• Title/Summary/Keyword: TCP프로토콜

Search Result 634, Processing Time 0.03 seconds

Detection of Internal Illegal Query Using Packet Analysis (패킷 분석을 이용한 내부인 불법 질의 탐지)

  • Jang Gyong-Ohk;Koo Hyang-Ohk;Oh Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.259-265
    • /
    • 2005
  • The purpose of this study is for designing a illegal query detection system using Winpcap library for unauthorized access by internal person. The illegal query detection can be possible detecting the data in out of access control or searching illegal data by plagiarizing other user ID. The system used in this paper collects packets and analyzes the data related to SQL phrase among them, and selects the user's basic information by comparing the dispatch of MAC address and user's hardware information constructed previously. If the extracted information and user's one are different, it is considered as an illegal query. It is expected that the results of this study can be applied to reducing the snaking off unprotected data, and also contributed to leaving the audit records using user's access log which can be applied to the pattern analysis.

  • PDF

Enhanced Communication Transport Protocol: Implementations and Experimentations (ECTP 멀티캐스트 전송 프로토콜: 구현 및 성능분석)

  • Park, Ki-Shik;Park, Juyoung;Koh, Seok-Joo;Jo, In-June
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.876-890
    • /
    • 2003
  • This paper proposes a protocol for the reliableand QoS-aware multicast transport, which is called the Enhanced Communications Transport Protocol (ECTP). The ECTP has so far been developed and standardized in ITU-T SG17 and ISO/IEC JTC 1/SC 6. Differently from the conventional reliable multicast, as shownin the IETF RMT WG, the ECTP additionally provides several distinct features such as tight control of multicast session, tree-based error control, and QoS management. For the tight control of multicast connections, the sender is at the heart of one-to-many group communications, and it is responsible for overall connection management such as connection creation/termination, pause/resumption, and the join and leave operations. for tree-based reliability control, ECTP configures a hierarchical tree during connection creation. Error control is performed within each local group defined by a control tree, which was partly designed like the IETF TRACK approach. Each parent retransmits lost data in response to retransmission requests from its children. For QoS management, ECTP supports QoS negotiation for resource reservation, and it also provides QoS monitoring and maintenance operations. ECTP has been implemented and tested on Linux machine, along with Application Programming Interfaces based on Berkeley sockets. For basic testing of the ECTP functionality, we give some preliminary experimental results for performance comparison of ECTP and TCP unicast transports. In conclusion, we describe the status of ECTP experimentations over APAN/KOREN testbed networks

The design of SIMIP for the continuous session between a static host and a mobile host in client-server environment (클라이언트 서버 환경에서 이동호스트와 고정호스트간 지속적인 세션을 지원하는 SIMIP 설계)

  • Gwon, Eun-Gyeong;Jo, Yong-Gu;Chae, Gi-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.763-773
    • /
    • 1998
  • 본논문은 TCP/IP를 사용하는 기존의 LAN상에 이동 호스트들이 셀의 형태로 덧붙여진 환경에서 이동 호스트와 고정 호스트간의 지속적인 세션을 지원하는 개선된 IP 체계인 SIMIP을 제안하였다. 이동형 프로토콜 설계시 라우팅 최적화가 매우 중요한 항목이고 이는 이동 호스트의 위치정보 관리방법과 직접적인 관계가 있다. 기존의 아이비엠과 마쓰시다 제안은 이를 집중화하였으며 콜롬비아와 소니제안은 이를 분산화하였다. MH 위치정보를 집중화하면 트라이앵글 문제로 인해 최적의 라우팅 경로를 지원할 수 없으며 집중화된 라우터의 실패 발생시는 위험도가 매우 크다. 반면에 분산화하면 위의 문제들은 해결되지만 캡슐화되는 주소를 찾기위해 CACH 또는 AMT와 같은 복잡한 기법이 요구된다. SIMIP은 MH위치정보를 DMR에 집중화하였으나 DMR 실패 발생시는 복수의 GMR중에서 하나가 자동적으로 DMR로 대체되어 위험도를 최소화시켰고, 'DMR 경로변경'에 의해 최적의 라우팅 경로를 지원하였다는 점에서 다른 제안들과 차이가 있다. 이동에 따른 주소변경을 해결하기 위해 가상네트워크 기법을 적용하였고, 이동 호스트로의 데이터 송신시 디폴트 라우팅 개념을 이용하였고, 이동라우터간 터널링에 IPIP 캡슐화를 사용하였다. SIMIP은 다른 제안에 비해 실용성있고, 신뢰성이 강하며, 구현이 용이하므로 산업계에서 활용가치가 있으리라본다.

