• Title/Summary/Keyword: SSDP

Search Result 27, Processing Time 0.031 seconds

A Novel Architecture of UPnP Bridge for Non-IP devices (Non-IP 장치 제어를 위한 새로운 UPnP 브리지 구조)

  • Kang, Jeong-Seok;Choi, Yong-Soon;Kim, Seong-Hoon;Lee, Kwang-Koog;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.442-444
    • /
    • 2007
  • This paper presents an architecture of UPnP Bridge that allows controlling Non-iP devices from UPnP control point, without modification to Non-IP device or UPnP control point implementations. UPnP devices must provide SSDP discovery, SOAP control and GENA event processes. To represent Non-IP devices to UPnP devices, UPnP Bridge provides these functionalities on behalf of Non-IP devices. We provides two method to interoperability between UPnP and Non-IP devices, Message Field Description, Non-UPnP Proxy devices. And solution to integrate heterogeneous networking standards(RS232C, CAN, IEEE1394, USB) is provided.

  • PDF

A Design of DDoS Detection and Defense System using DPI/QoS (DPI/QoS를 이용한 DDoS 탐지 및 방어 시스템 설계)

  • Park, Hyun-Woo;Choi, Chan-Ho;Kim, Yong-Hun;Choi, Gan-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.362-365
    • /
    • 2015
  • DDoS 공격의 빈도와 규모가 계속 증가하고 있으며 그에 따른 피해와 파급도 커지고 있다. 최근 동향에서 봇넷을 이용한 패킷 플루딩 공격이 여전히 상위 공격순위를 차지하고 있다. 공격유형으로는 TCP SYN, UDP fragment 및 SSDP 플루딩 공격 등이 여전히 강세를 보이고 있다. 이러한 공격들은 source IP가 변조된 악의적인 패킷을 대량으로 발생시켜서 공격대상 네트워크 인프라를 마비시킨다. DDoS 공격 탐지를 위해서는 내부로 유입되는 초당 패킷수와 사용자와 서버간의 연결이 네트워크 플로우수의 변화를 관측하는 것이 필요하며 방어를 위해 트래픽 제어 기술이 필요하다. 이에 본 논문에서는 네트워크 서비스 분석 및 제어 기술인 DPI/QoS 솔루션을 이용한 플로우 기반의 DDoS 탐지 및 방어 시스템을 제안한다. 네트워크 모니터링과 제어를 위하여 사용하던 DPI/QoS 솔루션에 DDoS 탐지 및 방어기능을 추가함으로써 효율성 및 경제성에서 강점을 가질 것으로 기대한다.

A Study for Vulnerability of Security of UPnP Home-Network in Wireless LAN Environment (무선 LAN 환경에서 UPnP 홈네트워크 보안 취약점에 관한 연구)

  • Han, Seol-Heum;Kwon, Kyung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1086-1089
    • /
    • 2009
  • UPnP(Universal Plug and Play) 홈네트워크에서 무선랜은 위치에 상관없이 쉽게 설치하여 사용할 수 있어 사용자에게 편의성을 제공 하지만, AP(Access Point)는 해킹을 통한 MAC 주소 및 SSID(Service Set Identifier), WEP(Wired Equivalent Privacy)의 암호를 쉽게 알 수 있어 보안에 취약하다. 또한 UPnP 는 TCP/IP 를 사용하는 인터넷 표준과 기술을 기반으로 하고 있고 HTTP, UDP, SSDP, GENA 등의 표준 프로토콜을 사용하기에 보안 대책에 취약점을 가지고 있다. 본 논문에서는 댁외에서 UPnP 홈네트워크에 사용되는 AP 를 해킹하고, 해킹한 AP 정보를 이용하여 UPnP 홈네트워크의 디바이스 정보를 취득하고, 댁내 컨트롤 포인트(Control Point)를 해킹하여 MAC 주소 및 IP 주소를 댁외 컨트롤 포인터로 변조하여 UPnP 홈네트워크 디바이스를 제어하는 실험으로 UPnP 홈네트워크 보안의 취약점에 대해 분석한다.

