• Title/Summary/Keyword: routing

Search Result 4,396, Processing Time 0.026 seconds

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

Development of the Shortest Path Algorithm for Multiple Waypoints Based on Clustering for Automatic Book Management in Libraries (도서관의 자동 도서 관리를 위한 군집화 기반 다중경유지의 최단 경로 알고리즘 개발)

  • Kang, Hyo Jung;Jeon, Eun Joo;Park, Chan Jung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.541-551
    • /
    • 2021
  • Among the numerous duties of a librarian in a library, the work of arranging books is a job that the librarian has to do one by one. Thus, the cost of labor and time is large. In order to solve this problem, the interest in book-arranging robots based on artificial intelligence has recently increased. In this paper, we propose the K-ACO algorithm, which is the shortest path algorithm for multi-stops that can be applied to the library book arrangement robots. The proposed K-ACO algorithm assumes multiple robots rather than one robot. In addition, the K-ACO improves the ANT algorithm to create K clusters and provides the shortest path for each cluster. In this paper, the performance analysis of the proposed algorithm was carried out from the perspective of book arrangement time. The proposed algorithm, the K-ACO algorithm, was applied to a university library and compared with the current book arrangement algorithm. Through the simulation, we found that the proposed algorithm can allocate fairly, without biasing the work of arranging books, and ultimately significantly reduce the time to complete the entire work. Through the results of this study, we expect to improve quality services in the library by reducing the labor and time costs required for arranging books.

Hydrologically Route-based Green Infra facilities assessment Model: Focus on Bio-retention cells, Infiltration trenches, Porous Pavement System, and Vegetative Swales (수문학적 추적 기반의 GI 시설 평가 모델: 생태저류지, 침투도랑, 투수성포장, 식생수로를 대상으로)

  • Won, Jeongeun;Seo, Jiyu;Choi, Jeonghyeon;Kim, Sangdan
    • Journal of Wetlands Research
    • /
    • v.23 no.1
    • /
    • pp.74-84
    • /
    • 2021
  • Active stormwater management is essential to minimize the impact of urban development and improve the hydrological cycle system. In recent years, the Low Impact Development (LID) technique for urban stormwater management is attracting attention as a reasonable alternative. The Storm Water Management Model (SWMM) is actively used in urban hydrological cycle improvement projects as it provides simulation functions for various GI (Green Infra) facilities through its LID module. However, in order to simulate GI facilities using SWMM, there are many difficulties in setting up complex watersheds and deploying GI facilities. In this study, a model that can evaluate the performance of GI facilities is proposed while implementing the core hydrological process of GI facilities. Since the proposed model operates based on hydrological routing, it can not only reflect the infiltration, storage, and evapotranspiration of GI facilities, but also quantitatively evaluate the effect of improving urban hydrological cycle by GI facilities. The applicability of the proposed model was verified by comparing the results of the proposed model with the results of SWMM. In addition, a discussion of errors occurring in the SWMM's permeable pavement system simulation is included.

Blocking Intelligent Dos Attack with SDN (SDN과 허니팟 기반 동적 파라미터 조절을 통한 지능적 서비스 거부 공격 차단)

  • Yun, Junhyeok;Mun, Sungsik;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.23-34
    • /
    • 2022
  • With the development of network technology, the application area has also been diversified, and protocols for various purposes have been developed and the amount of traffic has exploded. Therefore, it is difficult for the network administrator to meet the stability and security standards of the network with the existing traditional switching and routing methods. Software Defined Networking (SDN) is a new networking paradigm proposed to solve this problem. SDN enables efficient network management by programming network operations. This has the advantage that network administrators can flexibly respond to various types of attacks. In this paper, we design a threat level management module, an attack detection module, a packet statistics module, and a flow rule generator that collects attack information through the controller and switch, which are components of SDN, and detects attacks based on these attributes of SDN. It proposes a method to block denial of service attacks (DoS) of advanced attackers by programming and applying honeypot. In the proposed system, the attack packet can be quickly delivered to the honeypot according to the modifiable flow rule, and the honeypot that received the attack packets analyzed the intelligent attack pattern based on this. According to the analysis results, the attack detection module and the threat level management module are adjusted to respond to intelligent attacks. The performance and feasibility of the proposed system was shown by actually implementing the proposed system, performing intelligent attacks with various attack patterns and attack levels, and checking the attack detection rate compared to the existing system.

