화를 이용할 가능성이 커지게 되었고 시장의 변화에 따라 녹음장비도 인터넷 상의 음성을 녹음 할 필요성을 가지게 되었다. 본 논문에서는 인터넷 상의 음성전달 기술인 VoIP Protocol H.323 을 지원하는 단말간의 통화를 녹음할 수 있도록 녹음 장비의 핵심인 IP Packet을 Capture 하여 음성데이터를 추출하는 모듈을 구현 하였다.인터넷의 확산과 더불어 인터넷을 이용한 음성전달 기술은 급속히 발전하고 있으며 음성전달 기술을 이용해 개발된 소프트웨어를 통칭해 인터넷 전화라 부른다. 인터넷 전화는 비싼 전화요금 대신 인터넷 사용료나 매우 저렴한 요금으로 음성 대화를 가능하게 한다. 저렴한 요금이라는 큰 장점으로 인해 콜센터나 일반고객들이 인터넷전화를 이용할 가능성이 커지게 되었고 시장의 변화에 따라 녹음장비도 인터넷 상의 음성을 녹음 할 필요성을 가지게 되었다. 본 논문에서는 인터넷 상의 음성전달 기술인 VoIP Protocol H.323 을 지원하는 단말간의 통화를 녹음할 수 있도록 녹음 장비의 핵심인 IP Packet을 Capture 하여 음성데이터를 추출하는 모듈을 구현 하였다.

  • PDF

Optimal Design of Contending-type MAC Scheme for Wireless Passive Sensor Networks (무선 수동형 센서 망을 위한 경합형 MAC 방식의 최적 설계)

  • Choi, Cheon Won;Seo, Heewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.6
    • /
    • pp.29-36
    • /
    • 2016
  • A wireless passive sensor network is a network which, by letting separate RF sources supply energy to sensor nodes, is able to live an eternal life without batteries. Against expectations about an eternal life, however, a wireless passive sensor network still has many problems; scarcity of energy, non-simultaneity of energy reception and data transmission and inefficiency in resource allocation. In this paper, we focus on a wireless passive sensor network providing a packet service which is tolerable to packet losses but requires timely delivery of packets. Perceiving the practical constraints, we then consider a contending-type MAC scheme, rooted in framed and slotted ALOHA, for supporting many sensor nodes to deliver packets to a sink node. Next, we investigate the network-wide throughput achieved by the MAC scheme when the packets transmitted by geographically scattered sensor nodes experience path losses hence capture phenomena. Especially, we derive an exact formula of network-wide throughput in a closed form when 2 sensor nodes reside in the network. By controlling design parameters, we finally optimize the contending-type MAC scheme as to attain the maximum network-wide throughput.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

Performance of Hybrid DS/FH Spread-Spectrum Systems in Cellular Packet Radio Network (셀룰러 패킷무선망에서 하이브리드 DS/FH 확산대역 시스팀의 성능)

  • 조현욱;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1462-1470
    • /
    • 1999
  • In this paper, the performance of packet radio networks using the ALOHA protocol in Rayleigh fading channels is analyzed in terms of the capture probability and the throughput. We consider capture effect in order to increase the probability of the channel access and to include cellular environment we assume that the traffic is a truncated bell-shaped distribution. The packet proposed in this paper consists of a competition part and a data part to decrease the probability of collision in the channel access. In the competition part, DS system with common spreading code is used and in the data, hybrid DS/FH system is used. We consider the linear correlation receiver and the hard-limiting correlation receiver as the receiver model. BPSK modulation is also employed. Because hybrid DS/FH systems are not sensitive to variation of the interference power, as we choose a proper chip number N and a frequency hopping number q, we can obtain a steady system performance even though the variation of interference power is severe fading channels such as Rayleigh fading.

  • PDF

Traffic Monitoring Tool Applicable to IPv6 Environment (IPv6 환경에 적용 가능한 트래픽 모니터링 툴)

  • Lee Hong-Kyu;Kim Sun-Young;Koo Hyang-Ohk;Kim Young-Gi;Oh Chang-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.97-100
    • /
    • 2005
  • Recently, Internet user grows larger every year. So, It brought about lack of IP address. Because of it, IPv4 is being substituted to IPv6. In this thesis, proposed attack tool in IPv6 base, attack detection tool have algorithm which is consist of 2 steps attack confrontation with analysis packet header data using packet capture. and automatic attack isolation tool against attack using tool.

  • PDF

Development of Control and Analysis Software for Electronic Warfare Test System Using Reverse Engineering of Network Protocol (프로토콜 역설계를 이용한 전자전시험장비 제어 및 신호분석 소프트웨어 개발)

  • Jung, In-Hwa
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.58-66
    • /
    • 2008
  • In this paper, we have proposed a method and procedure which can find out the unknown network protocol. Although it seems to be difficult to identify the protocol, we can find out the rule in the packet according to the method we have proposed. We have to recognize functions of the system and make the list of events first. Then we capture the network packet whenever the event are occurred. The captured packets are examined by means of the method that is finding repeated parts, changed parts according to the input value, fixed parts and changed parts according to regular rules. Finally we make the test program to verify the protocol. We applied this method and procedure to upgrade Electronic Warfare Test System which is operated by ADD. We have briefly described the redesign of control and analysis software for Electronic Warfare Test System

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

A Study on RTP-based Lip Synchronization Control for Very Low Delay in Video Communication (초저지연 비디오 통신을 위한 RTP 기반 립싱크 제어 기술에 관한 연구)

  • Kim, Byoung-Yong;Lee, Dong-Jin;Kwon, Jae-Cheol;Sim, Dong-Gyu
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1039-1051
    • /
    • 2007
  • In this paper, a new lip synchronization control method is proposed to achieve very low delay in the video communication. The lip control is so much vital in video communication as delay reduction. In a general way, to control the lip synchronization, both the playtime and capture time calculated from RTP time stamp are used. RTP timestamp is created by stream sender and sent to the receiver along the stream. It is extracted from the received packet by stream receiver to calculate playtime and capture time. In this paper, we propose the method of searching most adjacent corresponding frame of the audio signal, which is assumed to be played with uniform speed. Encoding buffer of stream sender is removed to reduce the buffering delay. Besides, decoder buffer of receiver, which is used to correct the cracked packet, is resulted to process only 3 frames. These mechanisms enable us to achieve ultra low delay less than 100 ms, which is essential to video communication. Through simulations, the proposed method shows below the 100 ms delay and controlled the lip synchronization between audio and video.

  • PDF