
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
광 버스트 교환 망에서 차등적 다중 서비스 제공을 위한 offset 시간 결정 및 성능 평가
소원호,김영천,So W.H.,im Y.C.K 대한전자공학회 2004 전자공학회논문지TC (Telecommunications) Vol.41 No.1
In this paper, we take advantage of the characteristics of optical burst switching (OBS) to support service-differentiation in optical networks. With the offset time between control packet and burst data, the proposed scheme uses different offset time of each service class. As contrasted with the Previous method, in which the high Priority service use only long offset time, it derives the burst loss rate as a QoS parameter in consideration of conservation law and given service-differential ratios and decides a reasonable offset time for this QoS finally Firstly proposed method classifies services into one of high or low class and is an algorithm deciding the offset time for supporting the required QoS of high class. In order to consider the multi-classes environment, we expand the analysis method of first algorithm and propose the second algorithm. It divides services into one of high or low group according to their burst loss rate and decides the offset time for high group, and lastly cumulates the offset time of each class. The proposed algorithms are evaluated through simulation. The result of simulation is compared with that of analysis to verify the proposed scheme.
Low-rate TCP 공격 탐지를 위한 스케일링 기반 DTW 알고리즘의 성능 분석
소원호,심상헌,김영천,유경민 대한전자공학회 2007 전자공학회논문지TC (Telecommunications) Vol.44 No.3
In this paper, low-rate TCP attack as one of shrew attacks is considered and the scaling based dynamic time warping (S-DTW) algorithm is introduced. The low-rate TCP attack can not be detected by the detection method for the previous flooding DoS/DDoS (Denial of Service/Distirbuted Denial of Service) attacks due to its low average traffic rate. It, however, is a periodic short burst that exploits the homogeneity of the minimum retransmission timeout (RTO) of TCP flows and then some pattern matching mechanisms have been proposed to detect it among legitimate input flows. A DTW mechanism as one of detection approaches has proposed to detect attack input stream consisting of many legitimate or attack flows, and shown a depending method as well. This approach, however, has a problem that legitimate input stream may be caught as an attack one. In addition, it is difficult to decide a threshold for separation between the legitimate and the malicious. Thus, the causes of this problem are analyzed through simulation and the scaling by maximum auto-correlation value is executed before computing the DTW. We also discuss the results on applying various scaling approaches and using standard deviation of input streams monitored. 본 논문에서는 최근 새롭게 발견된 low-rate TCP (LRT) 공격과 이 공격을 감지하기 위한 DTW (Dynamic Time Warping) 알고리즘을 분석하고 공격 검출에 대한 성능 향상을 위한 스케일링 기반 DTW (Scaling based DTW; S-DTW) 알고리즘을 소개한다. Low-rate TCP 공격은 대용량 트래픽을 사용한 기존 서비스 거부 공격과는 다르게 공격 트래픽의 평균 트래픽 양이 적어서 기존 DoS 공격에 대한 감지 방식으로는 검출되지 않는다. 그러나 LRT 공격은 주기적이고 짧은 버스트 트래픽으로 TCP 연결의 최소 재전송 타임아웃 (Retransmission Timeout; RTO)에 대한 취약성을 공격하기 때문에 패턴 매칭으로 공격 감지가 가능하다. 기존 메커니즘에 의한 감지 기법은 공격 패턴의 입력 샘플 템플릿을 기준으로 입력 트래픽이 정상 트래픽인지 또는 공격 트래픽인지를 판별한다. 이 과정에서 입력 트래픽의 특성에 따라서 DTW 알고리즘은 정상 트래픽을 공격 트래픽으로 오판하는 문제점을 갖는다. 따라서 본 논문에서는 이러한 오판을 줄이기 위하여 기존 DTW 알고리즘의 전처리 과정인 자기상관 (auto-correlation) 처리를 분석하여 오판을 규명한다. 또한 스케일링 기반으로 자기상관 처리 결과를 수정하여 공격 트래픽과 정상 트래픽의 특성의 차이를 증가시킴으로써 DTW 알고리즘에 의한 공격 감지 능력을 향상시킨다. 마지막으로 다양한 스케일링 방식과 표준편차에 의한 트래픽 분석 방법도 논의된다.
