• Title/Summary/Keyword: signatures of a link

Search Result 12, Processing Time 0.027 seconds

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep;Sengupta, Jyotsna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.52-83
    • /
    • 2009
  • In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

Deep Packet Inspection Time-Aware Load Balancer on Many-Core Processors for Fast Intrusion Detection

  • Choi, Yoon-Ho;Park, Woojin;Choi, Seok-Hwan;Seo, Seung-Woo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.3
    • /
    • pp.169-177
    • /
    • 2016
  • To realize high-speed intrusion detection by accommodating many regular expression (regex)-based signatures and growing network link capacities, we propose the Service TimE-Aware Load-balancing (STEAL) algorithm. This work is motivated from the observation that utilization of a many-core network intrusion detection system (NIDS) is influenced by unfair computational distribution among many-core NIDS nodes. To avoid such unfair computational distribution, STEAL is designed to dynamically distribute a large volume of traffic among many-core NIDS nodes based on packet service time, which is represented by the deep packet time in many-core NIDS nodes. From experiments, we show that compared to the commonly used load-balancing algorithm based on arrival rate, STEAL increases the number of received packets (i.e., decreases the number of dropped packets) in many-core NIDS. Specifically, by integrating an open source NIDS (i.e. Bro) with STEAL, we show that even under attack-dominant traffic and with many signatures, STEAL can rapidly improve the performance of many-core NIDS to realize high-speed intrusion detection.

Design of high-speed preamble searcher adequate for RACH preamble structure in WCDMA reverse link receiver (RACH 프리앰블 구조에 적합한 WCDMA 역방향 링크 수신기용 고속 프리앰블 탐색기의 설계)

  • 정은선;도주현;이영용;정성현;최형진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.898-908
    • /
    • 2004
  • In this paper, we propose a high speed preamble searcher feasible for RACH(Random Access Channel) preamble structure in WCDMA reverse link receiver. Unlike IS-95, WCDMA system uses AISMA(Acquisition Indication Sense Multiple Access) process. Because of the time limit between RACH preamble transmission and AI(Acquisition Indicators), and the restriction on the number of RACH signatures assigned to RACH preamble, fast acquisition indication is required for efficient operation. The preamble searcher proposed in this paper is based on 2-antenna system and has adopted FHT algorithm that has the radix-2 16 point FFT structure. The acquisition speed using FHT is 64 times faster than the conventional method that correlates each signature. Based on their fast aquisition scheme, we improved the acquisition performance by calculating the correlation up to the 4096 chips of the total preamble length. The performance is analyzed by using Neyman-pearson method. The proposed algorithm has been applied for the implementation of WCDMA reverse link receiver modem successfully.

A Vehicle Reidentification Algorithm using Inductive Vehicle Signatures (루프검지기 자기신호 패턴분석을 통한 차량재인식 알고리즘)

  • Park, Jun-Hyeong;O, Cheol;NamGung, Seong
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.1
    • /
    • pp.179-190
    • /
    • 2009
  • Travel time is one of the most important traffic parameters to evaluate operational performance of freeways. A variety of methods have been proposed to estimate travel times. One feasible solution to estimating travel times is to utilize existing loop detector-based infrastructure since the loops are the most widely deployed detection system in the world. This study proposed a new approach to estimate travel times for freeways. Inductive vehicle signatures extracted from the loop detectors were used to match vehicles from upstream and downstream stations. Ground-truthing was also conducted to systematically evaluate the performance of the proposed algorithm by recognizing individual vehicles captured by video cameras placed at upstream and downstream detection stations. A lexicographic optimization method vehicle reidentification algorithm was developed. Vehicle features representing the characteristics of individual vehicles such as vehicle length and interpolations extracted from the signature were used as inputs of the algorithm. Parameters associated with the signature matching algorithm were calibrated in terms of maximizing correct matching rates. It is expected that the algorithm would be a useful method to estimate freeway link travel times.

