• Title/Summary/Keyword: Proxy

Search Result 1,307, Processing Time 0.027 seconds

Design of User Authentication System for Anti-Spam using Wiretapping in SIP-based VoIP Service (SIP 기반 VoIP 서비스에서 도청을 이용한 스팸 방지를 위한 인증 시스템 설계)

  • Yun, Sung-Yeol;Park, Seok-Cheon
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.590-593
    • /
    • 2008
  • 본 논문에서는 SIP 기반의 VoIP 서비스에서 발생 가능한 스팸 위협중 도청을 이용하여 Redirect 서버에서 Proxy 서버로 송신되는 패킷을 불법적으로 위 변조하여 공격하는 기법의 시나리오와 이를 차단하기 위해 발신자 인증 기법을 제안하였다. UAC가 상대편 UAS에게 INVITE 메시지를 송신할 때 Proxy 서버에서 UAS와 연결되어 있는 Proxy 서버의 주소를 알지 못한다면 Redirect 서버에서 질의를 해야 하는데 그때 Redirect 서버는 302 메시지에 Proxy 서버가 요청한 주소를 실어 보내게 된다. 이 302 메시지 패킷을 스패머가 위 변조 할 경우 Proxy 서버는 잘못된 주소가 포함된 INVITE 메시지를 생성하게 되고 스패머와 RTP 세션이 열릴수 있다. 따라서 본 논문에서는 이를 차단하기 위해 인증 메시지가 포함된 ACK 메시지를 정의하여 인증 시스템을 설계하였다.

  • PDF

Virtual Interface model for Multi-Interface Supports in Proxy MIPv6 Domains (Proxy MIPv6 환경에서 가상인터페이스를 이용한 멀티인터페이스 지원 방안 연구)

  • Youn, Joo-Sang;Hwang, Won-Wook;Pack, Sang-Heon;Hong, Yong-Geun;Park, Jung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.230-232
    • /
    • 2010
  • 최근 무선 멀티 인터페이스를 이용한 동시 접속 기술에 관한 연구가 활발히 진행 중이다. 이와 관련된 연구 중 하나인 Proxy MIPv6 환경에서 멀티호밍 지원에 관한 연구가 IETF Netext WG에서 진행 중이다. 기존 Proxy MIPv6 프로토콜은 멀티인터페이스 제공 시 독립된 HNP 할당을 통해 동시 접속 서비스를 제공하고 있다. 하지만 이 방법은 이동 노드의 세션 연결성을 유지하지 못하는 문제점을 가지고 있다. 본 논문에서는 이런 문제점을 해결하기 위해 멀티호밍 되어 있는 이동 단말 내부에 가상 인터페이스 모델의 필요성과 기능에 대해서 정의하며 또한 가상 인터페이스를 통해 기존 연결성을 유지 할 수 있도록 방법을 제안하고 이에 관해 논한다.

  • PDF

Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting (Proxy Mobile IPv6 네트워크에서 포워딩 모드를 지원하는 인증기법의 성능분석)

  • Lee, Seung-Hyun;Shin, Dong-Ryeol;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.15-25
    • /
    • 2012
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

The Design of Proxy for CORBA Traffic Monitoring Using OSI management technology (OSI 관리 기술을 이용한 CORBA 트래픽 모니터링 프록시 설계)

  • 박재성;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.355-362
    • /
    • 1999
  • Traffic monitoring, a part of the system management, is a vital function lot the proper operation of a system in use. Currently OMG has been trying to standardize CORBA system management. Besides, many companies and research laboratories have been developing and studying CORBA system management. In this paper, we have designed the proxy to monitor the CORBA traffic using the OSI management technology. To manage CORBA traffic resources, 6 parameters have been made into managed objects. The monitoring system consists of a CORBA server, a proxy object and an MIB. The CORBA server is made up of a service provider, a proxy server, and a event sewer. The proxy object acts as a process of a CORBA object, and is made up of a proxy client, a event client, and an IPC server.

  • PDF

Toward Transparent Virtual Coupling for Haptic Interaction during Contact Tasks (컨택트 작업 시 햅틱 인터렉션의 투명성 향상을 위한 Virtual Coupling 기법의 설계)

  • Kim, Myungsin;Lee, Dongjun
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.3
    • /
    • pp.186-196
    • /
    • 2013
  • Since its introduction (e.g., [4, 6]), virtual coupling technique has been de facto way to connect a haptic device with a virtual proxy for haptic rendering and control. However, because of the single dependence on spring-damper feedback action, this virtual coupling suffers from the degraded transparency particularly during contact tasks when large device/proxy-forces are involved. In this paper, we propose a novel virtual coupling technique, which, by utilizing passive decomposition, reduces device-proxy position deviation even during the contact tasks while also scaling down (or up) the apparent inertia of the coordinated device-proxy. By doing so, we can significantly improve transparency between multiple degree of freedom (possibly nonlinear) haptic device and virtual proxy. In other to use passive decomposition, disturbance observer of [3] is adopted to estimate human force with some dead-zone modification to avoid "winding-up" force estimation in the presence of device torque saturation. Some preliminary experimental results are also given to illustrate efficacy of the proposed technique.

A proxy driving system supporting user convenience and system efficiency (사용자 편의성과 시스템 효율성을 지원하는 대리운전 시스템)

  • Koh, Jeong-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1725-1733
    • /
    • 2012
  • This paper describes the design and implementation of a 3-tiered proxy driving system utilizing smartphones. This system provides customers with a convenient request facility, and enables proxy drivers to provide a prompt service based on customer's location information. Implemented system supports two methods such as the existing phone-call and the online requesting method using smartphones. Performance analysis shows that the higher the ratio of online requests, the greater the effect of decreasing of phone jockey's workloads and the reduction of request processing time through the automation of receipt and processing. From a proxy driver company's standpoint, this system minimizes the increase of phone jockeys, and improves customer satisfaction through good service quality. This system also helps the company reduce the cost and increase the market share.

Method of Preventing DDoS Using Proxy Server Group and Dynamic DNS (Proxy Server Group과 Dynamic DNS를 이용한 DDoS 방어 구축 방안)

  • Shin, Sang Il;Kim, Min Su;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.101-106
    • /
    • 2012
  • As the existing strategy of preventing DDoS(Distributed Denial of Service) attacks has limitations, this study is intended to suggest the more effective method of preventing DDoS attacks which reduces attack power and distributes attack targets. Currently, DDoS attacks have a wide range of targets such as individuals, businesses, labs, universities, major portal sites and financial institutions. In addition, types of attacks change from exhausting layer 3, network band to primarily targeting layer 7. In response to DDoS attacks, this study suggests how to distribute and decrease DDoS threats effectively and efficiently using Proxy Server Group and Dynamic DNS.

Identity Based Proxy Re-encryption Scheme under LWE

  • Yin, Wei;Wen, Qiaoyan;Li, Wenmin;Zhang, Hua;Jin, Zheng Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6116-6132
    • /
    • 2017
  • The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.

Handover Performance Evaluation for Proxy Mobile IPv6 (Proxy Mobile IPv6의 핸드오버 성능 평가)

  • Hyeon, Seung-Il;Han, Youn-Hee;Kong, Ki-Sik;Shin, Myung-Ki;Jeong, Sang-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.317-322
    • /
    • 2007
  • IPv6 이동성 관리를 위한 기존의 호스트 기반 프로토콜인 Mobile IPv6는 오랜 기간 동안 많은 연구에 의해 표준화되어진 안정적인 기술이지만 실제 상용망에서는 잘 사용이 안되고 있다. 그 이유는 단말의 수정 요구, 과도한 유/무선 자원 사용, 느린 핸드오버 지연시간 등이 있다. 이와 같은 Mobile IPv6의 단점을 극복하기 위하여 개발된 네트워크 기반 이동성 관리 프로토콜인 Proxy Mobile IPv6가 최근에 주목받고 있다. Proxy Mobile IPv6는 단말에서의 이동성 지원을 위한 수정이 필요하지 않으며, 유/무선 자원도 효율적으로 사용하며, 핸드오버 지연시간도 단축된다는 장점을 지니고 있다. 본 논문에서는 Proxy Mobile IPv6와 기존 호스트 기반 프로토콜인 Mobile IPv6, Hierarchical Mobile IPv6를 체계적으로 분석하고 핸드오버 지연시간을 비교 분석한다. 비교 분석 결과로서 Proxy Mobile IPv6는 기존 기법들보다 약 $84{\sim}93%$ 정도의 핸드오버 지연시간 단축이 있음을 알 수 있다.

  • PDF

ASTAS: Architecture for Scalable and Transparent Anycast Services

  • Stevens, Tim;De Leenheer, Marc;Develder, Chris;De Turck, Filip;Dhoedt, Bart;Demeester, Piet
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.457-465
    • /
    • 2007
  • Native information provider(IP) anycast suffers from routing scalability issues and the lack of stateful communication support. For this reason, we propose architecture for scalable and transparent anycast services(ASTAS), a proxy-based architecture that provides support for stateful anycast communications, while retaining the transparency offered by native anycast. Dynamic resource assignment for each initiated session guarantees that a connection is established with the most suitable target server, based on network and server conditions. Traffic engineering in the overlay can be realized in an effective way due to the dissemination of aggregated state information in the anycast overlay. To minimize the total deployment cost for ASTAS architectures, we propose optimized proxy placement and path finding heuristics based on look-ahead information gathered in network nodes. Contrary to a regular integer linear program(ILP) formulation, these heuristics allow to optimize proxy placement in large networks. A use case on a European reference network illustrates that lower proxy costs enable proxy deployment closer to the end-users, resulting in a reduced network load.