• Title/Summary/Keyword: packet payload

Search Result 72, Processing Time 0.027 seconds

Design of The High-Level Architecture of Mobile Integration SNS Gateway and The MQTT Based Push Notification Protocol (모바일 통합 SNS 게이트웨이의 상위 구조 및 MQTT 기반의 푸시 알림 프로토콜 설계)

  • Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.344-354
    • /
    • 2013
  • In this paper, In order to solve the traffic of the SNS to be executed on smartphone, we propose the design of the SNS integrated gateway server. Also, we capture the payload size in a variety of methods to send the MQTT protocol and QoS level of MQTT protocol for communication between the client and the Gateway. And we present the results and analysis of packet loss and end-to-end delay. By using analysis proposed, we present the results of the integrated SNS Gateway push notification protocol design.

Detection Framework for Advanced and Persistent Information Leakage Attack (지능적이고 지속적인 정보유출 공격 탐지 프레임워크)

  • Kil, Ye-Seul;Jeon, Ga-Hye;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.203-205
    • /
    • 2022
  • As digital transformation and remote work environment advanced by Covid-19 become more common, the scale of leakage damage to industrial secrets and personal information caused by information leakage attacks is increasing. Recently, advanced and persistent information leakage attacks have become a serious security threat because they do not quickly leak large amounts of information, but continuously leak small amounts of information over a long period of time. In this study, we propose a framework for detecting advanced and persistent information leakage attacks based on traffic characteristics. The proposed method can effectively detect advanced and persistent information leakage attacks using traffic patterns, packet sizes, and metadata, even if the payload is encrypted.

  • PDF

Contents Routing in the OpenFlow-based Wireless Mesh Network Environment (OpenFlow기반 무선 메쉬 네트워크 환경에서의 컨텐츠 라우팅)

  • Kim, Won-Suk;Chung, Sang-Hwa;Choi, Hyun-Suk;Do, Mi-Rim
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.810-823
    • /
    • 2014
  • The wireless mesh network based on IEEE 802.11s provides a routing based on a destination address as it inherits legacy internet architecture. However, this architecture interested in not 'what' which is originally the users goal but 'where'. Futhermore, because of the rapid increase of the number of mobile devices recently, the mobile traffic increases geometrically. It reduces the network effectiveness as increasing many packets which have same payload in the situation of many users access to the same contents. In this paper, we propose an OpenFlow-based contents routing for the wireless mesh network(WMN) to solve this problem. We implement contents layer to the legacy network layer which mesh network uses and the routing technique based on contents identifier for efficient contents routing. In addition we provide flexibility as we use OpenFlow. By using this, we implement caching technique to improve effectiveness of network as decreasing the packet which has same payload in WSN. We measure the network usage to compare the flooding technique, we measure the delay to compare environment using caching and non caching. As a result of delay measure it shows 20% of performance improve, and controller message decrease maximum 89%.

A DCF Throughput Analysis of the Ideal and Fading Channel in the Wireless LAN (무선 LAN에서 이상 및 페이딩 채널 환경의 DCF 처리율 비교 분석)

  • Lee, Yong-Sik;Lee, Ha-Cheol;Lee, Byung-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.7
    • /
    • pp.741-753
    • /
    • 2008
  • This paper explores the throughput performance of CSMA/CA-based DCF protocol over both ideal channels and fading channels with payload size at the MAC layer in the 802.11a wireless LAN. In the ideal channel, there are no errors and at the transmission cycle there is one and only one active station which always has a packet to send and other stations can only accept packets and provide acknowledgements. In the fading channel, bit errors appear in the channel randomly and the number of stations is assumed to be fixed. And each station always has packets for transmission. In other words, we operate in saturation conditions. Up to now conventional research work about DCF throughput analysis of IEEE 802.11 a wireless LAN has been done over the ideal channel, but this paper is done over the Rayleigh/Ricean fading channel. So, the ratio of received average energy per bit-to-noise power spectral density $E_b/N_o$ is set to 25 dB and the ratio of direct-to-diffuse signal power in each sub-channel $\xi$ is set to 6 for combined Rayleigh/Ricean fading channel. In conclusion, it is shown that the saturation throughput is always less than the maximum throughput at all the payload size and the higher the transmission rate be, the higher the decreasing rate of saturation throughput compared to the maximum throughput be.

Design and Implementation of 8K UHD Encapsulation Method for Efficient Transmission and Reception based on MMT

  • Song, Seulki;Ryu, Youngsu;Wee, Jungwook;Park, Kyungwon;Kwon, Kiwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.860-872
    • /
    • 2018
  • In this Paper, we propose 8K UHD (Ultra High Definition) encapsulation method for efficient transmission and reception based on MMT (MPEG Media Transport). Broadcasting services for 8K UHD allow users to feel the maximized reality. However, present technology is difficult to provide 8K UHD in broadcasting networks, because the 8K UHD bitrate is too high to be transmitted in the current broadcasting networks. Research for transmitting 8K UHD is underway. In some researches, a receiver is implemented with four 4K UHD display instead of a 8K UHD display. In order to transmit 8K UHD within the limited transmission bitrate of broadcasting network, 8K UHD contents encoded by SHVC (Scalable High Efficiency Video Coding) and then transmitted over heterogeneous network. For using the broadcasting and communication networks, MMT standard is used. MMT is IP based transmission protocol as the next generation transmission protocol. According to the MMT standard, video stream encapsulated and transmitted in MMTP (MMT Protocol) packet. IP-based broadcasting and communication networks can be used to transmit simultaneously, and the receiver can synchronize and play it. We propose an encapsulation method that can efficiently transmit and receive 8K UHD. The proposed method increases a payload rate and decreases an initial delay at the receiver. We show that the efficiency of the proposed method is verified by experimental tests.

