• Title/Summary/Keyword: Packet Capture

Search Result 61, Processing Time 0.027 seconds

The Effect of Spreading Gain Control on a CDMA Slotted ALOHA System (CDMA슬롯ALOHA시스템에서 확산 이득 제어의 영향)

  • 도미선;박중신;강지은;이재용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12B
    • /
    • pp.1665-1676
    • /
    • 2001
  • The effect of spreading gain control on the throughput of a CDMA slotted ALOHA system is considered. Mobile users transmit packets over a shared channel, and the packets transmitted in the same time slot over the shared channel act as simultaneous access interference (SAI). When using spread-spectrum signal, a CDMA slotted ALOHA channel achieves high probability of capture due to the property of high title resolution, and the bit rate of user information is determined by spreading gain. When the SAI level gets larger, the high value of spreading gain enhances the packet throughput by increasing the probability of a successful packet transmission, while it degrades the of the effective throughput by reducing the user information bits carried within a packer. To solve the problem, we investigated the effect of the capture probability and the SAI level on these system throughputs, and evaluated the throughput performance of the system for each spreading gain control scheme. The results showed that the maximum effective throughput could be achieved with an unified method despite the variation of the SAI level by deriving an optimal value of the spreading gain according to 171e system states.

  • PDF

A Study of Packet Analysis in Smart Phone Internet Access (Smart Phone 인터넷 접속시 패킷 분석 연구)

  • Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.229-232
    • /
    • 2010
  • Smart Phone is the increasing use. Smart Phone can be run on that New or videos you want to connect to the Internet for downloading and viewing applications. But the wireless Internet have been found that Due to the vulnerability of the Internet, Smart Phone security vulnerabilities. This paper analyzes the vulnerability. Smart Phone droid that occur when connecting to the Internet. For information on Smart Phone to use to analyze network packet analysis and packet capture tools. Analysis is based on information from the Internet when you use Smart Phone Hack will demonstrate the process. Messenger, ID, to confirm the password, the actual internet ID, password access to the personal information that can be seized. In this study, hacking and security of the Smart Phone will contribute to the research process that Internet information and communication powers to strengthen the security of Korea.

  • PDF

The Design and Implementation of Network Intrusion Detection System Hardware on FPGA (FPGA 기반 네트워크 침입탐지 시스템 하드웨어 설계 및 구현)

  • Kim, Taek-Hun;Yun, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.11-18
    • /
    • 2012
  • Deep packet inspection which perform pattern matching to search for malicious patterns in the packet is most computationally intensive task. Hardware-based pattern matching is required for real-time packet inspection in high-speed network. In this paper, we have designed and implemented network intrusion detection hardware as a Microblaze-based SoC using Virtex-6 FPGA, which capture the network input packet, perform hardware-based pattern matching for patterns in the Snort rule, and provide the matching result to the software. We verify the operation of the implemented system using traffic generator and real network traffic. The implemented hardware can be used in network intrusion detection system operated in wire-speed.

A Case for Using Service Availability to Characterize IP Backbone Topologies

  • Keralapura Ram;Moerschell Adam;Chuah Chen Nee;Iannaccone Gianluca;Bhattacharyya Supratik
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.241-252
    • /
    • 2006
  • Traditional service-level agreements (SLAs), defined by average delay or packet loss, often camouflage the instantaneous performance perceived by end-users. We define a set of metrics for service availability to quantify the performance of Internet protocol (IP) backbone networks and capture the impact of routing dynamics on packet forwarding. Given a network topology and its link weights, we propose a novel technique to compute the associated service availability by taking into account transient routing dynamics and operational conditions, such as border gateway protocol (BGP) table size and traffic distributions. Even though there are numerous models for characterizing topologies, none of them provide insights on the expected performance perceived by end customers. Our simulations show that the amount of service disruption experienced by similar networks (i.e., with similar intrinsic properties such as average out-degree or network diameter) could be significantly different, making it imperative to use new metrics for characterizing networks. In the second part of the paper, we derive goodness factors based on service availability viewed from three perspectives: Ingress node (from one node to many destinations), link (traffic traversing a link), and network-wide (across all source-destination pairs). We show how goodness factors can be used in various applications and describe our numerical results.

