• Title/Summary/Keyword: Internet Traffic

Search Result 1,640, Processing Time 0.038 seconds

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.

Improvement of Network Traffic Monitoring Performance by Extending SNMP Function

  • Youn Chun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.171-175
    • /
    • 2004
  • Network management for detail analysis can cause speed decline of application in case of lack band width by traffic increase of the explosive Internet. Because a manager requests MIB value for the desired objects to an agent by management policy, and then the agent responds to the manager. Such processes are repeated, so it can cause increase of network traffic. Specially, repetitious occurrence of sending-receiving information is very inefficient for a same object when a trend analysis of traffic is performed. In this paper, an efficient SNMP is proposed to add new PDUs into the existing SNMP in order to accept time function. Utilizing this PDU, it minimizes unnecessary sending-receiving message and collects information for trend management of network efficiently. This proposed SNMP is tested for compatibility with the existing SNMP and decreases amount of network traffic largely

  • PDF

Routing Algorithm for the Real-time Traffic Processing in the Internet (인터넷에서 실시간 트래픽 처리를 위한 라우팅 알고리즘)

  • 임철수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.181-181
    • /
    • 2000
  • We identified the performance problems of scheduling algorithms such as FCFS, and demonstrated the superiority of WFQ in terms of realtime performance measures. For this purpose, we presented the service scenario and performed the analysis for the delay bound and fairness which are required to support the realtime applications in the Internet.

  • PDF

Detection of Deterioration of Traffic Signal Controller Through Real-Time Monitoring (실시간 감시를 통한 교통신호제어기의 열화 감지)

  • Kim, Eun Y.;Jang, Joong S.;Oh, Bong S.;Park, Sang C.
    • Journal of Applied Reliability
    • /
    • v.18 no.2
    • /
    • pp.153-160
    • /
    • 2018
  • Purpose: A traffic signal controller needs to control and coordinate to ensure that traffic and pedestrians move as smoothly as possible. Since a traffic signal controller has a significant impact on the safety of vehicles and pedestrians, it is important to monitor the failure and deterioration of the traffic signal controller. The purpose of this paper is to propose an IoT (Internet of Things)-based monitoring system for a traffic signal controller. Methods: Every traffic signal controller has a nominal system trajectory specified when it is deployed. The proposed IoT-based monitoring system collects the system trajectory information through real-time monitoring. By comparing the nominal system trajectory and the monitored system trajectory, we are able to detect the failure and deterioration of the traffic signal controller. Conclusion: The proposed IoT-based monitoring system can contribute to the safety of vehicles and pedestrians by maximizing the availability of a traffic signal controller.

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

The Study on the Variable related to the Sexual Harassment among the Korean Adolescents (한국 청소년의 성희롱 관련요인에 대한 조사연구)

  • Kim Young-Hae;Lee Hwa-Za;Jung Eun-Soon;Kim Yi-Soon
    • Child Health Nursing Research
    • /
    • v.8 no.1
    • /
    • pp.77-85
    • /
    • 2002
  • Recently in Korea, the adolescents' sexual problems including sexual violence have increased, and those phenomena have escalated to be one of the major social issues. This study was conducted to identify the variables related to the sexual harassments of the Korean adolescents. The variables to which the subjects belong were gender, school grade, religion, extracurricular activity, amount of pocket money, school performance traffic mean to school, ownership of PC, internet contact frequency and place, contact to pornography, heterosexual friend, drinking, and smoking. The period of survey was from July 2000 to Dec. 2000. The subjects were 475 middle and high-schoolers in Busan and Kyung-Nam. The instrument to measure sexual harassments of the subjects was questionnaire. That was gained by modifying the three patterns(physical, verbal and visual) in the manual provide by the Ministry of Labor(1999). The degree of sexual harassments was measured by 4-point Likert scale. The collected data was analyzed with t-test and ANOVA by SPSS win(10.0). The findings were as follows ;1. The variables related to the physical harassment were gender, age, pocket money, perceived school performance, traffic means, contact to pornography, having heterosexual friend, experience of drinking and smoking.2. The variables related to the visual harassments were gender, age, perceived school performance, traffic mean, internet contact, contact to pornography, having heterosexual friend, experience of drinking & smoking.3. The variables related to the verbal harassments were gender, age, pocket money, perceived school performance, traffic mean, internet contact, contact to pornography, having heterosexual friend, and experience of drinking & smoking.

