Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 18C, Issue 6 - Dec 2011
Volume 18C, Issue 5 - Oct 2011
Volume 18C, Issue 4 - Aug 2011
Volume 18C, Issue 3 - Jun 2011
Volume 18C, Issue 2 - Apr 2011
Volume 18C, Issue 1 - Feb 2011
Selecting the target year
Optimal thresholds of algorithm and expansion of Application-layer attack detection block ALAB in ALADDIN
Yoo, Seung-Yeop ; Park, Dong-Gue ; Oh, Jin-Tae ; Jeon, In-Ho ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 127~134
DOI : 10.3745/KIPSTC.2011.18C.3.127
Malicious botnet has been used for more malicious activities, such as DDoS attacks, sending spam messages, steal personal information, etc. To prevent this, many studies have been preceded. But malicious botnets have evolved and evaded detection systems. In particular, HTTP GET Request attack that exploits the vulnerability of the application layer is used. ALAB of ALADDIN proposed by ETRI is DDoS attack detection system that HTTP GET, Incomplete GET request flooding attack detection algorithm is applied. In this paper, we extend Incomplete GET detection algorithm of ALAB and derive the optimal configuration parameters to verify the validity of the algorithm ALAB by the study of the normal and attack packets.
The Scheme for Delegation of Temporary Right to Watching Pay-TV in N-Screen Service
Kim, Jung-Hoon ; Lee, Hoon-Jung ; Kim, Sang-Jin ; Oh, Hee-Kuck ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 135~142
DOI : 10.3745/KIPSTC.2011.18C.3.135
Recently, the strategy for N-screen service is in the spotlight along with the consumer`s need to use contents regardless of time and place due to the rapid development of communication technology, which is meshing with the desire of service providers seeking a new business model. N-screen, as a screen-extension-concept service which enables consumers to continuously share and use contents in various equipments such as TV, computer and portable terminals, is an advanced type of 3-screen service strategy initially proposed by AT&T, an American telecommunication company. In the N-screen service for pay-contents, in order to support continuous screen changes to and from various equipments, temporary watching right should be given to the equipment intended for screen change. However, it is impossible to give the temporary watching right in the present broadcasting environment, adopting an access-control system. In this paper, the access-control technology being used for pay-contents in the present broadcasting environment and the reason for not being able to give temporary watching right, will be examined. After the examination, the solution for delegation of watching right by using an additional key on the basis of currently used access-control technology, will be proposed.
Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment
Yoon, Seok-Ung ; Jung, Hyun-Cheol ; Che, Xuemei ; Chu, Gyeong-Ho ; Park, Han ; Baek, Jae-Jong ; Song, Joo-Seok ; Yoo, Hyeong-Seon ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 143~150
DOI : 10.3745/KIPSTC.2011.18C.3.143
The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.
Design and Implementation of a Flexible Application Permission Management Scheme on Android Platform
Kim, Ik-Hwan ; Kim, Tae-Hyoun ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 151~156
DOI : 10.3745/KIPSTC.2011.18C.3.151
Google Android, which is one of the popular smart phone platforms, employs a security model based on application permissions. This model intends to reduce security threats by protecting inappropriate accesses to system resources from applications, but this model has a few problems. First, permission requested by an application cannot be granted selectively. Second, once the permission has been granted it is maintained until the application is uninstalled. Third, applications may acquire powerful permissions through user ID sharing without any notice to users. In order to overcome these limitations, we designed and implemented a flexible application permission management scheme. The goal of our scheme is to enhance security and user convenience while keeping compatibility to original platform. We also verified the operation of our scheme with real applications on Android emulator.
System Integrity Monitoring System using Kernel-based Virtual Machine
Nam, Hyun-Woo ; Park, Neung-Soo ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 157~166
DOI : 10.3745/KIPSTC.2011.18C.3.157
The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine`s dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM`s internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.