Medium to Long Range Wireless Video Transmission Scheme in 5.8GHz Band (5.8GHz 대역에서의 중장거리 영상 전송 무선 방식)

  • Paik, Junghoon;Kim, Namho;Ji, Mingi
    • Journal of Broadcast Engineering
    • /
    • v.21 no.5
    • /
    • pp.662-671
    • /
    • 2016
  • In this paper, we propose a wireless video transmission system, providing medium and long communication distance in the 5.8GHz band to decrease the loss of video data. Beamforming with multiple antennas in a radio environment to enable more than 10km communication distance and an image transmission method that combines the retransmission to MCS(modulation and coding scheme) are applied. By applying the proposed method in the indoor environment of 80dB attenuation using the payload size of 1000 bytes, the packet loss rate of at least 0.92% is achieved through the FPING with the time-out of 10ms. The transmission distance of 21.2Km is achieved with the transmission rate of 13Mbps in the outdoor environment.

Design and Implementation of IPv6-support FTP-ALG (IPv6 지원 FTP-ALG 설계 및 구현)

  • 홍용근;이주철;신명기;김형준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.652-655
    • /
    • 2002
  • The next generation Internet Protocol IPv6 that is appeared to solve the exhausting problem is now widely deployed in a testbed or commercial site. To successfully deploy IPv6, interoperation with exist IPv4 hosts and routers and interactions with many IPv4 applications are more important. The NAT-PT (Network Address Translation-Protocol Translation) among IPv6 transition mechanism enables the communication between IPv4 and IPv6 host with translating IPv4 address and IPv6 address. But for DNS and FTP, another specific mechanism is needed when internet address is included in packet payload area. This paper describes the design and implementation of IPv6-support FTP-ALG, (Application Layer Gateway) to enable FTP service between IPv4 node and IPv6 node.

  • PDF

Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms (스캔 기반의 인터넷 웜 공격 탐지 및 탐지룰 생성 시스템 설계 및 구현)

  • Kim Ik-Su;Jo Hyuk;Kim Myung Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.191-200
    • /
    • 2005
  • The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system's overhead and disk space that is required.

Performance Improvement of the Statistic Signature based Traffic Identification System (통계 시그니쳐 기반 트래픽 분석 시스템의 성능 향상)

  • Park, Jin-Wan;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.243-250
    • /
    • 2011
  • Nowadays, the traffic type and behavior are extremely diverse due to the appearance of various services on Internet, which makes the need of traffic identification important for efficient operation and management of network. In recent years traffic identification methodology using statistical features of flow has been broadly studied. We also proposed a traffic identification methodology using payload size distribution in our previous work, which has a problem of low completeness. In this paper, we improved the completeness by solving the PSD conflict using IP and port. And we improved the accuracy by changing the distance measurement between flow and statistic signature from vector distance to per-packet distance. The feasibility of our methodology was proved via experimental evaluation on our campus network.

Efficient Channel Scheduling Technique Using Release Time Unscheduled Channel Algorithm in OBS WDM Networks (OBS WDM 망에서 비 할당된 채널 개방시간을 이용한 효율적인 채널 스케줄링 기법)

  • Cho Seok-man;Kim Sun-myeng;Choi Dug-kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10A
    • /
    • pp.912-921
    • /
    • 2005
  • Optical burst switching(OBS) is a promising solution for building terabit optical routers and realizing If over WDM. Channel scheduling Algorithm for reduce contention is one of the major challenges in OBS. We address the issue of how to provide basic burst channel scheduling in optical burst switched WDM networks with fiber delay lines(FDLs). In OBS networks the control and payload components or a burst are sent separately with a time gap. If CHP arrives to burst switch node, because using scheduling algorithm for data burst, reservation resources such as wavelength and transmit data burst without O/E/O conversion, because contention and void between burst are happened at channel scheduling process for data burst that happened the link utilization and bust drop probability Existent proposed methods are become much research to solve these problems. Propose channel scheduling algorithm that use Release Time of bust to emphasize clearance between data and data dissipation that is happened in data assignment in this treatise and maximize bust drop probability and the resources use rate (RTUC : Release Time Unscheduled Channel). As simulation results, Confirmed that is more superior in terms of data drop and link utilization than scheduling algorithm that is proposed existing. As simulation results, confirmed improved performance than scheduling algorithm that is proposed existing in terms of survival of burst, efficiency resource and delay. However, In case load were less, degradation confirmed than existent scheduling algorithm relatively, and confirmed that is superior in data drop aspect in case of load increased.