• Title/Summary/Keyword: Packet monitoring

Search Result 208, Processing Time 0.023 seconds

Stateful SIP Protocol with Enhanced Security for Proactive Response on SIP Attack (SIP 공격 대응을 위한 보안성이 강화된 Stateful SIP 프로토콜)

  • Yun, Ha-Na;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.46-58
    • /
    • 2010
  • The user valence of VoIP services with SIP protocol is increasing rapidly because of cheap communication cost and its conveniency. But attacker can easily modify the packet contents of SIP protocol as SIP header is transmitted by using UDP methods in text form. The reason is that SIP protocols does not provide an authentication function on the transmission session. Therefore, existing SIP protocol is very weak on SIP Packet Flooding attack etc. In order to solve like this kinds of SIP vulnerabilities, we used SIP status codes under the monitoring module for detecting SIP Flooding attacks and additionally proposed an advanced protocol where the authentication and security function is strengthened about SIP packet. We managed SIP session spontaneously in order to strengthen security with SIP authentication function and to solve the vulnerability of SIP protocol. The proposed mechanism can securely send SIP packet to solves the security vulnerability with minimum traffic transmission. Also service delay in SIP proxy servers will be minimized to solve the overload problem on SIP proxy server.

Design of Zigbee based Portable ECG monitoring system (지그비 기반의 휴대형 심전도 모니터링 시스템 설계)

  • Hong, Joo-Hyun;Kim, Nam-Jin;Cha, Eun-Jong;Lee, Tae-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.51-53
    • /
    • 2006
  • This paper proposes a portable ECG monitoring system, which integrates uptodate PDA and RF communication technology. The aim of the study is to acquire the subject's biomedical signal without any constraint. It has two types of transmission mode, which are total signal transmission mode and HR(heart rate)/SC(step count) transmission mode. In audition, wireless communication technology uses Zigbee Wireless PAN and can work in low-power mode, which is one of the advantages of ZiBbee communication technology. The developed system is composed of a transmitter and a receiver. The transmitter has three-axial acceleration sensor. ECG amplifier and Zigbee communication controller. In total signal transmission mode, it can send data 50 packets per second whose transmission speed corresponds to 300 ECG samples and 60 acceleration samples. In HR/SG transmission mode, it can calculate heart rate from EEG data with 216 samples per second and step count from acceleration data and send a packet every cardiac cycle. The receiver forwards the received data to PDA, where the data can be stored and displayed. Therefore, the developed device enables to continuous monitoring for Activities of Daily Living(ADL). Also, this method will reduce medical costs in the aged society.

  • PDF

A remotely controllable structural health monitoring framework for bridges using 3.5 generation mobile telecommunication technology

  • Koo, Ki-Young;Hong, Jun-Young;Park, Seunghee;Lee, Jong-Jae;Yun, Chung-Bang
    • Smart Structures and Systems
    • /
    • v.5 no.2
    • /
    • pp.193-207
    • /
    • 2009
  • A framework for structural health monitoring (SHM) systems is presented utilizing a recent 3.5 generation mobile telecommunication technology, HSDPA (High Speed Downlink Packet Access). It may be effectively applied to monitoring bridges, cut-slopes, and other facilities located in rural areas where the conventional Internet service is not readily available, since HSDPA is currently commercialized in 86 countries to make the Internet access possible in anywhere the mobile phone service is available. The proposed SHM framework is also incorporating remote desktop software to have remote control/operation of the SHM systems. The feasibility of the proposed framework has been demonstrated by field tests on a highway bridge in operation. One can expect that fast advances in the mobile telecommunication technology will further enhance the performance of the SHM network using the proposed framework for bridges and other facilities located in remote areas without the conventional wired Internet service.

A Monitoring Tool for Personal Information Leakage Prevention in Network Packets (네트워크 패킷 내 개인정보 유출 방지를 위한 모니터링 도구 개발)

  • Ju, Tea Kyung;Hong, Chong Min;Shin, Weon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.489-494
    • /
    • 2013
  • Personal information has been transmitted in a variety of services of Internet environment, but individual users do not know what information is sent. In this paper, we aim to develop a monitoring tool that continuously monitors personal sensitive information in network packets and informs the user whether or not to leak. So we implement a monitoring tool of personal information and analyze the experiment results. In addition, we introduce a prevention of confidential information in company and a leakage prevention of medical information, for applications that take direct advantage. The results of this study, by contributing to prevent leakage of personal information, can help reduce cyber threats variously targeting personal information of users.