A Research of LEACH Protocol improved Mobility and Connectivity on WSN using Feature of AOMDV and Vibration Sensor
Lee, Yang-Min ; Won, Joon-We ; Cha, Mi-Yang ; Lee, Jae-Kee ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 167~178
DOI : 10.3745/KIPSTC.2011.18C.3.167
As the growth of ubiquitous services, various types of ad hoc networks have emerged. In particular, wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are widely known ad hoc networks, but there are also other kinds of wireless ad hoc networks in which the characteristics of the aforementioned two network types are mixed together. This paper proposes a variant of the Low Energy Adaptive Cluster Hierarchy (LEACH) routing protocol modified to be suitable in such a combined network environment. That is, the proposed routing protocol provides node detection and route discovery/maintenance in a network with a large number of mobile sensor nodes, while preserving node mobility, network connectivity, and energy efficiency. The proposed routing protocol is implemented with a multi-hop multi-path algorithm, a topology reconfiguration technique using node movement estimation and vibration sensors, and an efficient path selection and data transmission technique for a great many moving nodes. In the experiments, the performance of the proposed protocol is demonstrated by comparing it to the conventional LEACH protocol.
Using Genetic Algorithms in Wireless Mesh Network Routing Protocol Design
Yoon, Chang-Pyo ; Ryou, Hwang-Bin ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 179~186
DOI : 10.3745/KIPSTC.2011.18C.3.179
Wireless Mesh Network technology refers to the technology which establishes wireless network whose transmission speed is similar to that of the wire system, and provides more enhanced flexibility in the building of network, compared to the existing wired network. In addition, it has the feature of less mobility and less restriction from the energy effect. However, there follow many considerations such as system overhead in the case of setting or the selection of multi-path. Accordingly, the focus is on the design and optimization of network which can reflect this network feature and the technology to establish path. This paper suggests the methods on the programming of path in Wireless Mesh Network routing by applying the evaluation value of node service, making use of the loss rate of data, the hop count of bandwidth and link and the traffic status of node, considering the performance of link and load in the fitness evaluation function, in order to respond to the programming of multi-path effectively.
VirtFrame: A Sniffing-based Throughput Estimation Scheme in IEEE 802.11 Wireless LANs
Seo, Sung-Hoon ; Baek, Jae-Jong ; Kim, Dong-Gun ; Song, Joo-Seok ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 187~194
DOI : 10.3745/KIPSTC.2011.18C.3.187
IEEE 802.11 wireless LAN has become the center of attention for one of the most dominant wireless networking technologies nowadays. In densely deployed wireless LANs, mobile stations are exposed to a number of AP, thus it is needed to select the best AP to associate with. The most common approach is to select the AP with the highest received signal strength. However it does not consider traffic load imposed to each AP so that it may cause the poor network performance. Therefore, in this paper, we propose a throughput estimation scheme for neighboring APs by sniffing the traffic within 802.11 networks. We devise a tool, named "VirtFrame", which is to estimate the station`s capable throughput from neighbor APs based on the channel access time by virtually combining the sniffed frames. Simulation results show that our proposed scheme well matches that there exists correlation between the channel access time and the actual throughput of the APs.
A Wireless ECG Measurement System based on the Zigbee USN
Chang, Yun-Seok ; Kim, Bo-Yeon ;
The KIPS Transactions:PartC, volume 18C, issue 3, 2011, Pages 195~198
DOI : 10.3745/KIPSTC.2011.18C.3.195
Recent expansion of the ubiquitous environment and improvement of the USN give lots of U-healthcare systems. In this paper, we design and implement a wireless ECG measurement system that can send ECG signals among the sensors and collector. It can also give almost the same precision as a hospital ECG system with mobility. The most important fact of the mobile ECG system is the signal data connectivity among the sensors and device such as signal cables or wires. we can eliminate the signal cable through the Zigbee sender and collector via implementing Zigbee-SD communication system that can receive the ECG signal data. We also implement ECG app software on the smart phone that can analyze and show the data results directly. It can give lots of mobility and usability under ubiquitous environment and would be a very efficient wireless ECG system for U-healthcare service.