• Title/Summary/Keyword: router security

Search Result 111, Processing Time 0.028 seconds

Enhancing RCC(Recyclable Counter With Confinement) with Cuckoo Hashing (Cuckoo Hashing을 이용한 RCC에 대한 성능향상)

  • Jang, Rhong-ho;Jung, Chang-hun;Kim, Keun-young;Nyang, Dae-hun;Lee, Kyung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.663-671
    • /
    • 2016
  • According to rapidly increasing of network traffics, necessity of high-speed router also increased. For various purposes, like traffic statistic and security, traffic measurement function should performed by router. However, because of the nature of high-speed router, memory resource of router was limited. RCC proposed a way to measure traffics with high speed and accuracy. Additional quadratic probing hashing table used for accumulating elephant flows in RCC. However, in our experiment, quadratic probing performed many overheads when allocated small memory space or load factor was high. Especially, quadratic requested many calculations in update and lookup. To face this kind of problem, we use a cuckoo hashing which performed a good performance in update and loop for enhancing the RCC. As results, RCC with cuckoo hashing performed high accuracy and speed even when load factor of memory was high.

DDoS Prevention System Using Double Firewall and Multi-Filtering Method (이중 방화벽과 다중 필터링을 이용한 DDoS 차단 시스템)

  • Cho, jiHo;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • This paper proposes multi-filtering method on the double firewall to prevent DDoS attack. In the first firewall, R-PA filtering algorithm and rigid hop counter filtering method are applied by analyzing packet paths. In the second firewall, packets are examined to be distinguished abnormal from normal packets. Security policy system monitors each user sessions and if the traffic is over the threshold value, the system blocks that session for an assigned time.

Cost Optimization in SIS Model of Worm Infection

  • Kim, Jong-Hyun;Radhakrishnan, Sridhar;Jang, Jong-Soo
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.692-695
    • /
    • 2006
  • Recently, there has been a constant barrage of worms over the Internet. Besides threatening network security, these worms create an enormous economic burden in terms of loss of productivity not only for the victim hosts, but also for other hosts, as these worms create unnecessary network traffic. Further, measures taken to filter these worms at the router level incur additional network delays because of the extra burden placed on the routers. To develop appropriate tools for thwarting the quick spread of worms, researchers are trying to understand the behavior of worm propagation with the aid of epidemiological models. In this study, we present an optimization model that takes into account infection and treatment costs. Using this model we can determine the level of treatment to be applied for a given rate of infection spread.

  • PDF

Embedded Home Network System Security using VPN (VPN을 이용한 Embedded 홈 네트워크 시스템 보안)

  • Jin, Seon-Il;Jeong, Jin-Gyu;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

A Study on Use of Wireless Router For Security Acceptance Enhancement In IoT Environment (IoT 환경에서 사용자의 보안수용성 향상을 위한 무선공유기 활용도 조사)

  • Hong, Seungwan;Lee, Hyojik;Na, Onechul;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.396-398
    • /
    • 2015
  • IoT 환경에서 무선랜의 사용률은 매년 증가하고 있고 그에 따른 무선공유기의 보안은 매우 중요함에도 불구하고 다수의 사용자들은 보안수용성이 낮은 것으로 조사되어 이에 대한 연구를 진행 하였다. 본 논문은 한국 사용자들의 무선공유기 활용도를 조사하고, 보안수용성과의 연관성을 분석하여 보안수용성의 향상을 위한 방안을 제시하는데 목적이 있다. 본 논문의 조사에 따르면 대부분의 사용자들은 무선공유기에 대한 보안수용성이 부족하며 간단한 보안방법 조차 실행하지 않았다. 이를 바탕으로 사용자의 보안수용성은 현재 매우 낮다는 것을 알 수 있으며 보안수용성의 향상을 위한 가이드라인을 제시하였다. 본 논문은 사용자들에게 보안의식을 심어주고 보안에 쉽게 접근하게 할 수 있는 보안수용성 향상의 기반으로 유용하게 사용 할 수 있을 것으로 기대된다.

