Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 13C, Issue 7 - Dec 2006
Volume 13C, Issue 6 - Oct 2006
Volume 13C, Issue 5 - Oct 2006
Volume 13C, Issue 4 - Aug 2006
Volume 13C, Issue 3 - Jun 2006
Volume 13C, Issue 2 - Apr 2006
Volume 13C, Issue 1 - Feb 2006
Selecting the target year
DRM Enabled P2P Model for Contents Protection
Sung Jae-Youn ; Jeong Yeon-Jeong ; Yoon Ki-Song ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 389~396
DOI : 10.3745/KIPSTC.2006.13C.4.389
P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.
Software Attack Detection Method by Validation of Flow Control Instruction’s Target Address
Choi Myeong-Ryeol ; Park Sang-Seo ; Park Jong-Wook ; Lee Kyoon-Ha ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 397~404
DOI : 10.3745/KIPSTC.2006.13C.4.397
Successful software attacks require both injecting malicious code into a program's address space and altering the program's flow control to the injected code. Code section can not be changed at program's runtime, so malicious code must be injected into data section. Detoured flow control into data section is a signal of software attack. We propose a new software attack detection method which verify the target address of CALL, JMP, RET instructions, which alter program's flow control, and detect a software attack when the address is not in code section. Proposed method can detect all change of flow control related data, not only program's return address but also function pointer, buffer of longjmp() function and old base pointer, so it can detect the more attacks.
A Symptom based Taxonomy for Network Security
Kim Ki-Yoon ; Choi Hyoung-Kee ; Choi Dong-Hyun ; Lee Byoung-Hee ; Choi Yoon-Sung ; Bang Hyo-Chan ; Na Jung-Chan ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 405~414
DOI : 10.3745/KIPSTC.2006.13C.4.405
We present a symptom based taxonomy for network security. This taxonomy classifies attacks in the network using early symptoms of the attacks. Since we use the symptom it is relatively easy to access the information to classify the attack. Furthermore we are able to classify the unknown attack because the symptoms of unknown attacks are correlated with the one of known attacks. The taxonomy classifies the attack in two stages. In the first stage, the taxonomy identifies the attack in a single connection and then, combines the single connections into the aggregated connections to check if the attacks among single connections may create the distribute attack over the aggregated connections. Hence, it is possible to attain the high accuracy in identifying such complex attacks as DDoS, Worm and Bot We demonstrate the classification of the three major attacks in Internet using the proposed taxonomy.
Design of Dynamic Location Privacy Protection Scheme Based an CS-RBAC
Song You-Jin ; Han Seoung-Hyun ; Lee Dong-Hyeok ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 415~426
DOI : 10.3745/KIPSTC.2006.13C.4.415
The essential characteristic of ubiquitous is context-awareness, and that means ubiquitous computing can automatically process the data that change according to space and time, without users' intervention. However, in circumstance of context awareness, since location information is able to be collected without users' clear approval, users cannot control their location information completely. These problems can cause privacy issue when users access their location information. Therefore, it is important to construct the location information system, which decides to release the information considering privacy under the condition such as location, users' situation, and people who demand information. Therefore, in order to intercept an outflow information and provide securely location-based information, this paper suggests a new system based CS-RBAC with the existing LBS, which responds sensitively as customer's situation. Moreover, it accommodates a merit of PCP reflecting user's preference constructively. Also, through privacy weight, it makes information not only decide to providing information, but endow 'grade'. By this method, users' data can be protected safely with foundation of 'Role' in context-aware circumstance.
Classification of BcN Vulnerabilities Based on Extended X.805
Yoon Jong-Lim ; Song Young-Ho ; Min Byoung-Joon ; Lee Tai-Jin ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 427~434
DOI : 10.3745/KIPSTC.2006.13C.4.427
Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.
Conformance Testing Tool Implementation for XML Encryption Products
Chae Han-Na ; Rhee Gwang-Soo ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 435~440
DOI : 10.3745/KIPSTC.2006.13C.4.435
XML encryption is to provide confidentiality service, though not limited to, for web contents. XML encryption can be applied to entire data files as opaque objects, or more frequently to various parts of XML documents, supporting various encryption granularity. It is this characteristic that makes XML encryption a more efficient alternative for data confidentiality in various web applications than is possible with SSL/TLS, IPsec, PGP, or S/MIME. It is essential for successful deployment of XML encryption to achieve interoperability among the products implementing this technology, which requires the products to implement the XML encryption standards correctly. Conformance testing is to test if products implement the relevant standard correctly. In this paper we present a conformance testing method for XML encryption products and implement it. We will first look at XML encryption standards developed by W3C, and extract test criteria. Then we propose a testing method in which the encryption capability and the decryption capability of a product are tested separately. The proposed methody is actually implemented as a GUI-based testing tool and some test results are presented.
