• 제목/요약/키워드: Packet detection

검색결과 390건 처리시간 0.025초

모바일 애드혹 네트워크를 위한 링 기반 멀티캐스트 라우팅 구조 (A Ring-based Multicast Routing Architecture for Mobile Ad Hoc Networks)

  • 허준;홍충선;양육백
    • 정보처리학회논문지C
    • /
    • 제11C권7호
    • /
    • pp.895-904
    • /
    • 2004
  • 예상치 못한 에드혹 망의 접속형태의 변경이 동반되는 멀티캐스트 라우팅 프로토콜에 대한 연구에 많은 과제를 남겨놓고 있으며, 다양한 이동 에드혹 망에 적합한 프로토콜에 대한 연구의 필요성이 제기되고 있다. 본 논문에서는 계층적 Eulerian 링 멀티캐스트 구조를 갖는 새로운 프로토콜을 제안한다. 제안한 구조는 Eulerian 링, 계층구조, 멀티캐스트 에이전트를 갖으며 기존의 방법보다 효율적이며 안전한 특성을 갖는다. 제안한 구조는 트리기반 및 메시기만 멀티캐스트 프로토콜과 비교하여 제어트래픽의 양, 점대점 지연, 패킷전송률 등에 있어 우수함은 시뮬레이션을 통해 입증한다.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구 (A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

Mobile IPTV의 개요 및 이동성개선방안 (Study on Improvement of Mobility in IPTV)

  • 이성욱;박병주
    • 한국인터넷방송통신학회논문지
    • /
    • 제10권3호
    • /
    • pp.69-74
    • /
    • 2010
  • 최근 정보통신기술의 발전으로 한정된 장소에서만 볼 수 있는 기존의 TV 서비스와는 달리 DMB 기술을 통해 이동하면서 언제 어디서나 TV를 즐길 수 있을 정도의 기술이 개발 되었다. 이러한 이동식 TV 서비스의 최신 기술인 Mobile IPTV 서비스의 기반이 되는 IPTV 기술에 대해 살펴보고 IPTV 기술의 장점인 양방향 서비스와 DMB 기술의 장점인 이동성을 결합시켜 언제 어디서나 양방향 TV 서비스를 받을 수 있는 기술인 Mobile IPTV 서비스에 대해 소개하고자 한다. 또한 Mobile IPTV의 문제점, Mobile IPTV의 추진현황 (서비스), Mobile IPTV 향후 방향에 대해 분석하고자 한다. 마지막으로 새롭게 제안된 고속의 중복주소 검사를 통하여 무선 환경에서 IPTV 서비스 단절을 최소화 시키는 방법을 설명한다.

Efficient and Secure Routing Protocol forWireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms

  • Ganesh, Subramanian;Amutha, Ramachandran
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.422-429
    • /
    • 2013
  • Advances in wireless sensor network (WSN) technology have enabled small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In the WSN, the sensor nodes have a limited transmission range and their processing and storage capabilities as well as their energy resources are limited. A triple umpiring system has already been proved for its better performance in WSNs. The clustering technique is effective in prolonging the lifetime of the WSN. In this study, we have modified the ad-hoc on demand distance vector routing by incorporating signal-to-noise ratio (SNR) based dynamic clustering. The proposed scheme, which is an efficient and secure routing protocol for wireless sensor networks through SNR-based dynamic clustering (ESRPSDC) mechanisms, can partition the nodes into clusters and select the cluster head (CH) among the nodes based on the energy, and non CH nodes join with a specific CH based on the SNR values. Error recovery has been implemented during the inter-cluster routing in order to avoid end-to-end error recovery. Security has been achieved by isolating the malicious nodes using sink-based routing pattern analysis. Extensive investigation studies using a global mobile simulator have shown that this hybrid ESRP significantly improves the energy efficiency and packet reception rate as compared with the SNR unaware routing algorithms such as the low energy aware adaptive clustering hierarchy and power efficient gathering in sensor information systems.

