Search : [ author: Jinsoo Kim ] (2)

Efficient Method of Collecting Network Traces for Generating Network Topology

Jinsoo Kim, Haengrok Oh

http://doi.org/10.5626/JOK.2018.45.12.1319

Network topology information is critical in cyber security for designing security architecture and threat analysis as well as for network management and diagnosis. Numerous approaches have been proposed for obtaining information about network topology. In particular, graph analytical methods for inferring network topology are intensively researched. These methods collect path traces via traceroute and analyze them using graph theoretical methods for inferring network topology. However, there exist few research reports on choosing destinations and deployment locations of trace collectors which have the potential of significantly affecting network overhead and discovery time. This paper proposes a novel method of choosing destinations and determining trace collectors for the efficient collection of network traces. In the present work, we have also implemented a prototype of the proposed methods and experimentally validated their performance.

Network Topology Discovery with Load Balancing for IoT Environment

Hyunsu Park, Jinsoo Kim, Moosung Park, Youngbae Jeon, Jiwon Yoon

http://doi.org/10.5626/JOK.2017.44.10.1071

With today"s complex networks, asset identification of network devices is becoming an important issue in management and security. Because these assets are connected to the network, it is also important to identify the network structure and to verify the location and connection status of each asset. This can be used to identify vulnerabilities in the network architecture and find solutions to minimize these vulnerabilities. However, in an IoT(Internet of Things) network with a small amount of resources, the Traceroute packets sent by the monitors may overload the IoT devices to determine the network structure. In this paper, we describe how we improved the existing the well-known double-tree algorithm to effectively reduce the load on the network of IoT devices. To balance the load, this paper proposes a new destination-matching algorithm and attempts to search for the path that does not overlap the current search path statistically. This balances the load on the network and additionally balances the monitor"s resource usage.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr