• Title/Summary/Keyword: TCP 메커니즘

Search Result 102, Processing Time 0.029 seconds

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A VIA-based RDMA Mechanism for High Performance PC Cluster Systems (고성능 PC 클러스터 시스템을 위한 VIA 기반 RDMA 메커니즘 구현)

  • Jung In-Hyung;Chung Sang-Hwa;Park Sejin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.11
    • /
    • pp.635-642
    • /
    • 2004
  • The traditional communication protocols such as TCP/IP are not suitable for PC cluster systems because of their high software processing overhead. To eliminate this overhead, industry leaders have defined the Virtual Interface Architecture (VIA). VIA provides two different data transfer mechanisms, a traditional Send/Receive model and the Remote Direct Memory Access (RDMA) model. RDMA is extremely efficient way to reduce software overhead because it can bypass the OS and use the network interface controller (NIC) directly for communication, also bypass the CPU on the remote host. In this paper, we have implemented VIA-based RDMA mechanism in hardware. Compared to the traditional Send/Receive model, the RDMA mechanism improves latency and bandwidth. Our RDMA mechanism can also communicate without using remote CPU cycles. Our experimental results show a minimum latency of 12.5${\mu}\textrm{s}$ and a maximum bandwidth of 95.5MB/s. As a result, our RDMA mechanism allows PC cluster systems to have a high performance communication method.

Design and Implementation of a Hybrid TCP/IP Offload Engine Prototype (Hybrid TCP/IP Offload Engine 프로토타입의 설계 및 구현)

  • Jang Han-Kook;Chung Sang-Hwa;Oh Soo-Cheol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.5
    • /
    • pp.257-266
    • /
    • 2006
  • Recently TCP/IP Offload Engine (TOE) technology, which processes TCP/IP on a network adapter instead of the host CPU, has become an important approach to reduce TCP/IP processing overhead in the host CPU. There have been two approaches to implementing TOE: software TOE, in which TCP/IP is processed by an embedded processor on a network adapter; and hardware TOE, in which all TCP/IP functions are implemented by hardware. This paper proposes a hybrid TOE that combines software and hardware functions in the TOE. In the hybrid TOE, functions that cannot have guaranteed performance on an embedded processor because of heavy load are implemented by hardware. Other functions that do not impose as much load are implemented by software on embedded processors. The hybrid TOE guarantees network performance near that of hardware TOE and it has the advantage of flexibility, because it is easy to add new functions or offload upper-level protocols of TCP/IP. In this paper, we developed a prototype board with an FPGA and an ARM processor to implement a hybrid TOE prototype. We implemented the hardware modules on the FPGA and the software modules on the ARM processor. We also developed a coprocessing mechanism between the hardware and software modules. Experimental results proved that the hybrid TOE prototype can greatly reduce the load on a host CPU and we analyzed the effects of the coprocessing mechanism. Finally, we analyzed important features that are required to implement a complete hybrid TOE and we predict its performance.

Slective Buffering Macro Handover Which Applies The F-SNOOP in Hierarchical structure (계층 구조에서 F-SNOOP을 적용한 선택적 버퍼링 매크로 핸드오버)

  • Ahn Chi-Hyun;Kim Dong-Hyun;Kim Hyoung-Chul;Ryou Hwang-Bin;Lee Dae-Young;Jun Kye-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.413-420
    • /
    • 2006
  • HMIPv6 is designed to reduce the signaling load to external network and improve handover speed of MN by including Mobility Anchor Point(MAP) in local handover. However in this case of macro handover, it's just used pervious MIPv6 handover algorithm. So, it occurs packet loss and transmission delay problem. In this paper, we propose the mechanism applying the HMIPv6 for Fast Handover to choose suitable to the condition buffering handover. The condition for the selection is result distance measurement between MN and CN, between MN and NAR. Furthermore, using F-SNOOP protocol, it is possible to improve wireless network performance. Wireless network has high Bit Error Rate(BER) characteristic because of path loss, fading, noise and interference. TCP regards such errors as congestion and starts congestion control. This congestion control makes packet transmission rate low. However, F-SNOOP improves TCP performance based on SNOOP and Freeze TCP that use Zero Window Advertisement(ZWA) message when handoff occurs in wireless network.

A Cross layer approach to Improving TCP Performance in Wireless LANs (무선 랜 환경에서 Cross-Layer기반의 TCP 성능향상 기법)

  • Kim, Jae-Hoon;Lee, Sun-Hun;Choi, Woong-Chul;Rhee, Seung-Hyong;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.576-580
    • /
    • 2006
  • Snoop 프로토콜은 무선 랜 환경에서 발생하는 TCP 패킷 손실을 효과적으로 보상하여 TCP 전송률을 향상시킬 수 있는 효율적인 프로토콜이다. 하지만, 무선 링크에서 Burst loss가 발생하는 경우에는 지역 재전송을 효과적으로 수행하지 못하여 전송 효율이 떨어진다는 문제점이 있다. 본 논문에서는 Snoop 프로토콜의 이러한 문제점을 개선하기위해 cross layer 기법을 적용한 지역 재전송 기법인 $A^2Snoop$ (ARQ Assistance Snoop) 프로토콜을 제안한다. $A^2Snoop$ 프로토콜은 현재 무선 랜 환경에서 가장 널리 사용되는 IEEE 802.11 MAC 프로토콜 기반의 지역 재전송 메커니즘으로서, MAC 계층의 ARQ 기법의 메시지와 새로이 제안된 지역 재전송 타이머에 의해 효율적인 재전송을 수행한다. ns-2 시뮬레이터를 이용한 실험을 통해 $A^2Snoop$의 지역 재전송 기법은 무선 구간의 Burst loss에 대해 효율적인 보상을 수행하며, 이동 단말의 에너지 효율성을 향상시키는 것을 확인할 수 있다.

  • PDF

A Study on Performance Comparision in TCP Sack and NewReno Protocol (TCP Sack와 NewReno 프로토콜의 성능비교에 관한 연구)

  • 이행남;서경현;박승섭
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.311-315
    • /
    • 2003
  • Recently, there is asymmetrical transmission in Internet data stream. The asymmetrical transmission has much more downstream than upstream. Owing to this point, it needs to reduce the acknowledgement as element of the obsrtuction in downstream. In this paper, according to simulation's result, we know that Sack has good performance than New Reno in bottleneck environment Comparing two protocols in packet loss rate, NewReno is lower than Sack. And also comparing two protocols in throughput of ack packet, not only NewReno processes ack packet more quickly than Sack, but also NewReno processes more ack packet than Sack protocol during ten seconds in simulation. As a result, NewReno is batter than Sack in throughput of asymmetrical link.

  • PDF

A Network Adaptive SVC Streaming Protocol for Improving Video Quality (비디오 품질 향상을 위한 네트워크 적응적인 SVC 스트리밍 프로토콜)

  • Kim, Jong-Hyun;Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.363-373
    • /
    • 2010
  • The existing QoS mechanisms for video streaming are short of the consideration for various user environments and the characteristic of streaming applying programs. In order to overwhelm this problem, studies on the video streaming protocols exploiting scalable video coding (SVC), which provide spatial, temporal, and qualitative scalability in video coding, are progressing actively. However, these protocols also have the problem to deepen network congestion situation, and to lower fairness between other traffics, as they are not equipped with congestion control mechanisms. SVC based streaming protocols also have the problem to overlook the property of videos encoded in SVC, as the protocols transmit the streaming simply by extracting the bitstream which has the maximum bit rate within available bandwidth of a network. To solve these problems, this study suggests TCP-friendly network adaptive SVC streaming(T-NASS) protocol which considers both network status and SVC bitstream property. T-NASS protocol extracts the optimal SVC bitstream by calculating TCP-friendly transmission rate, and by perceiving the network status on the basis of packet loss rate and explicit congestion notification(ECN). Through the performance estimation using an ns-2 network simulator, this study identified T-NASS protocol extracts the optimal bitstream as it uses TCP-friendly transmission property and perceives the network status, and also identified the video image quality transmitted through T-NASS protocol is improved.