Automatic Generation of Snort Content Rule for Network Traffic Analysis (네트워크 트래픽 분석을 위한 Snort Content 규칙 자동 생성)

  • Shim, Kyu-Seok;Yoon, Sung-Ho;Lee, Su-Kang;Kim, Sung-Min;Jung, Woo-Suk;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.666-677
    • /
    • 2015
  • The importance of application traffic analysis for efficient network management has been emphasized continuously. Snort is a popular traffic analysis system which detects traffic matched to pre-defined signatures and perform various actions based on the rules. However, it is very difficult to get highly accurate signatures to meet various analysis purpose because it is very tedious and time-consuming work to search the entire traffic data manually or semi-automatically. In this paper, we propose a novel method to generate signatures in a fully automatic manner in the form of sort rule from raw packet data captured from network link or end-host. We use a sequence pattern algorithm to generate common substring satisfying the minimum support from traffic flow data. Also, we extract the location and header information of the signature which are the components of snort content rule. When we analyzed the proposed method to several application traffic data, the generated rule could detect more than 97 percentage of the traffic data.

GALAXIES ON DIET: FEEDBACK SIGNATURES IN RADIO-AGN HOST GALAXIES

  • Karouzos, Marios;Im, Myungshin;Trichas, Markos;Goto, Tomogotsu;Malkan, Matthew;Ruiz, Angel;Jeon, Yiseul;Kim, Ji Hoon;Lee, Hyung Mok;Kim, Seong Jin;Oi, Nagisa;Matsuhara, Hideo;Takagi, Toshinobu;Murata, Kazumi;Wada, Takehiko;Wada, Kensuke;Shim, Hyunjin;Hanami, Hitoshi;Serjeant, Stephen;White, Glenn;Pearson, Chris;Ohyama, Youichi
    • Publications of The Korean Astronomical Society
    • /
    • v.32 no.1
    • /
    • pp.201-203
    • /
    • 2017
  • There exists strong evidence supporting the co-evolution of central supermassive black holes and their host galaxies; however it is still under debate how such a relation comes about and whether it is relevant for all or only a subset of galaxies. An important mechanism connecting AGN to their host galaxies is AGN feedback, potentially heating up or even expelling gas from galaxies. AGN feedback may hence be responsible for the eventual quenching of star formation and halting of galaxy growth. A rich multi-wavelength dataset ranging from the X-ray regime (Chandra), to far-IR (Herschel), and radio (WSRT) is available for the North Ecliptic Pole field, most notably surveyed by the AKARI infrared space telescope, covering a total area on the sky of 5.4 sq. degrees. We investigate the star formation properties and possible signatures of radio feedback mechanisms in the host galaxies of 237 radio sources below redshift z = 2 and at a radio 1.4 GHz flux density limit of 0.1 mJy. Using broadband SED modelling, the nuclear and host galaxy components of these sources are studied simultaneously as a function of their radio luminosity. Here we present results concerning the AGN content of the radio sources in this field, while also offering evidence showcasing a link between AGN activity and host galaxy star formation. In particular, we show results supporting a maintenance type of feedback from powerful radio-jets.

Revealing the complexity of ionized gas outflows in powerful Type 2 AGN in the local Universe

