• Title/Summary/Keyword: Network traffic data

Search Result 1,552, Processing Time 0.03 seconds

A Study of Protocol comparison Analysis for MPLS Traffic Engineering (MPLS 트래픽 엔지니어링을 위한 프로토콜 비교 분석에 관한 연구)

  • Ha, Yun-Sik;Kim, Dong-Il;Choi, Sam-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.105-108
    • /
    • 2005
  • To support abruptly increasing data traffic in these days. network management is needed. And also to maintain the steady infra, there is MPLS need which can support traffic engineering. It's necessary that MPLS doesn't only manage network to support recently booming data traffic, but has capacity to support traffic engineering to keep static infrastructure. Traffic engineering, method that a large-scale user shifts traffic to the beforehand designated routes that pass through specific nodes on network, is operation that is mapping traffic flow to the physical network topology. In this paper, we supplement the defect of the traditional RSVP traffic engineering and to construct far more steady infra, we suggest the way of its development of ERSVP signaling protocol.

  • PDF

Privacy Preserving Sequential Patterns Mining for Network Traffic Data (사이트의 접속 정보 유출이 없는 네트워크 트래픽 데이타에 대한 순차 패턴 마이닝)

  • Kim, Seung-Woo;Park, Sang-Hyun;Won, Jung-Im
    • Journal of KIISE:Databases
    • /
    • v.33 no.7
    • /
    • pp.741-753
    • /
    • 2006
  • As the total amount of traffic data in network has been growing at an alarming rate, many researches to mine traffic data with the purpose of getting useful information are currently being performed. However, network users' privacy can be compromised during the mining process. In this paper, we propose an efficient and practical privacy preserving sequential pattern mining method on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model and the retention replacement technique. In addition, our method accelerates the overall mining process by maintaining the meta tables so as to quickly determine whether candidate patterns have ever occurred. The various experiments with real network traffic data revealed tile efficiency of the proposed method.

Traffic Signal Control System using Ubiquitous (유비쿼터스를 이용한 교통제어시스템)

  • Jin, Hyun Soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.501-504
    • /
    • 2004
  • Straight traffic signal information is understanded by roation traffic signal.Ten traffic rotation street flew system saturated without forseed quantaty of traffic vehicle and length oftraffic street.Optimul traffic signal forcasting is needed departmemtstore sale season. for solution of this problem, at least before 10 hour traffic quantity reported policy department.For traffic forcasting of traffic jamed building pushed vehicle, neural network method is adapted Single traffic network is more needed to through traffic signal compared of traffic network. traffic network system is first analysed for artificial traffic network system and networked traffic systen is constructed by ubiquatous.

  • PDF

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

Traffic Extraction and Verification for Attack Detection Experimentation (공격탐지 실험을 위한 네트워크 트래픽 추출 및 검증)

  • Park, In-Sung;Lee, Eun-Young;Oh, Hyung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.49-57
    • /
    • 2006
  • Firewall to block a network access of unauthorized IP system and IDS (Intrusion Detection System) to detect malicious code pattern to be known consisted the main current of the information security system at the past. But, with rapid growth the diffusion speed and damage of malicious code like the worm, study of the unknown attack traffic is processed actively. One of such method is detection technique using traffic statistics information on the network viewpoint not to be an individual system. But, it is very difficult but to reserve traffic raw data or statistics information. Therefore, we present extraction technique of a network traffic Raw data and a statistics information like the time series. Also, We confirm the validity of a mixing traffic and show the evidence which is suitable to the experiment.

  • PDF

Traffic Summary for Analyzing Network Load in Mobile Communication System (이동통신 망 부하 해석을 위한 대표통화량의 설정)

  • Lee, Y.D.;Koh, S.G.;Ahn, B.J.
    • The Korean Journal of Applied Statistics
    • /
    • v.19 no.3
    • /
    • pp.379-393
    • /
    • 2006
  • In this paper, we propose a method to summarize the monthly traffic amount for analyzing network load in mobile communication system. We used the traffic data obtained from a domestic telecommunication company. Based on the statistical properties of the traffic data, we devise an efficient method to summarize monthly traffic amount.

