• Title/Summary/Keyword: Wired-Wireless Classification

Search Result 13, Processing Time 0.033 seconds

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.

A Framework of QoE Measurement and Management for Next Generation Wired/Wireless Communication Networks (차세대 유무선통신망의 QoE 측정 및 관리를 위한 프레임워크의 제안)

  • Zhang, Jie;Kim, Hwa-Jong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.1
    • /
    • pp.24-28
    • /
    • 2010
  • The Quality of Experience (QoE) of next Generation wired/wireless network services based upon IP networking is becoming a popular issue in recent years. The user experience of Internet services such as IPTV, online game, web surfing and etc, are becoming the most desirable factors to service providers to improve service performance and customer's satisfaction. However, collecting user experience from customers and obtaining the QoE parameters from the Quality of Service (QoS) parameters such as bandwidth, delay, jitter or admission control algorithm, are difficult subjects because of the various service types and user characteristics. In this paper, we propose a framework which contains service classification, QoE analysis and service enhancement steps for a suitable QoE measurement and management protocol. We define the user satisfaction indicators of the Internet services, classify the categories of each type of services, and analyse the Key Performance Indicator (KPI) in each type of services to perform the QoS parameters and improving the service qualities.

  • PDF

TTL based Advanced Packet Marking Mechanism for Wireless Traffic Classification and IP Traceback on IEEE 802.1x Access Point (IEEE 802.1x AP에서의 TTL 기반 패킷 마킹 기법을 이용한 무선 트래픽 분류 및 IP 역추적 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.103-115
    • /
    • 2007
  • The vulnerability issue on IEEE 802.1x wireless LAN has been permits the malicious attack such as Auth/Deauth flooding more serious rather than we expected. Attacker can generate huge volume of malicious traffic as the same methods on existing wired network. The objective of wireless IP Traceback is to determine the real attack sources, as well as the full path taken by the wireless attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. But, these existing schemes did not provide enhanced performance against DoS attack on wireless traffic. In this paper, we propose a 'TTL based advanced Packet Marking' mechanism for wireless IP Packet Traceback with wireless Classification function. Proposed mechanism can detect and control DoS traffic on AP and can generate marked packet for reconstructing on the real path from the non-spoofed wireless attack source, by which we can construct secure wireless network based on AP with enhance traceback performance.

Real-time structural damage detection using wireless sensing and monitoring system

  • Lu, Kung-Chun;Loh, Chin-Hsiung;Yang, Yuan-Sen;Lynch, Jerome P.;Law, K.H.
    • Smart Structures and Systems
    • /
    • v.4 no.6
    • /
    • pp.759-777
    • /
    • 2008
  • A wireless sensing system is designed for application to structural monitoring and damage detection applications. Embedded in the wireless monitoring module is a two-tier prediction model, the auto-regressive (AR) and the autoregressive model with exogenous inputs (ARX), used to obtain damage sensitive features of a structure. To validate the performance of the proposed wireless monitoring and damage detection system, two near full scale single-story RC-frames, with and without brick wall system, are instrumented with the wireless monitoring system for real time damage detection during shaking table tests. White noise and seismic ground motion records are applied to the base of the structure using a shaking table. Pattern classification methods are then adopted to classify the structure as damaged or undamaged using time series coefficients as entities of a damage-sensitive feature vector. The demonstration of the damage detection methodology is shown to be capable of identifying damage using a wireless structural monitoring system. The accuracy and sensitivity of the MEMS-based wireless sensors employed are also verified through comparison to data recorded using a traditional wired monitoring system.

Facility Classification for Mobile Communications Systems based on Investment Requirements (투자요구에 따른 이동통신 시스템 설비 분류)

  • Jang Hee-Seon;Han Sung-Su;Lim Seog-Ku
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.234-238
    • /
    • 2004
  • The system facilities in mobile communications networks are mainly classified into the coverage and usage in the viewpoint of the investments requirements. Based on the classification criterion, the interconnection charging between the wired operators art wireless operators is determined. In this paper, to decide the scale of the interconnection charging a new classification method is proposed by using the system capacity(Erlang, throughput) and subscriber`s estimated demand. The coverage ratio is first evaluated for each facility, and then more efficient interconnection charging model will be presented.