  • Karouzos, Marios;Woo, Jong-Hak;Bae, Hyun-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.2
    • /
    • pp.32.3-33
    • /
    • 2015
  • There exist scaling relations that link the mass of supermassive black holes with both the velocity dispersion and the mass of the central stellar cusp of their host galaxies. This implies that these two components grow in tandem. Feedback from actively accreting supermassive black holes (AGN), in the form of multi-phase gas outflows, has been argued to be the agent of this co-evolution. Here we employ the powerful GMOS integral field spectroscopy unit on the 8.2m Gemini-North telescope to investigate ionized gas outflows of luminous Type 2 AGN in the local Universe (z<0.1). Our sample of 6 galaxies is drawn from the Sloan Digital Sky Survey (SDSS) and was selected based on their [OIII] dust-corrected luminosity (>1042 erg/s) and signatures of outflows in the [OIII] line profile of their spatially integrated SDSS spectra. These are arguably the best candidates to explore AGN feedback in action since they are < 1% of a large local type 2 AGN SDSS sample selected based on their [OIII] kinematics. We combine a careful spectral decomposition of the [OIII] and $H{\alpha}$ line profiles with spatial information on ~0.5kpc scales to understand the outflow kinematics and energetics in these objects. We find clear evidence for strong outflows in [OIII] and occasionally $H{\alpha}$ that are clearly driven by the ionizing radiation of the AGN. We kinematically and spatially decompose outflowing and rotating ionized gas components. We find [OIII] to be a better tracer of AGN outflows, while $H{\alpha}$ appears to be strongly affected by both stellar rotation and outflows induced by ongoing star formation. The observed kinematics and spatial distribution of the ionized gas imply a large opening angle for the outflow. Finally, we find the projected outflow velocity to decrease as a function of distance, while its dispersion shows a more complex structure with a potentially initially increasing trend (out to 0.5-1kpc distances).

  • PDF

Secure Component Composition for Practical Systems (실용적인 시스템을 위한 안전한 소프트웨어 컴포넌트 조합)

  • Lee Eun-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.43-57
    • /
    • 2006
  • When building a software system out of software components, the composition is not simple because of the complexity caused by diverse versions, digital signatures, static type information, and off-the-shelf components from various vendors. Well-established linking policies are one of the best solutions to solve the complexity problem at linking time. Secure Linking (SL) enables users to specify their linking policies which can be enforced at link time. Secure Linking framework is a framework based on a higher-order logic in order to help build a SL system. This paper shows that the Secure Linking logic is expressive enough to describe a real-world component composition system, the linking protocol of.NET. The paper also demonstrates the advantage of the logic-based linking framework by discussing the weakness of the code signing protocol in.NET which was found while we encoded the assembly linking system of.NET.

The drivers and energetics of ionized gas outflows in powerful Type 2 AGN in the local Universe

  • Karouzos, Marios;Woo, Jong-Hak;Bae, Hyun-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.37.2-37.2
    • /
    • 2016
  • There exist scaling relations that link the mass of supermassive black holes with both the velocity dispersion and the mass of the central stellar cusp of their host galaxies. This implies that galaxies co-evolve with their central black holes, potentially through the feedback from actively accreting supermassive black holes (AGN). We use integral field spectroscopy data from the 8.2m Gemini-North telescope to investigate ionized gas outflows in luminous local (z<0.1) Type 2 AGN. Our sample of 6 galaxies was selected based on their [OIII] dust-corrected luminosity (>$10^{42}erg/s$) and signatures of outflows in the [OIII] line profile of their SDSS spectra. These are arguably the best candidates to explore AGN feedback in action since they are < 1% of a large local type 2 AGN SDSS sample selected based on their [OIII] kinematics. Expanding on previously reported results concerning the kinematic decomposition and size determination of these outflows, here we report their photoionization properties and energetics. We find strong evidence that connect the extreme kinematics of the ionized gas with AGN photoionization. The kinematic component related to the AGN-driven outflow is clearly separated from other kinematic components, such as gravitation- or stellar-driven motions, on the velocity and velocity dispersion diagram. Our spatially resolved kinematic analysis reveals that up to 90% of the mass and kinetic energy of the outflow is contained within the central kiloparcec of the galaxy. The total mass and kinetic energy of the outflow correlate well with the AGN bolometric luminosity, resulting in energy conversion efficiencies between 0.01% and 1%. Intriguingly, we detect ubiquitous signs of ongoing circumnuclear star formation. Their small size, the centrally contained mass and energy, and the universally detected circumnuclear star formation cast doubts on the potency of these AGN-driven outflows as agents of negative feedback.

  • PDF