• Title/Summary/Keyword: Packet ID

Search Result 61, Processing Time 0.023 seconds

Packet Filtering Architecture Using Statistical Marking against DDoS Attack (DDoS 공격 방지를 위한 통계적 마킹 방법을 이용한 패킷 필터링 구조)

  • Koo, Hee Jeong;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1287-1290
    • /
    • 2004
  • 인터넷의 급속한 발전은 지난 수년간 데이터 전송 속도의 고속화, 대용량의 데이터 전송 등을 가져오는 긍정적인 효과를 거두었지만 컴퓨터 시스템의 보안 침해 사고와 같은 역기능 또한 날로 증대되어 그 피해 규모가 점점 심각해지고 있다. 본 논문에서는 IDS의 제어 아래 통계적인 탐지 알고리즘을 이용하여 분산 서비스 거부(DDoS) 공격에 대응할 수 있는 패킷 필터링 구조를 제안한다. 이 구조는 탐지 알고리즘에 의해 DDoS 공격으로 인식된 패킷을 IDS가 탐지하여 필터링 모듈에서 효과적으로 공격을 막을 수 있다.

  • PDF

Design of Traceback System using Selected Router (선택적 라우터를 이용한 역추적 시스템의 설계)

  • Lee, Jeong-Min;Lee, Kyoon-Ha
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.91-97
    • /
    • 2003
  • As increasing of Internet user and fast development of communication, many security problems occur. Because of Internet is design and development for speed not security, it is weak to attack from malicious user. furthermore attack is more developed to have high efficiency and intelligent. We proposed effective traceback system in network and consider that ability of constitution. Traceback by Selected Router system is consists of managed router and manager system. Selected router marks router ID to packet which passing selected router, and use this router ID for traceback and filtering. Consequently this system reduce damage of attack.

  • PDF

A Study of N-IDS Detection regarding a DoS Attack and Packet Analysis (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dae-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.175-182
    • /
    • 2008
  • 2008년에 있었던 우리나라 금융기관과 정부기관에 대한 DoS 공격에 대한 연구이다. 실험실 환경에서 실제 DoS 공격 툴을 이용하여 공격을 실시한다. DoS 공격을 탐지하기 위하여 네트워크 상에서 Snort를 이용한 N-IDS를 설치하고, 패킷을 탐지하기 위한 Winpcap과 패킷의 저장 및 분석하기 위한 MySQL, HSC, .NET Framework 등을 설치한다. e-Watch 등의 패킷 분석 도구를 통해 해커의 DoS 공격에 대한 패킷량과 TCP, UDP 등의 정보, Port, MAC과 IP 정보 등을 분석한다. 본 논문 연구를 통하여 유비쿼터스 정보화 사회의 역기능인 사이버 DoS, DDoS 공격에 대한 자료를 분석하여 공격자에 대한 포렌식자료 및 역추적 분석 자료를 생성하여 안전한 인터넷 정보 시스템을 확보하는데 의의가 있다.

  • PDF

Proposal of Supplement of Packet Receiving on Bro for Network Quarantine (네트워크 검역을 위한 Bro의 패킷 수신 기능 보완방안 제안)

  • Jung, Jun-Kwon;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.370-372
    • /
    • 2015
  • 네트워크 검역소는 안전한 내부 네트워크를 구축하기 위해 필요한 보안 시스템이다. 네트워크 검역소의 상업적 활용도를 보장하면서 구현하기 위하여 Bro라는 오픈소스 네트워크 보안 솔루션을 활용한다. 다만, Bro는 IDS의 특징을 가지고 있으며, 응용 프로토콜들은 각기 다른 형태로 동작한다. 이 때문에 수신한 패킷을 일괄적으로 처리하는 이벤트인 tcp_packet을 활용해야 하는데, 이 이벤트로 수신하는 패킷들은 단편화되어 있어 패킷을 분석하기 어려운 문제가 있다. 이러한 결정을 해결하기 위하여 Bro의 패킷 수신기능을 보정하고, 전달하는 체계를 갖출 필요가 있다. 본 논문에서는 Bro에서 패킷을 수신할 때, 응용 프로토콜에 무관한 패킷 수신기능을 구현하기 위해 Bro의 개선방향을 제시한다.

Sequential Least Square Channel Estimation in OFDM Systems (OFDM 시스템에서의 Sequential Least Squares 채널 추정 방식)

  • 고은석;박병준;천현수;강창언;홍대식
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.45-48
    • /
    • 2000
  • The use of multi-level modulation scheme in the wireless LAN(Local Area Networks) system requires an accurate channel estimation. In this paper, we present sequential least squares(LS) channel estimation scheme based on decision-directed channel tracking scheme. The proposed scheme improves the performance of the conventional LS estimator for wireless LAN. In addition, its structure is suitable for the high-rate wireless LAN. Simulation results show that the proposed scheme achieves about IdB Packet Error Rate(PER) gain compared to the LS scheme in a frequency selective channel.