  • PDF

Development of remote monitoring system based on wire and wireless internet Environment (유.무선 인터넷 환경에 연동한 원격 감시시스템 개발)

  • 박상국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.557-560
    • /
    • 2004
  • In this paper, wireless internet services are combined with conventional wire internet service system. These system support that instrument manager can be access his instrument by use personal mobile devices and instrument manager can be take emergency action by use mobile devices. for this, error signal of local instruments are transmitted to the serial port of local server through Rf wireless communication channel. Also, The image of local instruments are transmitted to the web monitoring screen of main server. Network Camera System Supports remote monitoring functions. The interfacing of nam server with external user are possible through the mobile devices.

  • PDF

A Research on Smartphone-based Friendly Mobile Robot (스마트폰을 활용한 개인 친화형 이동로봇 연구)

  • Jo, Jae-hyuk;Kim, Yu-ri;Kim, Hye-ji;Ro, Kwang-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1038-1041
    • /
    • 2015
  • 본 연구에서는 개인 서비스 로봇에서 한 단계 더 발전시켜 사용자와 소통이 가능한 로봇을 개발하여, 사용자에게 편리함을 제공할 뿐만 아니라 동반자와 같은 개인 친화적 로봇을 개발하고자 한다. 스마트 벗(Smart Bot)은 안드로이드 어플리케이션으로 로봇의 움직임 및 커뮤니케이션을 제어하며, 현재 사용중인 스마트폰과 다른 스마트폰 두 대의 스마트폰만 있으면 누구나 사용가능 하다. 스마트 벗에 스마트폰을 도킹하면 어플리케이션이 실행되며, 로봇에 부착된 아두이노와 스마트폰이 시리얼 통신을 하게 된다. 그러면 각 쓰레드가 시작되어 영상전송서버, 원격제어, 얼굴인식, 음성인식을 멀티 쓰레드로 동작시킨다. 각 기능의 쓰레드 간의 통신과 쓰레드 주기설정은 메인 쓰레드의 Handler 객체의 Message로 통신 및 제어를 하며, 원격제어 및 영상전송의 경우 다른 스마트폰의 Remote 어플리케이션을 통해 해당 로봇에 접속하게 된다. 이 때, 해당 영상 및 제어 전송/수신 통신은 스마트폰의 WIFI 기능을 통한 TCP/IP 프로토콜을 통해 전송/수신된다. 로봇에 안드로이드 스마트폰을 결합하여 스마트폰 보유자라면 누구나 로봇을 이용할 수 있고, 연령층과 성별의 구분 없이 각 사람들의 생활 속에서 활용할 수 있는 다양한 기능을 통해 일상생활 속에서 로봇의 활용성을 증대시키고자 하였다.

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

The Effect of Wireless Channel Models on the Performance of Sensor Networks (채널 모델링 방법에 따른 센서 네트워크 성능 변화)

  • 안종석;한상섭;김지훈
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.375-383
    • /
    • 2004
  • As wireless mobile networks have been widely adopted due to their convenience for deployment, the research for improving their performance has been actively conducted. Since their throughput is restrained by the packet corruption rate not by congestion as in wired networks, however, network simulations for performance evaluation need to select the appropriate wireless channel model representing the behavior of propagation errors for the evaluated channel. The selection of the right model should depend on various factors such as the adopted frequency band, the level of signal power, the existence of obstacles against signal propagation, the sensitivity of protocols to bit errors, and etc. This paper analyzes 10-day bit traces collected from real sensor channels exhibiting the high bit error rate to determine a suitable sensor channel model. For selection, it also evaluates the performance of two error recovery algorithms such as a link layer FEC algorithm and three TCPs (Tahoe, Reno, and Vegas) over several channel models. The comparison analysis shows that CM(Chaotic Map) model predicts 3-time less BER variance and 10-time larger PER(Packet Error Rate) than traces while these differences between the other models and traces are larger than 10-time. The simulation experiments, furthermore, prove that CM model evaluates the performance of these algorithms over sensor channels with the precision at least 10-time more accurate than any other models.

