• Title/Summary/Keyword: Path Sharing

Search Result 138, Processing Time 0.035 seconds

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

Pre-Planned Tree Reconfiguration Mechanism for QoS Multicast Routing (QoS 멀티캐스트 라우팅을 위한 계획된 트리 재구성 방법)

  • Han, Seung-Jae;Park, Sun-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.120-133
    • /
    • 2007
  • A multicast tree includes several, possibly a large number of, paths connecting source-receiver pairs, and network failure may disable part of the multicast tree. Reconstruction of the entire multicast tree to recover from a component failure is highly undesirable, because some group members have to suffer service disruptions even though the communication paths to/from them are not affected by the failure. To limit reconfiguration region and to maximize the likelihood of successful reconfiguration, we propose and evaluate a pre-planned reconfiguration policy for QoS multicast sessions. Specifically, we equip a reconfiguration path (RP) with each end-to-end path that connects a source-receiver pair in the multicast tree, and reserve resources in advance along the RPs. Efficient resource-sharing techniques are applied to reduce the amount of resources reserved for RPs but not used in the absence of failures. This way, we prevent uncontrolled competition among different multicast sessions which may simultaneously try to recover from failures. We evaluate the performance of the proposed scheme using simulation on randomly-generated networks. We use the shortest-path routing for QoS multicast sessions, and simulate both source-based and shared multicast trees. The evaluation results indicates that successful pre-planned reconfiguration can be achieved for all group members with reasonable overhead. Our scheme is also shown to adapt well to dynamic changes of group membership.

Millimeter-wave directional-antenna beamwidth effects on the ITU-R building entry loss (BEL) propagation model

  • Lee, Juyul;Kim, Kyung-Won;Kim, Myung-Don;Park, Jae-Joon;Yoon, Young Keun;Chong, Young Jun
    • ETRI Journal
    • /
    • v.42 no.1
    • /
    • pp.7-16
    • /
    • 2020
  • Assuming omnidirectional antenna reception, the ITU-R recently developed a new propagation model on building entry loss (BEL) for 5G millimeter-wave frequency sharing and compatibility studies, which is a simplified outdoor-to-indoor path loss model. Considering the utilization of high-gain narrow-beamwidth beamforming, the omnidirectional-based ITU-R BEL model may not be appropriate to predict propagation characteristics for directional beamforming scenarios. This paper studies the effects of beamwidth on the ITU-R BEL model. This study is based on field measurements collected with four different beamwidth antennas: omnidirectional, 10° horn, 30° horn, and 60° horn. The measurement campaigns were conducted at two types of building sites: traditional and thermally efficient buildings. These sites, as well as the measurement scenarios, were carefully chosen to comply with the ITU-R BEL measurement guidelines and the ITU-R building types. We observed the importance of accurate beam alignment from the BEL variation range. We were able to quantify the beamwidth dependency by fitting to a model that is inversely proportional to the beamwidth.

SOC Verification Based on WGL

  • Du, Zhen-Jun;Li, Min
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1607-1616
    • /
    • 2006
  • The growing market of multimedia and digital signal processing requires significant data-path portions of SoCs. However, the common models for verification are not suitable for SoCs. A novel model--WGL (Weighted Generalized List) is proposed, which is based on the general-list decomposition of polynomials, with three different weights and manipulation rules introduced to effect node sharing and the canonicity. Timing parameters and operations on them are also considered. Examples show the word-level WGL is the only model to linearly represent the common word-level functions and the bit-level WGL is especially suitable for arithmetic intensive circuits. The model is proved to be a uniform and efficient model for both bit-level and word-level functions. Then Based on the WGL model, a backward-construction logic-verification approach is presented, which reduces time and space complexity for multipliers to polynomial complexity(time complexity is less than $O(n^{3.6})$ and space complexity is less than $O(n^{1.5})$) without hierarchical partitioning. Finally, a construction methodology of word-level polynomials is also presented in order to implement complex high-level verification, which combines order computation and coefficient solving, and adopts an efficient backward approach. The construction complexity is much less than the existing ones, e.g. the construction time for multipliers grows at the power of less than 1.6 in the size of the input word without increasing the maximal space required. The WGL model and the verification methods based on WGL show their theoretical and applicable significance in SoC design.

  • PDF

Time-Efficient Event Processing Using Provisioning-to-Signaling Method in Data Transport Systems Requiring Multiple Processors

  • Kim, Bup-Joong;Ryoo, Jeong-dong;Cho, Kyoungrok
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.41-50
    • /
    • 2017
  • In connection-oriented data transport services, data loss can occur when a service experiences a problem in its end-to-end path. To resolve the problem promptly, the data transport systems providing the service must quickly modify their internal configurations, which are distributed among different locations within each system. The configurations are modified through a series of problem (event) handling procedures, which are carried out by multiple control processors in the system. This paper proposes a provisioning-to-signaling method for inter-control-processor messaging to improve the time efficiency of event processing. This method simplifies the sharing of the runtime event, and minimizes the time variability caused by the amount of event data, which results in a decrease in the latency time and an increase in the time determinacy when processing global events. The proposed method was tested for an event that required 4,000 internal path changes, and was found to lessen the latency time of global event processing by about 50% compared with the time required for general methods to do the same; in addition, it reduced the impact of the event data on the event processing time to about 30%.