Self-similarity of SMS Traffic (SMS 트래픽의 Self-similarity)

  • Ha, Jun;Shin, Woo-Cheol;Park, Jin-Kyung;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.353-356
    • /
    • 2003
  • As the wireless mobile telecommunication system has been developed with astonishment, its offering service has also widely been expanded including various data service. Currently, the wireless mobile telecommunication network presents voice service that covers for the most part of the whole service areas. For this reason, the availability of the switching capacity in the mobile switching center(MSC) is manipulated by the required volume of voice service. However, considering the increase of data service, it is desirable for the current switching method to be modified for more efficiency. In this Paper, we analyze the data traffic caused by providing data service in the wireless mobile telecommunication network. For this, we are firstly going to review the result of the analysis in the feature of the data traffic. Secondly, based on the review, we are also going to perform analyzing the other feature of the data traffic normally generated in the wireless mobile telecommunication network. We expect that this paper would be utilized as an elementary source for the feature of the SMS data .traffic and it will be an honour for ourselves to work on it.

  • PDF

A Data Caching Management Scheme for NDN (데이터 이름 기반 네트워킹의 데이터 캐싱 관리 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.291-299
    • /
    • 2016
  • To enhance network efficiency, named-data networking (NDN) implements data caching functionality on intermediate network nodes, and then the nodes directly respond to request messages for cached data. Through the processing of request messages in intermediate node, NDN can efficiently reduce the amount of network traffic, also solve network congestion problems near data sources. Also, NDN provides a data authenticate mechanism so as to prevent various Internet accidents caused from the absence of an authentication mechanism. Hence, through applying NDN to various smart IT convergence services, it is expected to efficiently control the explosive growth of network traffic as well as to provide more secure services. Basically, it is important factors of NDN which data is cached and where nodes caching data is located in a network topology. This paper first analyzes previous works caching content based on the popularity of the content. Then ii investigates the hitting rate of caches in each node of a network topology, and then propose an improved caching scheme based on the result of the analyzation. Finally, it evaluates the performance of the proposal.

The Performance Analysis of Mobile Data Traffic Offload using LIPA in Femtocell Networks (펨토셀 네트워크에서 LIPA를 이용한 모바일 데이터 트래픽 오프로드 성능 분석)

  • Kim, Se-Jin;Bae, Sang-Hyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.16-22
    • /
    • 2017
  • In this paper, we first introduce a mobile data traffic offload method called Local IP Access (LIPA) with femtocell networks. Then, we evaluate the traffic transmission time and probability of mobile data traffic that is transmitted to the core network (CN) when mobile devices transmit the mobile data traffic to indoor devices in three different scenarios, i.e., conventional systems, femtocell based systems, and femtocell and LIPA based systems. Through performance results, it is shown that the next generation mobile network with the femtocell and LIPA not only decrease the density of the mobile data traffic in CNs but also reduce the total transmission time of the mobile data traffic in indoor environments. That is, for the traffic transmission time, the conventional systems and femtocell based systems have 3 and 4 times higher than the femtocell and LIPA based systems, respectively, when the Internet delay is 10ms while 14 and 26 times higher than that, respectively, when the Internet delay is 100ms.

Measurement based Traffic Generator for Network Game (트래픽 측정에 기반한 네트워크 게임 트래픽 생성기)

  • Eunsil Hong;Jaecheol Kim;Yanghee Choi
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.49-51
    • /
    • 2003
  • Developers of network games have used several prediction techniques for hiding transmission delay to support the real­time requirement of network games. Nowadays many researches that are related with network game are in progress to solve delay problems more radically, such as to propose new routers architecture and transport protocols suitable to characteristics of network game traffic. So for these advanced researches the tasks to grasp the traffic characteristics of a network game are needed. In this paper we aimed to capture the traffic of MMORPG and present the statistical analysis of measured data. The measurement and the analysis were accomplished with the server of 'Lineage' that regarded as the most successful MMORPG. Next, we have implemented a traffic generator that reflects the characteristics of MMORPG and shown that the trace generated by MMORPG traffic generator had identical characteristics with actual traffic using statistical testing method. We expect that this traffic generator can be used in many researches related with a network game.

  • PDF