소원호,이청훈,김영선,김영천,So, W.H.,Lee, C.H.,Kim, Y.S.,Kim, Y.C. 대한전자공학회 1998 전자공학회논문지SC (System and control) Vol.s35 No.8
전광 통신망(All-Optical Network)은 근거리와 원거리 통신망을 위한 차세대 광대역 통신먕이며 이를 위한 많은 광교환기들이 제안되고 있다. 특히 파장 분할 다중화 기법을 적용한 광교환기는 전광 통신망에서 B-ISDN 서비스를 위한 망의 투명성과 토폴로지 측면에서 많은 장점을 갖는다. 본 논문에서는 광링크 기반의 고속 ATM 망을 위한 두 종류의 넉아웃 광교환기 구조를 제안하였다. 제안된 구조는 파장 분할 다중화 기법을 이용하여 전광 영역에서 동작할 수 있도록 하였으며, 구조-Ⅰ과 구조-Ⅱ로 명명하였다. 각 구조는 구성 소자수 및 소자 종류에 의하여 다른 특성을 갖으며, 시스템의 성능과 복잡도도 많은 영향을 받는다. 제안된 두 종류의 광교환기 구조에 대한 해석적 분석과 시뮬레이션을 실시하였으며, 셀 손실률, 구성 소자의 복잡도, 요구되는 버퍼링 속도 관점에서 성능을 비교 분석하였다. All-optical networks(AON) are emerging as the next generation broadband networks for wide-area and local-area networks. Many optical switch architectures are currently proposed to realize AON. Specially, optical switches using WDM have a lot of advantages in point of the optical transparency and network topology for B-ISDN services in AON. In this paper, two kinds of Knockout Optical Switching Architectures(KOSA) are proposed for high speed optical ATM networks. We use WDM technologies for them to operate in all-optical area and they are called Architecture-Ⅰ, Architecture-Ⅱ respectively. Each one represents different characteristics according to the number of components and the kind of components, which make KOSA have different performance and system complextity. In order to verify and to compare the performance, these architectures were analyzed and simulated in terms of cell loss ratio, system complexity and buffering speed.
p-Persistent MAC Protocol for WDM Ring Networks
소원호,김영천,So, Won-Ho,Kim, Young-Chon The Korea Institute of Information and Commucation 2007 韓國通信學會論文誌 Vol.32 No.9b
In this paper, a WDM metro ring consisting of access nodes with $FT-FR^n$ (Fixed Transmitter - n Fixed Receivers) is considered. A trade-off exists between node throughput and transmission fairness because the access nodes share wavelength channels. In order to eliminate the transmission unfairness and to increase throughput, the p-persistent medium access control (MAC) protocol is proposed: each node uses an empty optical slot to transmit a packet and make it available with the extraction of a transferred packet at the source access node, called source-stripping. The local empty slot can be used to transfer a head-of-line packet in the local buffer with probability p or it is used for the next downstream nodes with 1-p. The proposed MAC protocol provides better node throughput than the non-persistent protocol and exhibits better fairness index than the 1-persistent protocol in WDM ring networks. In addition, numerical analysis shows that the proposed MAC protocol maximizes the node throughput under uniform traffic conditions. For more detailed results, we use the network simulation under Poisson and self-similar traffic. Furthermore, unpredictable traffic constructed by the combination of the former and the latter is also considered. The reasonable probability of the p-persistent protocol for a given architecture can be determined through simulation.