Structural Influence of SNS Social Capital on SNS Health Information Utilization Level (SNS의 사회적자본이 건강정보 활용수준에 미치는 구조적 영향력)

  • Park, Jaesung;Kim, Kyeong-Na
    • The Korean Journal of Health Service Management
    • /
    • v.14 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • Objectives : The purpose of this study was to test fitness of the structured model of SNS activities for health information. Methods : A structured questionnaire were administered to 500 subjects. A structural equation model was applied to collected data. Results : The response rate was 73.9%. The respondents mostly used Facebook and KakaoStory. They spent 70 minutes per day and 21~30% of this usage was taken by health information. In the variances, those who has religion more actively exchanged information about diseases and medical institutions. The goodness-of-fit of the model was .81(GFI) and .90(CFI). The main path was bridging capital -> bonding capital -> credibility -> SNS activities for health information. The path from quality of sharing information to SNS activities was not significant. It could be explained by the restriction of digital literacy. Conclusions : SNS activities for health information were determined by credibility, currency and bonding social capital. Bridging social capital, indirectly, influenced SNS activities through bonding social capital. Thus building bonding social capital would be a critical success factor for SNS.

Adaptive Success Rate-based Sensor Relocation for IoT Applications

  • Kim, Moonseong;Lee, Woochan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3120-3137
    • /
    • 2021
  • Small-sized IoT wireless sensing devices can be deployed with small aircraft such as drones, and the deployment of mobile IoT devices can be relocated to suit data collection with efficient relocation algorithms. However, the terrain may not be able to predict its shape. Mobile IoT devices suitable for these terrains are hopping devices that can move with jumps. So far, most hopping sensor relocation studies have made the unrealistic assumption that all hopping devices know the overall state of the entire network and each device's current state. Recent work has proposed the most realistic distributed network environment-based relocation algorithms that do not require sharing all information simultaneously. However, since the shortest path-based algorithm performs communication and movement requests with terminals, it is not suitable for an area where the distribution of obstacles is uneven. The proposed scheme applies a simple Monte Carlo method based on relay nodes selection random variables that reflect the obstacle distribution's characteristics to choose the best relay node as reinforcement learning, not specific relay nodes. Using the relay node selection random variable could significantly reduce the generation of additional messages that occur to select the shortest path. This paper's additional contribution is that the world's first distributed environment-based relocation protocol is proposed reflecting real-world physical devices' characteristics through the OMNeT++ simulator. We also reconstruct the three days-long disaster environment, and performance evaluation has been performed by applying the proposed protocol to the simulated real-world environment.

Search of Optimal Path and Renewal via network based Reinforcement Learning Algorithm and sharing of System Imformation (네트워크 기반의 강화학습 알고리즘과 시스템의 정보공유화를 통한 최단경로 검색과 갱신)

  • Min, Seong-Joon;Chang, Jong-Soo;Kim, Hong-Yoon;Heo, Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.2900-2902
    • /
    • 2005
  • 본 논문에서는 환경과 시스템의 상호작용을 통한 경험에 의해 습득된 정보를 개체간 네트워크를 통하여 갱신하는 과정을 구성하는 연구를 하였다. 기존의 연구에서는 강화학습 알고리즘을 이용하여 임의의 구역에 대한 지도 정보를 습득하고 이를 바탕으로 개체들 각각의 최적의 행동 정책을 구성하는 바 이 때 각각의 체개체가 가지고 있는 최단경로에 대한 정보의 우위를 결정하는 과정을 추가하였다. 이를 바탕으로 최종적으로 선택된 경로에 대한 정보를 업데이트하여 구성 된 네트워크를 통한 개체간 데이터를 동시에 공유하는 과정을 거쳐서 각각의 시스템이 스스로 정보를 갱신하는 방법을 제안하였다 또한 이 제안한 개념의 적합성을 입증하기 위하여 개체간의 정보를 통합하고 비교하는 실험을 수행하여 성공적인 결과를 얻었다.

  • PDF

COORDINATION CHART COLLISION-FREE MOTION OF TWO ROBOT ARMSA

  • Shin, You-Shik;Bien, Zeung-Nam
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1987.10a
    • /
    • pp.915-920
    • /
    • 1987
  • When a task requires two robot arms to move in a cooperative manner sharing a common workspace, potential collision exists between the two robot arm . In this paper, a novel approach for collision-free trajectory planning along paths of two SCARA-type robot arms is presented. Specifically, in order to describe potential collision between the links of two moving robot arms along the designated paths, an explicit form of "Virtual Obstacle" is adopted, according to which links of one robot arm are made to grow while the other robot arm is forced to shrink as a point on the path. Then, a notion of "Coordination Chart" is introduced to visualize the collision-free relationship of two trajectories.of two trajectories.

  • PDF

Design and evaluation of a fuzzy cooperative caching scheme for MANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.3
    • /
    • pp.605-619
    • /
    • 2010
  • Caching of frequently accessed data in multi-hop ad hoc environment is a technique that can improve data access performance and availability. Cooperative caching, which allows sharing and coordination of cached data among several clients, can further en-hance the potential of caching techniques. In this paper, we propose a fuzzy cooperative caching scheme in mobile ad hoc networks. The cache management of the proposed caching scheme not only uses adaptively CacheData or CachePath based on data sim-ilarity and data utility, but also uses the replacement manager based on data pro t. Also, the proposed caching scheme uses a prefetch manager. When the TTL of the cached data expires, the prefetch manager evaluates the popularity index of the data. If the popularity index is larger than a threshold, the data is prefetched. Otherwise, its space is released. The performance of the proposed scheme is evaluated analytically and is compared to that of other cooperative caching schemes.