Numerical Study on the Stress-distribution Ratio of Grouting Pile for Reinforced Ground (지반보강용 그라우팅 말뚝의 응력분담비에 대한 수치해석적 연구)

  • Yi, Gyeong-Ju;Lee, Joon-Kyu;Zhang Weiwei;Song, Ki-Il
    • Journal of the Korean Geotechnical Society
    • /
    • v.39 no.2
    • /
    • pp.19-30
    • /
    • 2023
  • Underground structures, such as compacted sand piles applied as soft ground countermeasures, are analyzed for settlement and stability by the composite ground design method. The basic principle of the composite ground design method is the arching effect. The reinforcing effect of the pile is evaluated as the stress-distribution ratio. When applying grouting piles with elastic properties using the ground reinforcement method, the existing stress-distribution ratio was only considered when the pile was installed. This study shows that the method of applying the stress-distribution ratio applied in previous studies should be changed when the ground reinforcement pile is installed at an arbitrary location in the ground without raising it to the ground surface. When high strength jet routing is applied, the stress-distribution ratio (n) to the in-situ ground generally ranges from 30 to 50. However, if the pile is located far from the surface and the depth goes down to the boundary depth of the stress sphere, the stress-distribution effect rapidly decreases, and the stress-distribution ratio converges to 1.5.

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.

Violation Detection of Application Network QoS using Ontology in SDN Environment (SDN 환경에서 온톨로지를 활용한 애플리케이션 네트워크의 품질 위반상황 식별 방법)

  • Hwang, Jeseung;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.7-20
    • /
    • 2017
  • The advancement of cloud and big data and the considerable growth of traffic have increased the complexity and problems in the management inefficiency of existing networks. The software-defined networking (SDN) environment has been developed to solve this problem. SDN enables us to control network equipment through programming by separating the transmission and control functions of the equipment. Accordingly, several studies have been conducted to improve the performance of SDN controllers, such as the method of connecting existing legacy equipment with SDN, the packet management method for efficient data communication, and the method of distributing controller load in a centralized architecture. However, there is insufficient research on the control of SDN in terms of the quality of network-using applications. To support the establishment and change of the routing paths that meet the required network service quality, we require a mechanism to identify network requirements based on a contract for application network service quality and to collect information about the current network status and identify the violations of network service quality. This study proposes a method of identifying the quality violations of network paths through ontology to ensure the network service quality of applications and provide efficient services in an SDN environment.

Coupled Operation of the Lake Youngsan and Yeongam for the Flood Control in the Downstream of the Youngsan River (영산강 하류부 홍수조절을 위한 영산호-영암호 연계운영 방안)

  • Kim, Dae Geun;Lee, Jae Hyung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.3B
    • /
    • pp.297-306
    • /
    • 2008
  • In order to determine the effects of lock gate expansion at the Lake Youngsan and Yeongam as well as increase in the width of the connecting channel of the two lakes on flood control downstream of the Youngsan River, an unsteady hydraulic flood routing was conducted by combining the Lake Youngsan and Yeongam as a single connected system. The coupled operation of the two lakes was found to have little effect when the widths of the lock gates and the connecting channel are set at the current level. It was also found that increasing the width of the connecting channel as well as the lock gate of the Lake Yeongam is an effective means of reducing the stage of the Lake Youngsan, whereas an increase in the width of the Lake Youngsan's lock gate had a relatively smaller effect. The extended width of the connecting channel leads to a rise in the stage of the Lake Yeongam. In order to reduce the elevated stage, The Lake Yeongam's lock gate must be expanded along with the Lake Yeongsan's lock gate. The analysis found that the stage of the Lake Yeongsan can be effectively controlled through adjustment of opening and shutting criteria of the connecting channel's lock gate, when diversion discharge between the lakes is increased as a result of expanding the width of the connecting channel.

Rainfall Forecasting Using Satellite Information and Integrated Flood Runoff and Inundation Analysis (I): Theory and Development of Model (위성정보에 의한 강우예측과 홍수유출 및 범람 연계 해석 (I): 이론 및 모형의 개발)

  • Choi, Hyuk Joon;Han, Kun Yeun;Kim, Gwangseob
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.6B
    • /
    • pp.597-603
    • /
    • 2006
  • The purpose of this study is to improve the short term rainfall forecast skill using neural network model that can deal with the non-linear behavior between satellite data and ground observation, and minimize the flood damage. To overcome the geographical limitation of Korean peninsula and get the long forecast lead time of 3 to 6 hour, the developed rainfall forecast model took satellite imageries and wide range AWS data. The architecture of neural network model is a multi-layer neural network which consists of one input layer, one hidden layer, and one output layer. Neural network is trained using a momentum back propagation algorithm. Flood was estimated using rainfall forecasts. We developed a dynamic flood inundation model which is associated with 1-dimensional flood routing model. Therefore the model can forecast flood aspect in a protected lowland by levee failure of river. In the case of multiple levee breaks at main stream and tributaries, the developed flood inundation model can estimate flood level in a river and inundation level and area in a protected lowland simultaneously.