• Title/Summary/Keyword: Internet Traffic

Search Result 1,626, Processing Time 0.07 seconds

Functional and Process Model for Traffic Engineering in Multimedia Internet (멀티미디어 인터넷 망에서의 트래픽 엔지니어링을 위한 기능 및 프로세스 모델)

  • 장희선;김경수;신현철
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.9-17
    • /
    • 2002
  • Traffic engineering function consists of traffic management, capacity management and network planning. In this paper, we present the requirements for each functional traffic management, and also present functional and process model to efficiently to handle the traffic engineering for multimedia internet services. Finally, the traffic management methods for each step are described in detail.

  • PDF

A Study on the Quality Monitoring and Prediction of OTT Traffic in ISP (ISP의 OTT 트래픽 품질모니터링과 예측에 관한 연구)

  • Nam, Chang-Sup
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2021
  • This paper used big data and artificial intelligence technology to predict the rapidly increasing internet traffic. There have been various studies on traffic prediction in the past, but they have not been able to reflect the increasing factors that induce huge Internet traffic such as smartphones and streaming in recent years. In addition, event-like factors such as the release of large-capacity popular games or the provision of new contents by OTT (Over the Top) operators are more difficult to predict in advance. Due to these characteristics, it was impossible for an ISP (Internet Service Provider) to reflect real-time service quality management or traffic forecasts in the network business environment with the existing method. Therefore, in this study, in order to solve this problem, an Internet traffic collection system was constructed that searches, discriminates and collects traffic data in real time, separate from the existing NMS. Through this, the flexibility and elasticity to automatically register the data of the collection target are secured, and real-time network quality monitoring is possible. In addition, a large amount of traffic data collected from the system was analyzed by machine learning (AI) to predict future traffic of OTT operators. Through this, more scientific and systematic prediction was possible, and in addition, it was possible to optimize the interworking between ISP operators and to secure the quality of large-scale OTT services.

Analysis of abnormal traffic controller based on prediction to improve network service survivability (네트워크 서비스의 생존성을 높이기 위한 예측기반 이상 트래픽 제어 방식 분석)

  • Kim Kwang sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.296-304
    • /
    • 2005
  • ATCoP(Abnormal traffic controller based on prediction) is presented to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. ATCoP is a method to control abnormal traffic that is entering into the network When unknown attack generates excessive traffic, service survivability is guaranteed by giving the priority to normal traffic than abnormal traffic, that is reserving some channels for normal traffic. If the reserved channel number increases, abnormal traffic has lower quality service by ATCoP system and then its service survivability becomes worse. As an analytic result, the proposed scheme maintains the blocking probability of normal traffic on the predefined level in the specific interval of input traffic.

A Study of Internet Worm Detection & Response Method Using Outbound Traffic (OutBound 트래픽을 이용한 인터넷 웜 탐지 및 대응 방안 연구)

  • Lee, Sang-Hun
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.75-82
    • /
    • 2006
  • Internet worm gives various while we paralyze the network and flow the information out damages. In this paper, I suggest the method to prevent this. This method detect internet worm in PC first. and present the method to do an automatic confrontation. This method detect a traffic foundation network scanning of internet worm which is the feature and accomplish the confrontation. This method stop the process to be infected at the internet worm and prevent that traffic is flowed out to the outside. and This method isolate the execution file to be infected at the internet worm and move at a specific location for organizing at the postmortem so that we could accomplish the investigation about internet worm. Such method is useful to the radiation detection indication and computation of unknown internet worm. therefore, Stable network operation is possible through this method.

  • PDF

An Empirical Study on the relevance of Web Traffic for Valuation of Internet Companies (인터넷 기업의 웹 트래픽 정보와 기업가치의 상관관계에 관한 실증연구)

  • Yi, Sung-Wook;Hwang, Seung-June
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.79-98
    • /
    • 2009
  • Web traffic is becoming an important indicator to make inferences about internet companies' future prospects so that traditional firm valuation methods need to be modified to integrate the ideas of web traffic information as a major asset of internet companies. It is because web traffic is a measure of attracting visitors to firm's web site and is the basis for internet companies' marketing expenditure and customer acquisition and retention. Also the web traffic represents the internet companies' technological advances and marketability. The major purpose of this study is to show the relevance of web traffic for valuation of internet companies. For this, we test hypothesis with the firm's web traffic and financial data using the analysis model of Hand(2000a) derived from the log-linear model introduced by Ye and Finn(1999). Test results show that the web traffic, more specifically the number of unique visitors, visits, and page views are all positively related to the firm's value. This implies that the web traffic information should be considered as one of the important non-financial indicator for the internet firm valuation.