  • PDF

Performance Model and Analysis for Improving Efficient Packet Service of GGSN in CPRS Network (GPRS 망에서 GGSN 노드의 패킷 처리 향상을 위한 성능 모델 및 분석)

  • Kwak, Yong-Won;Min, Jae-Hong;Jeong, Young-Sic;Park, Wung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.826-834
    • /
    • 2002
  • Asynchronous third generation mobile communication system is able to service Packet Switching through adding GPRS Network to the second generation system GSM. Therefore, it is necessary to study packet traffic service of GGSN node which is due to perform gateway role that GPRS Network is enable to inter-connect with Internet in order to optimize the capability and performance of GGSN. In this paper, the Internet packet traffic model that it is arrived to GGSN node from the Internet is studied and In order to process the Inter traffic efficiently, performance analysis model in GGSN is proposed to optimize packet processing capability of each processor. In order to guarantee QoS requirement of the real time traffic Speech and Video, several scheduling algorithm is applied to performance model and each mechanism is compared with several performance parameters.

  • PDF

A study on the mobile Internet portal service types (무선인터넷 포털서비스의 유형과 유망 컨텐츠 분석 이동전화를 통한 무선인터넷을 중심으로)

  • 김주성;김태성;고석하
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.4
    • /
    • pp.151-164
    • /
    • 2002
  • This paper predicts how mobile Internet portal services will go ahead and what contents will be needed at the portal site. Mobile Internet interface needs to be concise and compressed because of the size of terminals Thus mobile internal service wants integrated portal service We study the service strategy for mobile internet portal Service according to the product life cycle Many Korean people who have used 'wired and fixed' Internet services and mobile phones want the mobile Internet portal to provide many attractive functions and high quality of service Thus we consider the current Korean mobile Internet service as the maturity phase of its life cycle The maturity phase needs the strategy of diversifying and focusing on, thus we recommend the hub portal model for Korean mobile Internet service, In this paper, we survey contents of mobile Internet portal service as a case study. With the result of the analysis, we present the promising contents as follows: video conference service, financial service, stock trading service, traffic information service, location map service, emergency rescue service, and so on.

  • PDF

Light-weight Defense Mechanisms for application layer DDoS Attacks in the Web Services (웹서비스 대상 경량화 된 응용계층 DDoS 공격 대응 메커니즘)

  • Lee, Tai-Jin;Im, Chae-Su;Im, Chae-Tae;Jung, Hyun-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.99-110
    • /
    • 2010
  • Recently, network based DDoS attacks have been changed into application layer DDoS attacks which are targeted at the web services. Specially, an attacker makes zombie PCs generate small traffic and its traffic pattern has been similar to the normal user's pattern. So, existing HTTP PPS based Threshold cannot defend the DDoS attacks effectively. In this paper, we displayed all the GET Flooding attack types and propose three DDoS attack defense mechanisms which are simple and very powerful. Proposed mechanisms can defend all the existing GET Flooding DDoS attacks and be deployed in the real environment immediately with little resource consumption.

A Research on The Real Time Video Traffic Transmission Mechanism in IP Based Mobile Networks (IP기반 이동네트워크에서 실시간 비디오 트래픽 전송 메카니즘에 관한 연구)

  • 강문식;이준호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.879-888
    • /
    • 2004
  • In this paper, we propose a real time QoS(Quality of Service) guaranteed transmission mechanism for MPEG video traffic at the congested node in IP based networks. Recent spread of the Internet has increased the demands of a real time multimedia service of the quality, Because the type of Internet services can, however, offer the best effort delivery strategies, it is difficult to treat all the types of traffic with differential COS (Class of Service). Most of all, the hierarchical coding method of MPEG data utilizes the reference frame for the motion prediction. The loss of the reference frames makes QoS of the video traffic degraded because the reference frame bit error causes the consecutive packet loss. Therefore we have studied the real time QoS guaranteed mechanism for video traffic by analyzing the previous methods. Computer simulation results show that the proposed scheme has better performance than the previous one.