An Effective BECN Typed QoS Guaranteeing Mechanism in Optical Burst Switching Networks
Choi Young-Bok ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 441~446
DOI : 10.3745/KIPSTC.2006.13C.4.441
In recent years, WDM networks have received much attention as the Internet backbone networks because of the explosive growth of the Internet IP-based traffic. The Optical Burst Switching (OBS) has been proposed as an effective optical switching technology in the WDM networks. The OBS has the advantages in 1) the high usage rate of the bandwidth, and 2) no necessity of optical buffer. However, the OBS has the burst-contention problem in the networks. The deflection routing is proposed as one of means to solve this problem. In this paper, we propose a new routing method to minimize burst loss in the deflection routing based networks. In addition, we propose a QoS control method using a new routing algorithm. Finally, we show the variety of the proposed methods by computer simulations.
Computing Methods of Node Traversal Time of ERS Algorithm to Reduce the Retransmission Rate in AODV Routing Protocol
Sun Chang-Yoon ; Kang Seung-Ho ; Lim Hyeong-Seok ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 447~454
DOI : 10.3745/KIPSTC.2006.13C.4.447
An ad-hoc network routing protocol, AODV(Ad-hoc On-demand Distance Vector) initially uses ERS(Expanding Ring Search) algorithm to control the RREQ(Route Request) retransmission in the route discovery process. Because ERS uses the fixed NTT(Node Travesal Time), it does not reflect accurately ad-hoc network environment. In this paper, we propose an improved ERS algorithm which lowers the retransmission rate. It uses RREP(Route Reply) and gives different weights in NTT of each node in accordance with the adjacency to an originating node. To show the effectiveness of the proposed algorithm, we perform a simulation using ns2. The simulation results showed that the proposed algorithm has better performance than existing algorithms.
A Traffic Management Scheme for Service Differentiation over MANETs
Kim Kwan-Woong ; Bae Sung-Hwan ; Kim Dae-Ik ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 455~460
DOI : 10.3745/KIPSTC.2006.13C.4.455
Currently, the IETF group is working on service differentiation in the Internet. However, in wireless environments such as Ad-hoc networks, where channel conditions are variable and bandwidth is scarce, the Internet differentiated services are suboptimal without lower layers' support. The IEEE 802.11 standard for Wireless LANs is the most widely used WLAN standard today. 1t has a mode of operation that can be used to provide service differentiation, but it has been shown to perform badly. In this paper, we present a new service differentiation scheme for support QoS in the wireless IEEE 802.11, which is based on a multiple queuing system to provide priority of user's flow. We simulate and analyze the performance of our algorithm and compare its performance with the original IEEE 802.11b protocol. Simulation results show that our approach increases overall throughput in the MAC layer.
An Approach to Acquire SIP Location Information for End-to-End Mobility Support Based on mSCTP
Chang Moon-Jeong ; Lee Mee-Jeong ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 461~470
DOI : 10.3745/KIPSTC.2006.13C.4.461
Recently mobile Stream Control Transmission Protocol (mSCTP) has been proposed as a transport layer approach for supporting mobility. When a mobile terminal (MT) is not located in the home network. a terminal that wishes to communicate with the MT is not able to establish mSCTP association to the MT, since mSCTP does not include the location management mechanism. In order to solve this problem. an interworking approach using the Session Initiation Protocol (SIP) INVITE method has been proposed. However, this approach has shown subsequent delay in acquiring the current location information of the MT when initiating mSCTP association establishment. In this paper, we propose new SIP methods and an approach that minimizes the address acquisition delay (AAD) by utilizing those SIP methods. Mathematical analysis and simulation results show that the proposed approach is more efficient than the previous approach in terms of AAD in all kinds of SIP environments.
Implementation of Analysis System for H.323 Traffic
Lee Sun-Hun ; Chung Kwang-Sue ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 471~480
DOI : 10.3745/KIPSTC.2006.13C.4.471
Recently, multimedia communication services, such as video conferencing and voice over IP, have been rapidly spread. H.323 is an international standard that specifies the components, protocols and procedures that provide multimedia communication services of real-time audio, video, and data communications over packet networks, including IP based networks. H.323 is applied to many commercial services because it supports various network environments and has a good performance. But communication services based on H.323 may have some problem because of current network trouble or mis-implementation of H.323. The understanding of this problem is a critical issue because it improves the quality of service and is easy to service maintenance. In this paper, we implement the analysis system for H.323 protocol wihch includes H.245, H.225.0, RTP, RTCP, and so on. Tills system is able to capture, parse, and present the H.323 protocol in real-time. Through the operation test and performance evaluation, we prove that our system is a useful to analyze and understand the problems for communication services based on H.323.
Optimal Number of Super-peers in Clustered P2P Networks
Kim Sung-Hee ; Kim Ju-Gyun ; Lee Sang-Kyu ; Lee Jun-Soo ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 481~490
DOI : 10.3745/KIPSTC.2006.13C.4.481
In a super-peer based P2P network, The network is clustered and each cluster is managed by a special peer, called a super-peer which has information of all peers in its cluster. This clustered P2P model is known to have efficient information search and less traffic load. In this paper, we first estimate the message traffic cost caused by peer's query, join and update actions within a cluster as well as between the clusters and with these values, we present the optimal number of super-peers that minimizes the traffic cost for the various size of super-peer based P2P networks.rks.
A Design of Management Architecture and Ubiquitous Profile Based on CC/PP for Content Adaptation in Ubiquitous Environment
Kim Kyung-Sik ; Lee Jae-Dong ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 491~500
DOI : 10.3745/KIPSTC.2006.13C.4.491
In this paper, the management architecture and the ubiquitous profile based on CC/PP for contents adaptation in the ubiquitous environment is designed. The components and the attributes of the ubiquitous profile are defined based on the services scenario of contents adaptation in the ubiquitous environment. The ubiquitous profile was applied to techniques such as standard vocabulary, CC/PP structure, RDF schema and RDF to use effectively in the ubiquitous environment during the design. Also we design and propose the another management architecture based on ideas such as the dynamic constitution method, the metadata constitution method using a repository and the management method of gateway on center for the effective management of the ubiquitous profile. The result of performance evaluation for the proposed management architecture is more effective compared with the previous management method of the profile. The proposed the ubiquitous profile and the management architecture has provided the foundation of the research for a user to adaptation contents services in the ubiquitous environment.
Design and Performance Evaluation of Software On-Demand Streaming System Providing Virtual Software Execution Environment
Kim Young-Man ; Park Hong-Jae ; Han Wang-Won ; Choi Wan ; Heo Seong-Jin ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 501~510
DOI : 10.3745/KIPSTC.2006.13C.4.501
Software streaming allows the execution of stream-enabled software on desktop or portable computing devices like PC, PDA, laptop, cellular phone, etc., even while the transmission/streaming from the server may still be in progress. In this paper, we present an efficient streaming system called Software On-Demand(SOD) streaming system to transmit stream-enabled applications in addition to automatic installation of program registry, environment variables, configuration files, and related components. In particular, we design and implement a SOD system in Linux to provide the user with the instant look-and-click software execution environment such that software download and installation are internally proceeded in a completely user-transparent way. Therefore, the SOD system relieves the user from the tricky, failure-prone installation business. In addition, the software developer now obtains a new, powerful means to advertise and propagate their software products since the user can use software packages via user-friendly UI window or web browser by look-and-click interactive operation. In the paper, we also make a couple of SOD streaming experiments using a spectrum of popular softwares. Based on the analysis of the experiment results, we also propose two performance improvement schemes.
Development of A Linux WebDAV Client Supporting Effective Distributed Authoring
Shin Won-Joon ; Ahn Geon-Tae ; Jung Hye-Young ; Lee Myung-Joon ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 511~520
DOI : 10.3745/KIPSTC.2006.13C.4.511
WebDAV is a protocol which supports web-based distributed authoring and versioning, providing a standard infrastructure for asynchronous collaboration on various contents through the Internet. Current WebDAV-enabled authoring applications that support WebDAV, such as Microsoft office, Photoshop, or Dreamweaver, work by integrating WebDAV capabilities into the application. While this approach provides solid support for collaborative authoring, it has a drawback that each of the applications needs to support WebDAV capabilities in its own way. We developed a WebDAV client named DAView running on Linux KDE, which enables WebDAV-unaware authoring tools to have effective remote authoring capabilities. DAView provides a GUI view of a WebDAV server, similar to existing WebDAV-enabled file managers such as DAVExplorer. Unique among WebDAV file managers, it also provides the ability to launch the authoring application associated to a WebDAV server resource, automatically managing the locks on the resource.
Supporting Group Workspaces Based on WebDAV
Kim Dong-Ho ; Shin Won-Joon ; Park Jin-Ho ; Lee Myung-Joon ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 521~532
DOI : 10.3745/KIPSTC.2006.13C.4.521
WebDAV is an IETF standard protocol which support asynchronous collaborative authoring on the Web. The recently published WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. Based on the WebDAV access control protocol, we developed Group Workspaces which support exchanging and/or sharing data among the group members. Any member of a Group Workspace can create and share resources among the members. Also, any member can add, change or delete the resources. To support the Group Workspaces, we developed a client application named GroupExplorer, which solely supports Group Workspaces. We constructed the server for Group Workspaces using Jakarta Slide - a WebDAV server supporting the WebDAV Access Control Protocol.
A Study on Implementation of Return Channel for DVB-H with Efficient Interface Selection Algorithm in Heterogeneous Networks
Lim Jae-Won ; Seo Sung-Hoon ; Song Joo-Seok ;
The KIPS Transactions:PartC, volume 13C, issue 4, 2006, Pages 533~540
DOI : 10.3745/KIPSTC.2006.13C.4.533
WDMB technology has merits of high bandwidth and high mobility. But WDMB also has uni-directional communication problem. This paper provides solution to supplements uni-directional communication problem of WDMB with embodying return channel using WWAN to offer high quality multimedia service to user. Also this paper proposes intelligent network interface selection algorithm using various network information and return channel type. As a result of simulation, our proposed scheme is better as compared with other handoff scheme in energy efficiency of
and about two time of handoff number of time decrease.