• Title/Summary/Keyword: Real Time Traffic

Search Result 1,595, Processing Time 0.026 seconds

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

Development of Houses for Information Society through the Interpretation and Application of the Korean Traditional Houses (안채, 사랑채의 재해석을 통한 직주통합형(職住統合型) 주거(住居) 유형(類型) 개발(開發)에 관한 연구(硏究))

  • Kim, Jong-Heon
    • Journal of architectural history
    • /
    • v.11 no.1 s.29
    • /
    • pp.21-32
    • /
    • 2002
  • Until now, we have a great progress in computer hardwares and computer softwares. Many people think these days as the information time or information society. Even though, we make a great progress in the computer science, we can not regard this society as the information society, if we do not accept the development of computer in our real life. In order to provide desirable residential environment for the information - society, it is necessary to review previous housing projects from the Industrial - Revolution to these days. Thus this study deals with limits of modern housings. This research also suggests a new housing concept for the information - society by reinterpretation of the Korean traditional houses. Use of space in the Korean traditional houses was mostly interpreted by the concept of sexual discrimination from Confucianism. However it is suggested in this study, that An-Chae is a home space for providing privacy of family and Sarang - Chae is a social space for providing social activity. Thus it is found that the Korean traditional house has been used as office as well as home. In this view, it is suggested that Korean traditional houses be the prototype of future house as a business space and also as a home space. In this study, 3 types of housing for the information - society are suggested; flat type, tower type and skip floor type. these houses have two entrances independently for the home space and the social space. Therefore each space has no interference with each other. Then one can do his own at home efficiently. He does not have to go to his office in downtown. One can relieve traffic congestions in the city and reduce air contamination.

  • PDF

A Study on the Evaluation of the Service Quality of Port-MIS (항만운영정보시스템(Port-MIS) 서비스 품질 평가에 관한 연구)

  • Kim, Minjin;Shin, Seungsik
    • Journal of Korea Port Economic Association
    • /
    • v.29 no.2
    • /
    • pp.211-238
    • /
    • 2013
  • The Port Logistics Information System (Port-MIS) is the system that processes all of port management such as entry and departure of ships, using facilities within ports, port traffic control, cargo entering and carrying and tax collection in 31 trade ports over the whole country. Lately, The Port Logistics Information System (Port-MIS) has been reformed as a WEB-based system and established basis to provide real time information support structure, diversification of civil complaint system, and optimized civil complaint service by using wire and wireless internet. The typical study on the Port Logistics Information System was C/S program and EDI-centered. But it has significance to study on service quality measurement of WEB Port-MIS that has been served as a new web-based platform since April 2010, for there was no such a study until now.

A Study on the Predictive Model of Propagation Path Loss in Millimeter-Wave Band (밀리미터파 대역에서 전파경로손실 예측 모델)

  • Kim, Song-Min
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.2
    • /
    • pp.23-28
    • /
    • 2005
  • This study was to suggest the propagation path loss and predictive model of propagation path analysis in order to apply the frequency in the millimeter-wave band to the real time inter-vehicle communication system. This study was to suppose the case of inter-vehicle communication on the one-way two-lanes road in the big cites with a lot of traffic jams in order to analyze the effect by the reflected wave of multipath. As a simulation of suggested model, it found out that the propagation path by the reflected wave was about 0.1[m]$\sim$5.1[m] longer than the one by the direct wave during the transmission of 100[m] wave direct path. Also, as a result of comparing the propagation path loss, the loss would be about -0.8[dB]$\sim$-4.2[dB] larger in case of wall reflection and -0.8[dB]$\sim$-1[dB] vehicle reflection. From the result above, this researcher found out that the path loss of reflected wave produced by the walls was about -3.2[dB] larger than the path loss produced by the adjacent vehicles.