UDT Parallel Transfer Technologies Adaptive to Network Status In High Speed Network (고속네트워크에서 네트워크 혼잡상태에 적응적인 UDT 병렬전송 기법)

  • Park, Jong Seon;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.2 no.4
    • /
    • pp.51-59
    • /
    • 2013
  • With increasing transmission speed of backbone networks, it is getting to provide enough available bandwidth. However, the bandwidth is not effectively utilized in volumetric data transfer. This mainly comes from the transmission protocol, TCP, which is used for most applications. TCP is inherently difficult to adapt the available bandwidth because of it's own characteristic of transfer mechanism. UDT is a prominent application level data transfer protocol which is targeting high speed network. In this paper, we propose UDT parallel transfer technologies which is adaptive to network status and then evaluate their performance in two points of view. Firstly, we measure data transfer rate of UDT with rate congestion control methods, and compare them with basic UDT. Secondly, we apply parallel transfer technologies adapted to network status, and measure their performance. Experimental results showed that UDT rate congestion control method outperforms UDT with 106% improvement in RTT 100ms section set with jitter 30ms. In addition, performance of parallel transfer with rate congestion control method showed 107% improvement than that of parallel transfer in RTT 400ms section set with jitter 20ms.

  • PDF

The equation-based scheme for multicast considering wireless loss probability in wired and wireless networks (유.무선 네트워크에서 무선 손실률을 고려한 equation 기반의 멀티캐스트 기법)

  • Park, Soo-Hyun;Ahn, Hong-Beom;Hong, Jin-Pyo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.343-347
    • /
    • 2010
  • TFMCC(TCP-Friendly Multicast Congestion Control)방식은 equation 기반의 멀티캐스트 혼잡 제어 메커니즘으로 TFRC(TCP-Friendly Rate Control) 프로토콜을 유니캐스트에서 멀티캐스트 도메인으로 확장한 방식이다. TFMCC 방식은 현재 무선 환경에 적용 시 유선 환경에서의 혼잡에 의한 패킷 손실뿐만 아니라, 무선 환경에서 무선 링크 에러를 네트워크의 혼잡으로 인식하며, single-rate 멀티캐스트 혼잡제어의 특성인 가장 낮은 수신단의 성능으로 전체 네트워크 전송률이 급격히 저하된다. 이에 본 논문에서는 무선 환경에서의 TFMCC의 성능 향상을 위해 네트워크의 무선 환경의 손실률과 유선 환경 손실률을 모델링하여 구분한 ARC(Analytical Rate Control)의 TCP 전송률 equation 을 TFMCC에 맞게 적용하였으며, 멀티캐스트 도메인에서 전송률 제어 시 무선 손실률을 별도로 고려하는 방식(M-ARC)을 제안하였다. 또한 성능 평가를 위해서 시뮬레이션 한 결과 무선 환경을 고려한 M-ARC(Multicast-Analytical Rate Control)가 기존의 TFMCC에 비해 더 높은 전송률을 유지함을 볼 수 있었다.

  • PDF

LER-to-LER for Omission about Address Field Number of IP over MPLS (MPLS 영역에서의 IP 패킷의 Address 번호의 생략을 위한 LER-to-LER)

  • Park, Sang-Jun;Park, Woo-Chool;Kwak, Jae-Won;Jeong, Soon-Gi;Park, Sang-Rae;Rhee, Byung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.581-584
    • /
    • 2001
  • 오늘날 매우 널리 사용되는 TCP/IP 프로토콜은 많은 보안적 흠을 가지고 있다. 시퀸스 번호를 스푸핑, 소스 번호를 스푸핑, 인증 공격 등 많은 류의 공격이 이런 흠을 통해서 행해지고 있다. 또한 근원적으로 패킷의 TCP헤더 필드의 포트 번호와 IP 헤더 필드의 주소 번호를 분석하여 포트번호와 IP번호를 알아내어 상대방을 공격한다. 이에 상대방으로부터 어드레스 번호를 은닉하거나 생략하여 전송가능하여 상대방이 패킷을 분석하기 어렵게 만들어 TCP/IP 패킷의 정보를 보호하고자 한다. 이에 본 논문은 MPLS 영역에서 IP 패킷의 헤더의 주소 필드 영역을 LER에서 임의의 매핑 변수에 의해 대체함으로써 MPLS 영역에서의 IP 패킷은 IP 주소 번호를 생략할 수 있다. 이에 본 논문에서는 IP 헤더의 Address field를 제거하기위한 LER을 제안하고 LER-to-LER의 메커니즘을 제시한다.

  • PDF