Hybrid Scaling Based Dynamic Time Warping for Detection of Low-rate TCP Attacks
소원호,김영천,유경민 한국통신학회 2008 韓國通信學會論文誌 Vol.34 No.10
In this paper, a Hybrid Scaling based DTW (HS-DTW) mechanism is proposed for detection of periodic shrew TCP attacks. A low-rate TCP attack which is a type of shrew DoS (Denial of Service) attacks, was reported recently, but it is difficult to detect the attack using previous flooding DoS detection mechanisms. A pattern matching method with DTW (Dynamic Time Warping) as a type of defense mechanisms was shown to be reasonable method of detecting and defending against a periodic low-rate TCP attack in an input traffic link. This method, however, has the problem that a legitimate link may be misidentified as an attack link, if the threshold of the DTW value is not reasonable. In order to effectively discriminate between attack traffic and legitimate traffic, the difference between their DTW values should be large as possible. To increase the difference, we analyze a critical problem with a previous algorithm and introduce a scaling method that increases the difference between DTW values. Four kinds of scaling methods are considered and the standard deviation of the sampling data is adopted. We can select an appropriate scaling scheme according to the standard deviation of an input signal. This is why the HS-DTW increases the difference between DTW values of legitimate and attack traffic. The result is that the determination of the threshold value for discrimination is easier and the probability of mistaking legitimate traffic for an attack is dramatically reduced.
대역 액세스 망을 연결하는 파장 공유 노드 기반 WDM 메트로 링의 MAC 프로토콜 성능 평가
소원호 대한전자공학회 2006 전자공학회논문지TC (Telecommunications) Vol.43 No.1
In this paper, a node architecture of WDM metro network for connecting broadband access networks to converge wire/wireless networks. In consideration of the proposed node architecture and network requirements we proposed and evaluated medium access control protocols. We review WDM related technologies of sub-carrier multiplexing and optical components in order to resolve the bottleneck between optical backbone networks and access networks, and a access node architecture sharing common wavelength is introduced. Source-stripping (SS) MAC protocol is evaluated under the proposed functional node architecture. DS+IS (Destination-Stripping and Source-Stripping) and DS+IS (Destination-Stripping and Intermediate-Stripping) MAC protocols are described to increase the slot-reuse factor which is low on SS MAC protocol. The key function of new MAC protocols regards the optical switch module of proposed node architecture and helps intermediate or source access nodes for dropping slots to destinations of different wavelength group. Thus, slot-reuse factor increases as the MAC protocols reduce the unnecessary ring-rotation of transferred slots. We use a numerical analysis to expect bandwidth efficiency and maximum throughput by slot-reuse factor. Throughput network simulation, the verification of throughput, queuing delay, and transmission fairness are compared among MAC protocols. 본 논문에서는 유무선 통합을 위한 광대역 액세스 망의 연결을 지원하는 파장 분할 다중화 (Wavelength Division Multiplexing; WDM) 메트로(metro) 망을 위한 노드 구조를 제안한다. 또한 노드 구조의 기능과 망 요구 사항을 고려한 매체 접근 제어 (Medium Access Control; MAC) 프로토콜을 제안하고 성능을 비교평가한다. 광통신 백본 망과 액세스 망사이의 병목현상을 해결하기 위하여 WDM, 서브 캐리어 다중화 기술, 광소자 기술 등을 살펴보고 고비용 자원에 해당하는 파장 채널의 공유를 위한 액세스 노드 구조를 제안한다. 또한 제안된 기능 모델을 이용하여 기존 SS (Source-Stripping) MAC 프로토콜을 분석하고 슬롯 재사용성을 높이기 위한 DS+SS (Destination-Stripping and Source-Stripping)와 DS+IS (Destination-Stripping and Intermediate-Stripping) MAC 프로토콜을 제시한다. 제안된 프로토콜은 다른 파장 그룹의 목적지 노드로 슬롯이 전송되는 경우에 목적지에 따라서 슬롯의 제거를 중간 액세스 노드나 근원지 노드에서 수행한다. 따라서 전송된 슬롯의 불필요한 망 순환을 줄임으로써 슬롯 재사용성이 증가한다. 슬롯 재사용성에 의한 대역 효율성과 노드의 최대 처리율을 예측하기 위하여 수치적 분석을 수행하며 네트워크 시뮬레이션을 통하여 처리율 검증과 전송 지연, 전송 공정성 등의 다양한 성능 파라미터를 기존 프로토콜과 비교 평가한다.