A Visualization Technique of Inter-Device Packet Exchanges to Test DLNA Device Interoperability (DLNA 기기의 상호운용성 시험을 위한 패킷교환정보 시각화 방법)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.531-534
    • /
    • 2014
  • DLNA is an established industry standard which supports contents sharing among smart devices in home wired- and wireless-network environment and is well known in Korea as Allshare or Smartshare. The DLNA standard is implemented as built-in services in most of Android smart phones and tablets. In addition to the handheld devices, DLNA service can also be employed in speakers, printers, and so on. However, users have reported many interoperability issues between DLNA devices. Developers typically identify causes by analyzing the packet exchange information between devices. However, this approach costs them to put additional effort to filter relevant packets, to reconstruct packet exchange history and the protocol flow. Consequently, it ends up with increased development time. In this paper, we demonstrate a technique to automatically analyze and visualize the packet exchange history. We modified a router firmware to capture and store packets exchanged between DLNA devices, and then analyze and visualize the stored packet exchange history for developers. We believe that visualized packet exchange history can help developers to test the interoperability between DLNA devices with less effort, and ultimately to improve the productivity of developers.

  • PDF

A high speed processing method of web server cluster through round robin load balancing (라운드로빈 부하균형을 통한 웹 서버 클러스터 고속화 처리기법)

  • Sung Kyung;Kim Seok-soo;Park Gil-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1524-1531
    • /
    • 2004
  • This study analyzes a load balancing technique using Round Robin Algorithm. The study uses two software packages (Packet Capture and Round Robin Test Package) to check packet volume from Virtual Network structure (data generator, virtual server, Server1,2,3), and finds out traffic distribution toward Server1,2 and 3. The functions of implemented Round Robin Load Balancing Monitoring System include round robin testing, system monitoring, and graphical indication of data transmission and packet volume. As the result of the study shows, Round Robin Algorithm allows servers to ensure definite traffic distribution, unless incoming data loads differ much. Although error levels are high in some cases, they were eventually alleviated by repeated tests for a long period of time.

Traffic Distributed Processing System Implementation on the Web Sever Networking (웹서버 네트워킹에서의 트래픽분산 처리 시스템 구현)

  • Park, Gil-Cheol;Sung, Kyung;Kim, Seok-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.846-853
    • /
    • 2004
  • This paper introduces implementation of a traffic distributed processing system on the Web Sever Networking. The study used two software packages (Packet Capture and Round-Robin Test Package) to check packet quantity from Virtual Network Structure (data generator, virtual server, Serve. 1, 2, 3), and could find out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round-Robin Load Balancing Monitoring System include Round-Robin testing, system monitoring, and graphical indication of data transmission/packet quantity (figures & diagram). As the result of the study shows, Round-Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some cases, they were eventually alleviated by repeated tests for a long period of time.

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

Implementation of Intrusion Detection System Using Packet Capture (패킷캡쳐를 이용한 침입탐지 시스템의 구현)

  • 김영진;한승조
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.833-842
    • /
    • 2002
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of use of computers. A attack of intruders using a vulnerability of operating system, protocol and application programs. And so, The attack methods is to be high technology and professional. Thus It must be necessity that we necessary a solution to structure, management for framework of information technology. This paper develope intrusion detecting system for separating intruders form critical system and design IDS model and implementation of it.

ECTP Application Test on the APAN Network (APAN에서의 ECTPT응용 실험)

  • 김지수;박주영;김대영;강신각
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.145-148
    • /
    • 2003
  • A lot of institutes have proposed RMT (Reliable Multicast Transport) techniques over IP multicast environment which provides only best-effort services. The ECTP (Enhanced Communications Transport Protocol) is a kind of RMT technique and an international standard of ITU-T and JTC1/SC6. It is a protocol that provides reliability fer IP multicast environment. In this paper, we tested ECTP applications which are MFTP (Multicast file transport protocol) and WB (white Board) on the APAN (Asia-Pacific Advanced Network) with the Kyushu University in Japan. We measured ECTP traffic using a packet capture tool that programmed by Pcap library that is developed in Lawrence Berkeley institute. In according to the result, we think that ECTP is an efficient protocol in transporting files to many receivers simultaneously.

  • PDF