• Title/Summary/Keyword: response packets

Search Result 40, Processing Time 0.025 seconds

A New Automatic Route Shortening for DSR

  • Ha, Eun-Yong;Piao, Dong-Huan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.31-33
    • /
    • 2004
  • We suggest an enhanced automatic route shortening method for dynamic source routing (DSR) protocol. DSR is a request / response based protocol which has low routing overhead owing to node movement. The original automatic route shortening is performed on the only nodes that belong to the source route of packets. On the contrary, our suggested method allows all neighbor nodes hearing the packet to participate in automatic route shortening. It makes all possible route shortenings be performed. So we maintain maximal short routes of ongoing data connections. Simulation results show that our method pays small extra overhead for ARS, but increases the ratio of packet transmissions and ARS' are performed from 2 to 5 times as much as original ARS.

  • PDF

M/G/1 복수 휴가 모델을 이용한 IEEE 802.16e 무선 MAN 수면모드 작동에 대한 성능분석

  • Jeong, Seong-Hwan;Hong, Jeong-Wan;Jang, U-Jin;Lee, Chang-Hun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.195-203
    • /
    • 2007
  • In this paper, an analytic model of sleep model operation in the IEEE 802.16e is investigated. A mobile subscribe. station (MSS) goes to sleep mode after negotiations with the base station (BS) and wakes up periodically for a short interval to check whether there is downlink traffic to it. If the arrival of traffic is notified, an MSS returns to wake mode. Otherwise, it again enters increased sleep interval which is double as the previous one. In order to consider the situation more practically, we propose the sleep mode starting threshold, during which MSS should await packets before it enters the sleep mode. By modifying the M/G/1 with multiple vacations model, energy consumption ratio(ECR) and average packet response time are calculated. Our analytic model provides potential guidance in determining the optimal parameters values such as sleep mode starting threshold, minimal sleep and maximal sleep window.

  • PDF

A Comparative Estimation of Performance of Average Loss Interval Calculation Method in TCP-Friendly Congestion Control Protocol (TFRC 프로토콜의 평균 손실 구간 계산방식의 비교평가)

  • Lee, Sang-Chul;Jang, Ju-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.495-500
    • /
    • 2002
  • We propose a new estimation method for rate adjustment in the face of a packet loss in the TFRC protocol, a TCP-Friendly congestion control protocol for UDP flows. Previous methods respond in a sensitive way to a single packet loss, resulting in oscillatory transmission behavior. This is an undesirable for multimedia services demanding constant bandwidth. The proposed TFRC provides more smooth and fair (against TCP flows) transmission through collective response based on multiple packets loss events. We show our "Exponential smoothing method" performs better than known "Weight smoothing method" in terms of smoothness and fairness.

An efficient LIN MCU design for In-Vehicle Networks

  • Yeon, Kyu-Bong;Chong, Jong-Wha
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.5
    • /
    • pp.451-458
    • /
    • 2013
  • This paper describes a design of LIN MCU using efficient memory accessing architecture which provides concurrent data and address fetch for faster communication. By using slew rate control it can reduce EMI emission while satisfying required communication specifications. To verify the efficiency of the LIN MCU, we developed a SoC and tested for several data packets. Measurements show that this LIN MCU improves network efficiency up to 17.19 % and response time up to 31.26 % for nominal cases. EMI radiation also can be reduced up to 10 dB.

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

A Effective Sinkhole Attack Detection Mechanism for LQI based Routing in WSN (무선 센서 네트워크 환경에서 링크 품질에 기반한 라우팅에 대한 효과적인 싱크홀 공격 탐지 기법)

  • Choi, Byung-Goo;Cho, Eung-Jun;Hong, Choong-Seon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.901-905
    • /
    • 2008
  • In this paper, we propose a detection scheme for sinkhole attacks in wireless sensor networks. Sinkhole attack makes packets that flow network pass through attacker. So, Sinkhole attack can be extended to various kind of attacks. We analyze sinkhole attack methods in the networks that use LQI based routing. For the purpose of response to each attack method, we propose methods to detect attacks. Our scheme can work for those sensor networks which use LQI based dynamic routing protocol. And we show the detection of sinkhole attack can be achieved by using a few detector nodes.

A Study on Policing Mechanism in ATM Network using Fuzzy Control (퍼지 제어를 이용한 ATM망에서 PM에 관한 연구)

  • 신관철;박세준;양태규
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.931-940
    • /
    • 2001
  • In this paper, I propose Fuzzy Policing Mechanism(FPM) over ATM networks for the control of traffic which is unpredictable and bursty source. The FPM is consist of counter, subtracter and Fuzzy Logic Controller(FLC). The FLC is divided to fuzzifier, inference engine and defuzzifer The output of FLC inputs to the subtractor and it controls the counter. The counter works as a switch in transmission of cells. In simulation, I compared the FPM with the Leaky Bucket algorithm(LBM) in cell loss probability and performance characteristics. As a result, FPM gives lower cell loss probability than that of LBM and has good response behavior The FPM efficiently controls the transmission of packets which are variable traffic source and, it also has good selectivity.

  • PDF

Research on security technology to respond to edge router-based network attacks (Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1374-1381
    • /
    • 2022
  • Existing research on security technology related to network attack response has focused on research using hardware network security technology, network attacks that wiretap and wiretap network packets, denial of service attack that consumes server resources to bring down the system, and network by identifying vulnerabilities before attack. It is classified as a scanning attack. In addition, methods for increasing network security, antivirus vaccines and antivirus systems have been mainly proposed and designed. In particular, many users do not fully utilize the security function of the router. In order to overcome this problem, it is classified according to the network security level to block external attacks through layered security management through layer-by-layer experiments. The scope of the study was presented by examining the security technology trends of edge routers, and suggested methods and implementation examples to protect from threats related to edge router-based network attacks.