5GHz Wi-Fi Design and Analysis for Vehicle Network Utilization (차량용 네트워크 활용을 위한 5GHz WiFi 설계 및 분석)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.18-25
    • /
    • 2020
  • With the development of water internet technology, data communication between objects is expanding. Research related to data communication technology between vehicles that incorporates related technologies into vehicles has been actively conducted. For data communication between mobile terminals, data stability, reliability, and real-time performance must be guaranteed. The 5 GHz Wi-Fi band, which is advantageous in bandwidth, communications speed, and wireless saturation of the wireless network, was selected as the data communications network between vehicles. This study analyzes how to design and implement a 5 GHz Wi-Fi network in a vehicle network. Considering the characteristics of the mobile communication terminal device, a continuous variable communications structure is proposed to enable high-speed data switching. We simplify the access point access procedure to reduce the latency between wireless terminals. By limiting the Transmission Control Protocol Internet Protocol (TCP/IP)-based Dynamic Host Configuration Protocol (DHCP) server function and implementing it in a broadcast transmission protocol method, communication delay between terminal devices is improved. Compared to the general commercial Wi-Fi communication method, the connection operation and response speed have been improved by five seconds or more. Utilizing this method can be applied to various types of event data communication between vehicles. It can also be extended to wireless data-based intelligent road networks and systems for autonomous driving.

SNMPv3 Security Module Design and Implementation Using Public Key (공개키를 이용한 SNMPv3 보안 모듈 설계 및 구현)

  • Han, Ji-Hun;Park, Gyeong-Bae;Gwak, Seung-Uk;Kim, Jeong-Il;Jeong, Geun-Won;Song, In-Geun;Lee, Gwang-Bae;Kim, Hyeon-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.122-133
    • /
    • 1999
  • Uses can share information and use resources effectively by using TCP/IP-based networks. So, a protocol to manage complex networks effectively is needed. For the management of the distributed networks, the SNMP(Simple Network Management Protocol) has been adopted as an international standard in 1989, and the SNMPv2 in which a security function was added was published in 1993. There are two encryption schemes in SNMPv2, the one is a DES using symmetric encryption scheme and the other is a MD5(Message Digest5) hash function for authentication. But the DES has demerits that a key length is a few short and the encryption and the authentication is executed respectively. In order to solve these problems, wer use a RSA cryptography in this paper. In this paper, we examine the items related with SNMP. In addition to DES and MD5 propose in SNMPv3, we chance security functionality by adopting RSA, a public key algorithm executing the encryption and the authentication simultaneously. The proposed SNMPv3 security module is written in JAVA under Windows NT environment.

  • PDF

Modeling and Performance Evaluation of the Web server supporting Persistent Connection (Persistent Connection을 지원하는 웹서버 모델링 및 성능분석)

  • Min, Byeong-Seok;Nam, Ui-Seok;Lee, Sang-Mun;Sim, Yeong-Seok;Kim, Hak-Bae
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.605-614
    • /
    • 2002
  • Amount of the web traffic web server handles are explosively increasing, which requires that the performance of the web server should be improved for the various web services. Although the analysis for the HTTP traffic with the proper tuning for the web server is essential, the research relevant to the subject are insignificant. In particular, although most of applications are implemented over HTTP 1.1 protocol, the researches mostly deal with the performance evaluation of the HTTP 1.0 protocol. Consequently, the modeling approach and the performance evaluation over HTTP 1.1 protocol have not been well formed. Therefore, basing on the HTTP 1.1 protocol supporting persistent connection, we present an analytical end-to-end tandem queueing model for web server to consider the specific hardware configuration inside web server beginning at accepting the user request until completing the service. we compare various performances between HTTP 1.0 and HTTP 1.1 under the overloading condition, and then analyze the characteristics of the HTTP traffic that include file size requested to web server, the OFF time between file transfers, the frequency of requests, and the temporal locality of requests. Presented model is verified through the comparing the server throughput according to varying requests rate with the real web server. Thereafter, we analyze the performance evaluation of the web server, according to the interrelation between TCP Listen queue size, the number of HTTP threads and the size of the network buffers.