  • PDF

Analysis of abnormal traffic controller deployed in Internet access point (인터넷 액세스점에서의 이상 트래픽 제어기 성능분석)

  • Kim Kwangsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.107-115
    • /
    • 2005
  • ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than $30{\%}.$ When traffic intended unknown attack occurs, network IDS is high false positive probability and so is limited to apply. In this environment, the ATC can be a key player to help the network node such as router to control abnormal traffic.

An Anomalous Host Detection Technique using Traffic Dispersion Graphs (트래픽 분산 그래프를 이용한 이상 호스트 탐지 기법)

  • Kim, Jung-Hyun;Won, You-Jip;Ahn, Soo-Han
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.69-79
    • /
    • 2009
  • Today's Internet is one of the necessaries of our life. Anomalies of the Internet provoke social problems. For that reason, Internet Measurement which studies characteristics on Internet traffic attracts pubic attention. Recently, Traffic Dispersion Graph (TDG), a novel traffic analysis method, was proposed. The TDG is not a statistical analysis method but a graphical visualization method on interactions among network components. In this paper, we propose a new anomaly detection paradigm and its technique using TDG. The existing studies have focused on detecting anomalous packets of flows. On the other hand, we focus on detecting the sources of anomalous traffic. To realize our paradigm, we designed the TDG Clustering method. Through this method, we could classify anomalous hosts infected by various worm viruses. We obtained normal traffic through dropping traffic of the anomalous hosts. Especially, we expect that the TDG clustering method can be applied to real-time anomaly detection because calculations of the method are fast.

Traffic Flow Sensing Using Wireless Signals

  • Duan, Xuting;Jiang, Hang;Tian, Daxin;Zhou, Jianshan;Zhou, Gang;E, Wenjuan;Sun, Yafu;Xia, Shudong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3858-3874
    • /
    • 2021
  • As an essential part of the urban transportation system, precise perception of the traffic flow parameters at the traffic signal intersection ensures traffic safety and fully improves the intersection's capacity. Traditional detection methods of road traffic flow parameter can be divided into the micro and the macro. The microscopic detection methods include geomagnetic induction coil technology, aerial detection technology based on the unmanned aerial vehicles (UAV) and camera video detection technology based on the fixed scene. The macroscopic detection methods include floating car data analysis technology. All the above methods have their advantages and disadvantages. Recently, indoor location methods based on wireless signals have attracted wide attention due to their applicability and low cost. This paper extends the wireless signal indoor location method to the outdoor intersection scene for traffic flow parameter estimation. In this paper, the detection scene is constructed at the intersection based on the received signal strength indication (RSSI) ranging technology extracted from the wireless signal. We extracted the RSSI data from the wireless signals sent to the road side unit (RSU) by the vehicle nodes, calibrated the RSSI ranging model, and finally obtained the traffic flow parameters of the intersection entrance road. We measured the average speed of traffic flow through multiple simulation experiments, the trajectory of traffic flow, and the spatiotemporal map at a single intersection inlet. Finally, we obtained the queue length of the inlet lane at the intersection. The simulation results of the experiment show that the RSSI ranging positioning method based on wireless signals can accurately estimate the traffic flow parameters at the intersection, which also provides a foundation for accurately estimating the traffic flow state in the future era of the Internet of Vehicles.

An Adaptive Proportional Integral Active Queue Management Algorithm based on Self-Similar Traffic Rate Estimation in WSN

  • Liu, Heng;Wang, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1946-1958
    • /
    • 2011
  • Wireless Sensor Network (WSN) is made up of a number of sensor nodes and base stations. Traffic flow in WSN appears self-similar due to its data delivery process, and this impacts queue length greatly and makes queuing delay worse. Active queue management can be designed to improve QoS performance for WSN. In this paper, we propose self-similar traffic rate estimating algorithm named Power-Law Moving Averaging (PLMA) to regulate packet marking probability. This algorithm improves the availability of the rate estimation algorithm under the self-similar traffic condition. Then, we propose an adaptive Proportional Integral algorithm (SSPI) based on the estimation of the Self-Similar traffic rate by PLMA. Simulation results show that SSPI can achieve lower queue length jitter and smaller setting time than PI.

Game Traffic Classification Using Statistical Characteristics at the Transport Layer

  • Han, Young-Tae;Park, Hong-Shik
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.22-32
    • /
    • 2010
  • The pervasive game environments have activated explosive growth of the Internet over recent decades. Thus, understanding Internet traffic characteristics and precise classification have become important issues in network management, resource provisioning, and game application development. Naturally, much attention has been given to analyzing and modeling game traffic. Little research, however, has been undertaken on the classification of game traffic. In this paper, we perform an interpretive traffic analysis of popular game applications at the transport layer and propose a new classification method based on a simple decision tree, called an alternative decision tree (ADT), which utilizes the statistical traffic characteristics of game applications. Experimental results show that ADT precisely classifies game traffic from other application traffic types with limited traffic features and a small number of packets, while maintaining low complexity by utilizing a simple decision tree.