  • PDF

Design of Effective Intrusion Detection System for Wireless Local Area Network (무선랜을 위한 효율적인 침입탐지시스템 설계)

  • Woo, Sung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.185-191
    • /
    • 2008
  • Most threats of WLAN are easily caused by attackers who access to the radio link between STA and AP, which involves some Problems to intercept network communications or inject additional messages into them. In comparison with wired LAN, severity of wireless LAN against threats is bigger than the other networks. To make up for the vulnerability of wireless LAN, it needs to use the Intrusion Detection System using a powerful intrusion detection method as SVM. However, due to classification based on calculating values after having expressed input data in vector space by SVM, continuous data type can not be used as any input data. In this paper, therefore, we design the IDS system for WLAN by tuning with SVM and data-mining mechanism to defend the vulnerability on certain WLAN and then we demonstrate the superiority of our method.

  • PDF

A Study on Organization of Service Function on the Integrated Management Platform of the u-City (u-City 통합운영플랫폼의 서비스 기능 구성에 관한 연구)

  • Kang, Joon-Mook;Baik, Song-Hoon;Kim, Nam-Gyu;Park, Joon-Kyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.4
    • /
    • pp.477-484
    • /
    • 2009
  • An Integrated Management Platform, which plays a core role in managing u-City, intelligently control various infra-structure components by accommodating a large number of sensors and devices; and analyzing data received from these sensors and devices through wired/wireless sensor networks. In this paper, the services provided by the integrated management platform for u-City are classified into common application service, operational management service, and platform gateway service, and furthermore detailed functions for each service are defined. These functions, through their roles and information flows, will clarify the requirements of the integrated management platform, and through their addition and modification will be utilized as a reference model for the functional organization of the integrated management platform.

Conceptual Design of Crew Support System Based on Wireless Sensor Network and Power Line Communication for Cruise Ship (전력선통신(Power Line Communication) 기반 센서네트워크를 이용한 크루즈선 승무원 지원 시스템 개념연구)

  • Kang, Hee-Jin;Lee, Dong-Kon;Park, Beom-Jin;Paik, Bu-Geun;Cho, Seong-Rak
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.6
    • /
    • pp.631-640
    • /
    • 2009
  • The highest priority of the cruise trip is the safety and comfort of its passengers. Though the cruise lines take every appropriate measure to ensure that their Passengers are safe and experience enjoyable vacations it is hard to fulfill all passenger's personnel requirement with limited number of crews. Generally, each passenger is issued an identification card which contains their digital photo and personal identification information on a magnetic strip that he or she must present when entering or leaving the ship. This technology allows the ship to know which Passengers and crew members are on board and which are not. However, this system has some limitations of functions and usage. To support each passenger as his or her personal liking, additional number of crews or some kind of new system is needed. In this paper, the crew support system based on sensor network using wireless and wired communication technologies was studied. To design the system, PLC(Power Line Communication) system and ZigBee based passenger location recognition, classification system has studied experimentally. By using this system, crews can serve passengers more closely and personally with less effort.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Selective encryption technique according to class classification in LoRa environment (LoRa 환경에서의 Class 분류에 따른 선택적 암호화 기술)

  • Lee, Nam-gon;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.285-287
    • /
    • 2017
  • Currently, the world of data communication is not simply communication between server and user in a wired way, but using wireless environment, various devices communicate with each other in a wider and diverse environment to generate a large amount of data. In this environment, IoT is now located deep in our lives, and IoT technologies are used in many tasks, but the data used in IoT is exposed without sufficient protection from malicious behavior. Most of these devices do not have enough computing power to cope with malicious attacks. In this paper, we aim to make all devices that have sufficient computing power and safety from simple sensors to be able to have security according to the situation. The proposed technology is based on the importance of the device and computing power, and it is possible to select the encryption technology selectively and to improve security.

  • PDF