• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.031 seconds

Identification of Unknown Cryptographic Communication Protocol and Packet Analysis Using Machine Learning (머신러닝을 활용한 알려지지 않은 암호통신 프로토콜 식별 및 패킷 분류)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.193-200
    • /
    • 2022
  • Unknown cryptographic communication protocols may have advantage of guaranteeing personal and data privacy, but when used for malicious purposes, it is almost impossible to identify and respond to using existing network security equipment. In particular, there is a limit to manually analyzing a huge amount of traffic in real time. Therefore, in this paper, we attempt to identify packets of unknown cryptographic communication protocols and separate fields comprising a packet by using machine learning techniques. Using sequential patterns analysis, hierarchical clustering, and Pearson's correlation coefficient, we found that the structure of packets can be automatically analyzed even for an unknown cryptographic communication protocol.

Efficient Error Recovery Protocol for ATM Clustering Systems (ATM 클러스터링 시스템을 위한 효율적인 에러 복구 프로토콜)

  • Jeong, Jae-Ung;Lee, Jong-Gwon;Kim, Yong-Jae;Kim, Tak-Gon;Park, Gyu-Ho;Yu, Seung-Hwa
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1493-1503
    • /
    • 1999
  • ATM Clustering System과 같이 SAN(System Area Network) 환경에서 동작하는 시스템은 낮은 지연시간과 넓은 대역폭의 네트워크가 필수적이나 기존의 에러 복구 프로토콜들은 이러한 요구를 충족시키기에는 큰 오버헤드를 가지고 있다. 제안된 새로운 에러 복구 프로토콜은 ATM Clustering System 환경에서 최적의 성능을 나타내는 light-weight 프로토콜로 에러가 없는 상황과 에러 복구가 진행중인 상황에 따라 acknowledgement 주기를 적응적으로 변화시키는 adaptive acknowledgement scheme를 제안하여 적용하였다. 제안된 프로토콜은 상용 툴인 SDT를 이용한 논리 검증 받았고, DEVSim++ 환경에서의 성능 분석을 통해 프로토콜이 최상의 성능을 보이기 위한 파라메터 값을 찾았고, 이 값을 적용하였을 때의 성능을 기존의 프로토콜과 비교하여 제안된 프로토콜이 더 우수함을 확인하였다.Abstract While a system working with SAN, such as ATM Clustering System, requires a network with low latency and wide bandwidth, the previous error recovery protocols have a serious network overhead to satisfy this requirement. The suggested error recovery protocol is a light-weight protocol which can shows its best performance at ATM Clustering System and uses a newly suggested adaptive acknowledgement scheme. In the adaptive acknowledgement scheme, the period of acknowledgement is dynamically changed depending on the state of the network. We proved the logical correctness of our protocol with SDT and did performance analysis with DEVSim++. From the analysis, we found the optimal parameter values for best performance and showed that our protocol works better than the previous error recovery protocols.

A Programmable Protocol Data Conversion Algorithm for Industrial Machine Monitoring (산업용 장비 모니터링을 위한 프로그램 가능한 프로토콜 데이터 변환 알고리즘)

  • Eum, Sang-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2139-2144
    • /
    • 2017
  • In case of communication method and protocol applied to the industrial field, various kinds and methods are applied to the field according to the environment and hardware configuration specifications. In order to develop and construct an industrial monitoring system, the development of the equipment is carried out through hardware system analysis and communication protocol analysis each time, so that a lot of development costs and time are being entered. In this paper, we proposed a programmable protocol conversion algorithm to support the integrated monitoring of industrial equipment using various protocols. This method can extract the necessary data from the data transmitted by serial communication, NMEA, CAN, Modbus communication method and transmit it to Ethernet. We implemented a communication gateway module that supports various communication methods, and experimented with data conversion and transmission.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Performance Analysis of the Dynamic Minislot reservation Protocol in Single-hop WDM Networks (단일-홉 파장분할 다중화 통신망에서 동적 미니슬롯 예약 프로토콜의 성능분석)

  • Jeong, Kil-Hyun;Lee, Jong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.205-215
    • /
    • 2002
  • In this paper the Dynamic Minislot Reservation Protocol(DMRP) in which the control channel is divided into contention-less and contention minislots in order to reduce re-transmission probability in multicasting is proposed. In the network, earth node has two pairs of transceivers. A transceiver consisting of a fixed transmitter and a fixed receiver is used to control packet registration and the other transceiver is used to transmit data. Two types f transceivers for data transmission are considered : one is FT-TR(Fixed Transmitter-Tunable Receiver) and the other is TT-TR(Tunable Transmitter-Tunable Receiver). In the analysis, FT-TR and TT-TR single-hop passive star networks are compared. As results, we conclude that the DMRP protocol with dynamically divided control channel has improved the system performance such as throughput and system delay regardless of traffic type or network structure.

Performance Analysis of QUIC Protocol for Web and Streaming Services (웹 및 스트리밍 서비스에 대한 QUIC 프로토콜 성능 분석)

  • Nam, Hye-Been;Jung, Joong-Hwa;Choi, Dong-Kyu;Koh, Seok-Joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.5
    • /
    • pp.137-144
    • /
    • 2021
  • The IETF has recently been standardizing the QUIC protocol for HTTP/3 services. It is noted that HTTP/3 uses QUIC as the underlying protocol, whereas HTTP/1.1 and HTTP/2 are based on TCP. Differently from TCP, the QUIC uses 0-RTT or 1-RTT transmissions to reduce the connection establishment delays of TCP and SCTP. Moreover, to solve the head-of-line blocking problem, QUIC uses the multi-streaming feature. In addition, QUIC provides various features, including the connection migration, and it is available at the Chrome browser. In this paper, we analyze the performance of QUIC for HTTP-based web and streaming services by comparing with the existing TCP and Streaming Control Transmission Protocol (SCTP) in the network environments with different link delays and packet error rates. From the experimental results, we can see that QUIC provides better throughputs than TCP and SCTP, and the gaps of performances get larger, as the link delays and packet error rates increase.