  • PDF

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

Automatic RTP Time-stamping Method for SVC Video Transmission (SVC 비디오 전송을 위한 RTP 타임스탬프 자동 생성 방법)

  • Seo, Kwang-Deok;Jung, Soon-Heung;Kim, Jae-Gon;Yoo, Jeong-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.471-479
    • /
    • 2008
  • In this paper, we propose a novel algorithm to automatically generate an RTP timestamp value that is required for the RTP packetization in order to transmit SVC video over various If networks such as Internet. Unlike the conventional single layer coding algorithms such as H.263, MPEG-4 and H.264, SVC generates a multi-layered single bitstream which is composed of a base layer and one or more enhancement layers in order to simultaneously provide temporal, spatial, and SNR scalability. Especially, in order to provide temporal scalability based on hierarchical B-picture prediction structure, the encoding (or transmission) and display order of pictures in SVC coding is completely decoupled. Thus, the timestamp value to be specified at the header of each RTP packet in video transmission does not increase monotonically according to the display time instant of each picture. Until now, no method for automatically generating an RTP timestamp when SVC video is loaded in a RTP packet has teen introduced. In this paper, a novel automatic RTP timestamp generation method exploiting the TID (temporal ID) field of the SVC NAL unit header is proposed to accommodate the SVC video transmission.

Collision Avoidance Transmission Method Using Sensor Values in Wireless Sensor Network (무선 센서 네트워크에서 센서 값의 분포를 이용한 충돌 회피 전송방법)

  • An, Jong-min;Kang, Ji-woong;Chung, Jea-hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.604-611
    • /
    • 2017
  • In wireless sensor networks, an energy efficient operation is important since the energy of the sensors is limited. This paper proposes an energy efficient method that reduces a packet generation with Matrix Completion method where sensor value matrix has low-rank and decreases a collision rate and an overhead by transmitting only sensor ID to a time slot corresponding to the sensor value. Computer simulations demonstrates that the proposed method shows 17% of transmission failure and 73% of the packet generation compared to a conventional CSMA/CS. Delay time of transmitting information of the proposed method exhibits 22% of the CSMA/CA and the MSE error after reconstructing sensor values by Singular Value Thresholding(SVT) in Fusion Center is 87% of the CSMA/CA.

Location for a Car Crash and The Service System (차량 충돌 사고에 대한 위치 확인 및 서비스 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.381-388
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are becoming more diverse. In particular, where you recognize the location of objects such as people and things and to provide valuable services based on the ubiquitous and location-based services are emerging as an important service. The collision between the vehicle position measurement in this thesis and offers related service system. Used in the proposed system, the GPS PACKET with information about the location and time of collision for the vehicle crash, the vehicle consists of a NodeID. Cause a conflict between these data at the vehicle, the vehicle through the gateway from the server to decide whether to go on to determine that an emergency situation, Emergency Center, the location information and giving information about whether the conflict is measured. Also, for such an emergency, such as a family on the outside of the wireless terminal related to Wireless (PDA, Phone) is to let me know. The server to want to save the crash information to the database of configuration. Additionally, the proposed U-LBS system to verify the validity of the experiment was performed.

Analysis of Forwarding Schemes to Mitigate Data Broadcast Storm in Connected Vehicles over VNDN

  • Hur, Daewon;Lim, Huhnkuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.69-75
    • /
    • 2021
  • Limitation of the TCP/IP network technology included in the vehicle communication is due to the frequent mobility of the vehicle, the increase in intermittent connection requirements, and the constant presence of the possibility of vehicle hacking. VNDN technology enables the transfer of the name you are looking for using textual information without the need for vehicle identifiers like IP/ID. In addition, intermittent connectivity communication is possible rather than end-to-end connection communication. The data itself is the subject of communication based on name-based forwarding using two types of packets: Interest packet and Data packet. One of the issues to be solved for the realization of infotainment services under the VNDN environment is the traffic explosion caused by data broadcasting. In this paper, we analyze and compare the existing technologies to reduce the data broadcast storm. Through this, we derive and analyze the requirements for presenting the best data mitigation technique for solving the data explosion phenomenon in the VNDN environment. We expect this paper can be utilized as prior knowledge in researching improved forwarding techniques to resolve the data broadcast explosion in connected vehicles over NDN.