The Optimum Structural Design of the High-speed Surface Effect Ship using Composite Materials - Minimum Weight Design (복합재료 쌍동형 초고속선의 최적 구조 설계 - 최소 중량 설계)

  • Chang-Doo Jang;Ho-Kyung Kim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.35 no.2
    • /
    • pp.94-103
    • /
    • 1998
  • Recently, many researches are carried for high-speed and light craft. In this study, the optimum structural design procedure and the computer program are developed to minimize the hull weight of SES(Surface Effect Ship) built of composite materials. Three types of composite materials-Sandwich, Single Skin and Hybrid type- are considered and the efficiency of each type is investigated. In design process, the optimum design of main members is performed at first considering longitudinal strength. And then, the transverse member design is performed considering torsional strength SSDP(Structural Synthesis Design program) of U.S. Navy is adopted for design algorithm and DnV classification nile for design loads and strength criteria. For optimum structural design, ES 1+1 optimization technique is used.

  • PDF

UDP-Based Active Scan for IoT Security (UAIS)

  • Jung, Hyun-Chul;Jo, Hyun-geun;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.20-34
    • /
    • 2021
  • Today, IoT devices are flooding, and traffic is increasing rapidly. The Internet of Things creates a variety of added value through connections between devices, while many devices are easily targeted by attackers due to security vulnerabilities. In the IoT environment, security diagnosis has problems such as having to provide different solutions for different types of devices in network situations where various types of devices are interlocked, personal leakage of security solutions themselves, and high cost, etc. To avoid such problems, a TCP-based active scan was presented. However, the TCP-based active scan has limitations that it is difficult to be applied to real-time systems due to long detection times. To complement this, this study uses UDP-based approaches. Specifically, a lightweight active scan algorithm that effectively identifies devices using UPnP protocols (SSDP, MDNS, and MBNS) that are most commonly used by manufacturers is proposed. The experimental results of this study have shown that devices can be distinguished by more than twice the true positive and recall at an average time of 1524 times faster than Nmap, which has a firm position in the field.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

Analysis of ensemble streamflow prediction effect on deriving dam releases for water supply (용수공급을 위한 댐 방류량 결정에서의 앙상블 유량 예측 효과 분석)

  • Kim, Yeonju;Kim, Gi Joo;Kim, Young-Oh
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.12
    • /
    • pp.969-980
    • /
    • 2023
  • Since the 2000s, ensemble streamflow prediction (ESP) has been actively utilized in South Korea, primarily for hydrological forecasting purposes. Despite its notable success in hydrological forecasting, the original objective of enhancing water resources system management has been relatively overlooked. Consequently, this study aims to demonstrate the utility of ESP in water resources management by creating a simple hypothetical exercise for dam operators and applying it to actual multi-purpose dams in South Korea. The hypothetical exercise showed that even when the means of ESP are identical, different costs can result from varying standard deviations. Subsequently, using sampling stochastic dynamic programming (SSDP) and considering the capacity-inflow ratio (CIR), optimal release patterns were derived for Soyang Dam (CIR = 1.345) and Chungju Dam (CIR = 0.563) based on types W and P. For this analysis, Type W was defined with standard deviation equal to the mean inflow, and Type P with standard deviation ten times of the mean inflow. Simulated operations were conducted from 2020 to 2022 using the derived optimal releases. The results indicate that in the case of Dam Chungju, more aggressive optimal release patterns were derived under types with smaller standard deviations, and the simulated operations demonstrated satisfactory outcomes. Similarly, Soyang Dam exhibited similar results in terms of optimal release, but there was no significant difference in the simulation between types W and P due to its large CIR. Ultimately, this study highlights that even with the same mean values, the standard deviation of ESP impacts optimal release patterns and outcomes in simulation. Additionally, it underscores that systems with smaller CIRs are more sensitive to such uncertainties. Based on these findings, there is potential for improvements in South Korea's current operational practices, which rely solely on single representative values for water resources management.