Monitoring System of File Outflow through Storage Devices and Printers (저장매체와 프린터를 통한 파일유출 모니터링시스템)

  • Choi Joo-ho;Rhew Sung-yul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.51-60
    • /
    • 2005
  • The riles or intellectual property on computer systems have increasingly been exposed to such threats that they can be flowed out by internal users or outer attacks through the network. The File Outflow Monitoring System monitors file outflows at server by making the toe when users copy files on client computers into storage devices or print them, The monitoring system filters I/O Request packet by I/O Manager in kernel level if files are flowed out by copying, while it uses Win32 API hooking if printed. As a result, it has exactly made the log and monitored file outflows, which is proved through testing in Windows 2000 and XP.

SLA Parameter Measurement Of Policy Routing Network (Policy Routing Network에서의 SLA 파라메터 측정)

  • Shim, Hoi-Jung;Nam, Ji-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1597-1600
    • /
    • 2001
  • In-Service-Monitoring을 통하여 네트웍 계층에서 성능저하와 전달되어지는 QOS의 영향을 감시하여 Pro-Active 매니지먼트가 가능하다. 그 결과로서 SLA 보증을 위반하기 전에 성능저하를 조기 발견하여 행동을 취한 수 있게 한다. 본 논문에서는 사용자의 요구조건을 만족하기 위한 네트웍의 구성과 SLA 측정의 제약조건들을 고려하고 Policy Based Routing이 적용되는 네트웍에서 Technology-Specific Parameter인 IP Packet Loss Ratio, IP 패킷전송지연, 패킷지터, 가용도등의 SLA Parameter를 측정하였다.

  • PDF

Performance Evaluation of HNCP Home Network Using Stochastic Activity Network Models (Stochastic Activity Network 모델을 이용한 HNCP 홈 네트워트 성능 평가)

  • 이재민;명관주;이감록;전요셉;권욱현
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.183-186
    • /
    • 2003
  • In this paper, performance evaluation of HNCP home network is using stochastic activity network models is proposed. HNCP is a home network protocol for controling and monitoring home appliances using power line communication. a CSMA/CA with packet drop method is used in HNCP MAC layer. Using the proposed stochastic activity network models. performances of HNCP home networks with error-free environment and error environment are evaluated.

  • PDF

The Development of Kernel-based Monitoring System for Grid Application (커널 기반 그리드 응용 모니터링 시스템의 개발)

  • Kim Tae-Kyung;Kim Dong-Su;Byeon Ok-Hwan;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.821-828
    • /
    • 2004
  • To analyze the usage information of system and network resources to the each grid application by measuring the real time traffic and calculating the statistic information, we suggested the kernel-based monitoring methods by researching the efficient monitoring method. This method use small system resourcesand measure the monitoring information accurately with less delay than the usual packet capture methods such as tcpdump. Also we implemented the monitoring systems which can monitor the used resources of system and network for grid application using the suggested kernel-based monitoring method. This research can give the useful information to the development of grid application and to grid network scheduler which can assign the proper resources to the grid application to perform efficiently. Network administrator can decide whether the expansion of network is required or not using the monitoring information.

A Study on Monitoring of Bio-Signal for u-Health System (u-Health System을 위한 생체신호 모니터링에 관한 연구)

  • Han, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.9-15
    • /
    • 2011
  • U-healthcare system has an aim to provide reliable and fast medical services for patient regardless of time and space by transmitting to doctors a large quantity of vital signs collected from sensor networks. Existing u-healthcare systems can merely monitoring patients' health status. In this paper, we describe the implementation and validation of a prototype of a u-health monitoring system based on a wireless sensor network. This system is easy to derive physiologically meaningful results by analyzing rapidly vital signs. The monitoring system sends only the abnormal data of examinee to the service provider. This technique can reduces the wireless data packet overload between a monitoring part and service provider. The real-time bio-signal monitoring system makes possible to implement u-health services and improving efficiency of medical services.

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.