The Research about Analyzing the Charging Pattern using the Electric Vehicle Running Feature Simulation (전기자동차 운행특성 모의를 통한 충전패턴 분석에 관한 연구)

  • Lim, You Seok;Bang, Chang Hyun;Han, Seung Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.205-214
    • /
    • 2013
  • In this paper, we analyzed the various EV charging-infra information(charging status, charging pattern, charging rate, charging fee, etc.) through the charging infra simulator which would be of help to effectively construct the EV charging infrastructure. The proposed simulator virtually made the EV motoring pattern referred to TMS(Traffic Monitoring System) & Ministry of Land, Transport and Maritime Affairs, and analyzed the charging-infra information(amount of charging, accumulated charging fee, etc.) based on vehicle types, charging type, time and days using EV charging-fee list noticed by KEPCO. Through this simulator, we deducted some considerable contents to build the EV charging infrastructure similarly with real environment.

An Efficient Authentication Protocol for GPS Information Exchange between Cars Using the Base Station (기지국을 이용한 차량간 GPS 정보 교환을 위한 효율적인 인증 프로토콜)

  • Cho, KookRae;Son, Jong-Wuk;Cho, HuiSup
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.118-127
    • /
    • 2010
  • Inter-vehicle communication is one of the most important parts in Intelligent Vehicle System. Through this communication, drivers can recognize what is happening out of their sights, such as the freezing condition of the street, traffic accidents, and so on. Each car in IVS gives various services to the drivers after analyzing those received information from cars or a base station. If the message is, however, exchanged from car to car directly, the computation cost which is needed for all the car to authenticate the transmitted message between nearby cars is tremendously high. Therefore, one can naturally think that the message communication between cars is performed with the help of the base station to reduce the computation cost. In this case where the base station collects all the information transmitted from cars and broadcasts them nearby, there should be an efficient way both for the base station to authenticate the car message within its communication range and for the car to authenticate the information received from the base station. In this paper, we present a two-way authentication protocol using a hash chain to efficiently exchange GPS information between a car and a base station. This information can be used to provide a driver with the navigation which displays all the moving cars around him in real time. When a car goes into an area of a base station, the car authenticates itself to the base station using its private key of PKI, sends a commitment of a hash chain, then starts to send a message with the hash value for authentication. The message includes GPS information, driver's status and so on. The base station also authenticates itself to the nearby cars using its private key, transmits the commitment of the hash chain, and sends all the messages gathered from cars with authentication information.

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

The Development of Kernel-based Monitoring System for Grid Application (커널 기반 그리드 응용 모니터링 시스템의 개발)

  • Kim Tae-Kyung;Kim Dong-Su;Byeon Ok-Hwan;Chung Tai M.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.821-828
    • /
    • 2004
  • To analyze the usage information of system and network resources to the each grid application by measuring the real time traffic and calculating the statistic information, we suggested the kernel-based monitoring methods by researching the efficient monitoring method. This method use small system resourcesand measure the monitoring information accurately with less delay than the usual packet capture methods such as tcpdump. Also we implemented the monitoring systems which can monitor the used resources of system and network for grid application using the suggested kernel-based monitoring method. This research can give the useful information to the development of grid application and to grid network scheduler which can assign the proper resources to the grid application to perform efficiently. Network administrator can decide whether the expansion of network is required or not using the monitoring information.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

An Enhanced Fast Handover Scheme for Real-Time Traffic in IPv6 Based WiBro Network (IPv6기반 와이브로 시스템에서 실시간 트래픽을 위한 개선된 빠른 핸드오버 방안)

  • Jeong, Seok-Jong;Lee, Sung-Kuen;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.377-386
    • /
    • 2008
  • In this paper, a new handover management scheme has been proposed to reduce handover latency and to support fast handover without packet losses, so that it may be applicable to the wireless mobile Internet system such as IPv6-based WiBro system. To minimize the handover latency in processing of movement detection, we propose the handover management scheme which simplifies the handover message exchanging procedure between mobile subscriber station (MSS) and network by integrating layer 2 and layer 3 handovers efficiently based on the layer2 information. To reduce the processing delay from new care-of-address (NCoA) configuration during handover, we propose that NCoA is created, distributed and managed by new access control router (NACR). In addition, in order to minimize the packet transmission delay and eliminate the packet losses, the proposed scheme employs a crossover router (CR) which is upper network located over PACR and NACR and employs the packet buffering for MSS. The simulation study shows that the proposed scheme achieves loss-free packet delivery and low latency in the environment of narrow overlapped cell area or high velocity of the MSS, comparing the performance with the conventional schemes.