Secure Data Gathering Protocol over Wireless Sensor Network (무선센서네트워크에서 안전한 데이터 수집 프로토콜)

  • Choi, Hae-Won;Ryoo, Myung-Chun;Lee, Chae-Soo;Kim, Hyun-Sung
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.367-380
    • /
    • 2013
  • A secure data gathering in a Wireless Sensor Network(WSN) has given attention to one of security issues. In general, the process of secure data gathering causes difficulties: one process is exchanging the secured data and the other is constructing secured data path. The previous studies have been resolving the difficulties in terms of two problems: security and data gathering in WSNs. However, a WSN requires a protocol that has to guarantee a security of path between sensors and sink, or a cluster head. Thus how to gather data securely is an important issue. In this paper, we propose a secure data gathering protocol over WSNs, which consists of hierarchical key settlement and secure path construction, and aims at tackling two problems. The proposed protocol causes little overhead to sensor nodes for secured key settlement and path construction. This work provides security analysis focused on the key settlement protocol and evaluates network performance for the proposed data gathering protocol through simulation.

Picture archiving and communications systems development and performance results

  • Nam, Ji-Seung;Ralph Martinez
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1796-1800
    • /
    • 1991
  • Picture Archiving and Communication Systems(PACS) provide an integration of digital imaging information in a hospital, which encompasses various imaging equipment, viewing workstations, database archive systems, and a high speed fiber optic network. One of the most important requirements for integration is the standardization of communication protocols to connect devices from different vendors. Since 1985, the ACR-NEMA standard provides a hardware interface, a set of software commands, and a consistent set of data formats for point-to-point interconnection of medical equipment. However, it has been shown to be inadequate for PACS networking environments, because of its point-to-point nature and its inflexibility to allow other services and protocols in the future. Based on previous experience of PACS developments in The University of Arizona, a new communication protocol for PACS networks has been suggested to the ACR-NEMA Working Group VI. The defined PACS protocol is intended to facilitate the development of PACS's capable of interfacing with other hospital information systems. Also, it is intended to allow the creation of diagnostic information data bases which can be interrogated by a variety of distributed devices. A particularly important goal is to support communications in a multivendor environment. The new protocol specifications are defined primarily as a combination of the International Organization for Standardization / Open Systems Interconnection (ISO/OSI) protocols and the data format portion of ACR-NEMA standard. This paper addresses the specification and implementation of the proposed PACS protocol into network node. The protocol specification, which covers Presentation, Session, Transport, and Network layers, is summarized briefly. The implementation has natural extentions to Global PACS environments. The protocol implementation is discussed based on our implementation efforts in the UNIX Operating System Environment. At the same time, results of performance evaluation are presented to demonstrate the implementation of defined protocol. The testing of performance analysis is performed on the PACS prototype node.

  • PDF

PR-MAC Protocol based on Priority in Underwater Acoustic Sensor Networks (수중 음파 센서 네트워크에서 우선순위 기반의 PR-MAC 포로토콜)

  • Cho, Hui-Jin;NamGung, Jung-Il;Yun, Nam-Yeol;Park, Soo-Hyun;Ryuh, Young-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.258-268
    • /
    • 2011
  • Underwater acoustic sensor networks can be used disaster prevention and environmental monitoring systems in underwater environments. Because, the underwater environment is different from the ground, the long propagation delay, low transfer rates and limited bandwidth characteristics should be considered. In this, paper will propose the MAC protocol that allocates time slot into each node according to priority policy through the period of contention-free slot reservation in underwater acoustic sensor networks in order to avoid collision and minimize energy consumption waste. We perform mathematical analysis to evaluate the performance of the proposed protocol with regard to the collision probability, the energy consumption by collision, throughput and channel utilization. We compare the proposed protocol with the conventional protocol, and the performance results show that the proposed protocol outperforms the conventional protocol.

Pre-cluster HEAD Selection Scheme based on Node Distance in Chain-Based Protocol (체인기반 프로토콜에서 노드의 거리에 따른 예비 헤드노드 선출 방법)

  • Kim, Hyun-Duk;Choi, Won-Ik
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1273-1287
    • /
    • 2009
  • PEGASIS, a chain-based protocol, forms chains from sensor nodes so that each node transmits and receives from a neighbor. In this way, only one node (known as a HEAD) is selected from that chain to transmit to the sink. Although PEGASIS is able to balance the workload among all of the nodes by selecting the HEAD node in turn, a considerable amount of energy may be wasted when nodes which are far away from sink node act as the HEAD. In this study, DERP (Distance-based Energy-efficient Routing Protocol) is proposed to address this problem. DERP is a chain-based protocol that improves the greedy-algorithm in PEGASIS by taking into account the distance from the HEAD to the sink node. The main idea of DERP is to adopt a pre-HEAD (P-HD) to distribute the energy load evenly among sensor nodes. In addition, to scale DERP to a large network, it can be extended to a multi-hop clustering protocol by selecting a "relay node" according to the distance between the P-HD and SINK. Analysis and simulation studies of DERP show that it consumes up to 80% less energy, and has less of a transmission delay compared to PEGASIS.

  • PDF