센서 네트워크에서 전력소모와 지연시간 개선을 위한 MAC 계층 프로토콜 연구 (MAC Layer Protocol for Improvement in Power Consumption and Time Delay in a Sensor Network)

  • 신재관;박동찬;김석찬
    • 한국통신학회논문지
    • /
    • 제40권2호
    • /
    • pp.366-368
    • /
    • 2015
  • 이 논문은 재난감지 시스템과 같이 비주기적 패킷이 발생하는 센서 네트워크를 위한 MAC 프로토콜을 제안한다. 기존 무선 센서 네트워크에 사용되던 B-MAC은 짧은 지연시간을 가지지만 과도한 프리엠블과 오버히어링으로 인한 전력손실이 발생하며, S-MAC은 동기화로 인한 전력소모가 많은 단점을 가진다. 따라서 이 논문에서는 S-MAC의 전력 소모를 개선하고 B-MAC의 오버헤드와 오버히어링을 개선한 H-MAC을 제안하고 성능을 분석한다.

HDR-WPAN 시스템을 위한 주파수 동기 성능분석 (Performance Analysis of Frequency Synchronization for HDR-WPAN System)

  • 박지우;강희곡;김재영;오창헌
    • 한국항행학회논문지
    • /
    • 제8권2호
    • /
    • pp.163-168
    • /
    • 2004
  • 본 논문에서는 HDR-WPAN(high data rate wireless personal area network) 시스템의 CAZAC sequence 특성을 이용한 주파수 동기 알고리즘을 제안하고, 신호 성상도 및 EVM(error vector magnitude)를 통해 성능을 분석해 본다. 제안된 방식에서 주파수 옵셋은 자기상관성이 우수한 12개의 CAZAC sequence 가운데 두 개 sequence의 각 샘플간 위상오차를 추정하였으며, 추정된 위상오차는 다음 sequence 내 각각의 샘플에 곱해지면서 위상오차를 보상하게 된다. 두 개의 sequence로 주파수 옵셋을 보상한 후 남은 잔류 주파수 옵셋은 샘플 당 최대 0.002도 이내가 되며 DQPSK의 경우 20[dB]에서 EVM의 허용 기준값을 만족할 수 있음을 컴퓨터 시뮬레이션을 통해 확인한다.

  • PDF

Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network

  • Han, Longzhe;Maksymyuk, Taras;Bao, Xuecai;Zhao, Jia;Liu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4572-4586
    • /
    • 2019
  • Mobile Edge Computing (MEC) and Information-Centric Networking (ICN) are essential network architectures for the future Internet. The advantages of MEC and ICN such as computation and storage capabilities at the edge of the network, in-network caching and named-data communication paradigm can greatly improve the quality of video streaming applications. However, the packet loss in wireless network environments still affects the video streaming performance and the existing loss recovery approaches in ICN does not exploit the capabilities of MEC. This paper proposes a Deep Learning based Loss Recovery Mechanism (DL-LRM) for video streaming over MEC based ICN. Different with existing approaches, the Forward Error Correction (FEC) packets are generated at the edge of the network, which dramatically reduces the workload of core network and backhaul. By monitoring network states, our proposed DL-LRM controls the FEC request rate by deep reinforcement learning algorithm. Considering the characteristics of video streaming and MEC, in this paper we develop content caching detection and fast retransmission algorithm to effectively utilize resources of MEC. Experimental results demonstrate that the DL-LRM is able to adaptively adjust and control the FEC request rate and achieve better video quality than the existing approaches.

Adaptive Resonance Theory 2를 이용한 네트워크 기반의 침입 탐지 모델 연구 (Network based Intrusion Detection System using Adaptive Resonance Theory 2)

  • 김진원;노태우;문종섭;고재영;최대식;한광택
    • 정보보호학회논문지
    • /
    • 제12권3호
    • /
    • pp.129-139
    • /
    • 2002
  • 인터넷의 확장에 따라서 네트워크를 통한 침입이 증가되고 있다. 이에 따라 네트워크를 통한 침입에 대하여 즉각적으로 탐지하고 대처하는 기술이 필요하게 되었다. 본 논문은 인터넷의 특성을 악용하여 침입하는 공격들을 탐지하기 위하여 Adaptive Resonance Theory2(ART2) 이론을 이용한다. 정상적인 packet과 여러 가지 공격툴을 사용하여 생산한 인위적인 공격 패킷에 대하여 ART2를 학습한 후 실험한 결과와 기존의 방식들과 비교 분석하였다.