Security Audit System for Secure Router (보안 라우터를 위한 보안 감사추적 시스템)

  • Doo, S.Y.;Kim, J.N.;Jang, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.17-21
    • /
    • 2005
  • 감사추적기능은 시스템의 공격을 방어하기 위한 마지막 방법 중 하나이다. 공격을 사전에 차단하거나 공격이 이루어지는 순간에 실시간으로 대응하는 능동적 방법이라기보다 공격이 이루어진 후에 시스템에 남겨진 정보를 분석하여 공격의 유형과 상황을 유추해내기 위한 수동적인 방법이다. 본 논문에서는 감사추적 기능이 보안 네트워크 장비에서 중요한 이유를 설명하고 반드시 기록으로 남겨야 하는 내용이 어떤 것인지 정리하며 실제로 보안 라우터에 구현된 보안 감사추적 시스템의 구성과 기능을 설명한다. 본 논문에서는 일반 감사기록과 보안 감사기록을 분리하여 관리하고 있는데 그 필요성에 대해 설명한다.

Implementation and Design of Policy Based Security System for Integration Management (통합 관리를 위한 정책 기반의 보안시스템 설계 및 구현)

  • Kim, Yong-Tak;Lee, Jong-Min;Kim, Tai-Suk;Kwon, Oh-Jun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1052-1059
    • /
    • 2007
  • Network security system used in the large scale network composes individual security system which protects only own domain. Problems of individual security system are not to protect the backbone network and to be hard to cope with in real-time. In this paper we proposed a security system which includes security function at the router, and the access point, which exist at the backbone network, to solve the problems. This security system sends the alert messages to an integrated security management system after detecting intrusions. The integrated security management system releases confrontation plan to each suity system. Thus the systematic and immediate confrontation is possible. We analyzed function verification and efficiency by using the security system and the integrated security management system suggested in this paper. We confirmed this integrated security management system has a possibility of a systematic and immediate confrontation.

  • PDF

Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications (OpenWRT 기반 유무선 공유기와 Zigbee 통신을 이용한 홈 네트워크 서비스 구축)

  • Kwon, Kisu;Lee, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.375-381
    • /
    • 2018
  • As smart home network services such as home CCTV, outdoor control of home appliances, home security and disaster prevention services become popular, there appear various affiliated products including smart home gateway and smart speaker. Since those services are generally developed on the vendors' individual hardware and software platforms, it is not much expected for them to interwork well among different architecture and communication methods. In this paper, we propose a new home network service system running on an open source platform to address such issues. We implemented a home network system using OpenWRT-based wireless router(or access point) and Zigbee communication technology. In the proposed system, a wireless router replaces a commercial home gateway and small control units implemented with Arduino control electronic devices and sensors in home. Several service scenarios are also implemented to verify the operability of the proposed system.

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

  • Yan, Ruo-Yu;Zheng, Qing-Hua;Li, Hai-Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.428-451
    • /
    • 2010
  • Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly, a new type of unidirectional flow called IF flow is proposed. Merits and features of IF flows are analyzed in detail and then two efficient methods are introduced in our DDoS attacks detection and evaluation scheme. The first method uses residual variance ratio to detect DDoS attacks after Recursive Least Square (RLS) filter is applied to predict IF flows. The second method uses generalized likelihood ratio (GLR) statistical test to detect DDoS attacks after a Kalman filter is applied to estimate IF flows. Based on the two complementary methods, an evaluation formula is proposed to assess the seriousness of current DDoS attacks on router ports. Furthermore, the sensitivity of three types of traffic (IF flow, input link and output link) to DDoS attacks is analyzed and compared. Experiments show that IF flow has more power to expose anomaly than the other two types of traffic. Finally, two proposed methods are compared in terms of detection rate, processing speed, etc., and also compared in detail with Principal Component Analysis (PCA) and Cumulative Sum (CUSUM) methods. The results demonstrate that adaptive filter methods have higher detection rate, lower false alarm rate and smaller detection lag time.

Development Hi-DPI Algorithm for High Speed Packet Filtering of Anti-DDoS based on HW (하드웨어 기반 Anti-DDoS 대응 장비 고속 패킷 필터링을 위한 Hi-DPI 알고리즘 연구)

  • Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.41-51
    • /
    • 2017
  • The explosive increase in the range of Internet usage gradually makes the speed and capacity of network high-speed, rapidly evolving it into mass storage. Accordingly, network equipment such as switch and router are coping with it through hardware-based rapid technological evolution, but as the technological development of the most basic and essential network security system in the hyper-connected society requires frequent alterations and updates about the security issues and signatures of tens of thousands, so it is not easy to overcome the technical limitations based on the software. In this paper, to improve problems in installing and operating such anti-DDoS devices, we propose a Hi-DPI algorithm best reflecting the hardware characteristics and parallel processing characteristics of FPGA (Field Programmable Gate Array), and would verify the practicality.