• Title/Summary/Keyword: abnormal traffic

Search Result 141, Processing Time 0.024 seconds

Our Experience with Surgically Treated Epidural Hematomas in Children

  • Jung, Sang-Won;Kim, Dong-Won
    • Journal of Korean Neurosurgical Society
    • /
    • v.51 no.4
    • /
    • pp.215-218
    • /
    • 2012
  • Objective: Traumatic epidural hematomas (EDHs) in children are a relatively unusual occurrence. The cause and outcome vary depending on period and reg ion of study. The aims of this analysis were to review the cause and outcome of pediatric EDHs nowadays and to discuss outcome-related variables in a large consecutive series of surgically treated EDH in children. Methods: This is a retrospective review of 29 patients with surgically treated EDHs between Jan 2000 and February 2010. Patients' medical records, computed tomographic (Cl) scans, and, if performed, magnetic resonance imaging (MRI) were reviewed to define variables associated with outcome. Variables included in the analysis were age, associated severe intracranial injury, abnormal pupillary response, hematoma thickness, severity of head injury (Glasgow Coma Scale score), parenchymal brain injury, and diffuse axonal injury. Results: The mean (SO) age of the patients was 109 months (0-185 months). Most of the injuries with EDHs occurred in traffic accident (14 cases, 48.2%) and followed by slip down in 6 cases and falls in 6 cases. There were one birth injury and one unknown cause. EDHs in traffic accidents occurred in pedestrians hit by a motor vehicle, 9 cases; motorbike and car accidents, 5 cases and bicycle accidents, 1 case. The locations of hematoma were almost same in both sides (left side in 15 cases). Temporal lobe is the most common site of hematomas (13 cases, 44%). The mean size of the EDHs was 18 mm (range, 5-40 mm). Heterogeneous hematomas in CT scans were 20 cases (67%). Two patients were referred with unilateral or bilateral dilated pupil(s). There was enlargement of EDH in 5 patients (17%). All of them were heterogeneous hematomas in CT scans. Except for 4 patients, all EDHs were associated with skull fracture(s) (87%). There was no case of patient with major organ injury. CT or MRI revealed brain contusion in 5 patients, and diffuse axonal injury in one patient The mortality was zero, and the outcomes were excellent in 26 and good in 2 patients. None of the tested variables were found to have a prognostic relevance. Conclusion: Regardless of the EDH size, the clinical status of the patients, the abnormal pupillary findings, or the cause of injury, the outcome and prognosis of the patients with EDH were excellent.

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

Application of Hydrated Lime-Modified Asphalt Mixture Properties to Korean Pavement Research Program (한국형 도로포장 설계 프로그램의 소석회 사용 아스팔트 혼합물 특성 적용)

  • Kim, Dowan;Lee, Sangyum;Mun, Sungho
    • International Journal of Highway Engineering
    • /
    • v.17 no.4
    • /
    • pp.69-75
    • /
    • 2015
  • PURPOSES : The hydrated lime-modified asphalt, which improves moisture resistance, is normally used for pavements to reduce the number of potholes. However, the method of applying the material properties of the lime-modified asphalt mixture for use in pavements is not covered in the Korean Pavement Research Program (KPRP). The objective of this research is to find a method for the design application of lime-modified asphalt's material properties to the KPRP. METHODS: The section for test design is selected in some conditions which are related to the level of design regarding Annual Average Daily Traffic (AADT). To define the application methods of hydrated lime in the KPRP, the models of fatigue, rut and international roughness index (IRI) are determined based on the M-EPDG test results from some earlier research results. Moreover, it is well known that dynamic moduli of the unmodified mixture are not different from those of the lime-modified mixture. RESULTS: The performance results of hydrated lime-modified asphalt pavement were not very much different from those of the unmodified pavement, which meant the limited design regulations regarding fatigue failure, rutting deformation and IRI. CONCLUSIONS: The KPRP uses the weather model from the data for previous 10 years. It implies that the KPRP cannot predict abnormal climate changes accurately. Hence, the predictive weather data regarding the abnormal climate changes are unreliable. Secondly, the KPRP cannot apply the moisture resistance of asphalt mixtures. Therefore, a second level of design study will have to be performed to reflect the influence of moisture. It means that the influence on pavement performance can be changed by the application of hydrated lime in asphalt mixture design.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

Cable anomaly detection driven by spatiotemporal correlation dissimilarity measurements of bridge grouped cable forces

  • Dong-Hui, Yang;Hai-Lun, Gu;Ting-Hua, Yi;Zhan-Jun, Wu
    • Smart Structures and Systems
    • /
    • v.30 no.6
    • /
    • pp.661-671
    • /
    • 2022
  • Stayed cables are the key components for transmitting loads in cable-stayed bridges. Therefore, it is very important to evaluate the cable force condition to ensure bridge safety. An online condition assessment and anomaly localization method is proposed for cables based on the spatiotemporal correlation of grouped cable forces. First, an anomaly sensitive feature index is obtained based on the distribution characteristics of grouped cable forces. Second, an adaptive anomaly detection method based on the k-nearest neighbor rule is used to perform dissimilarity measurements on the extracted feature index, and such a method can effectively remove the interference of environment factors and vehicle loads on online condition assessment of the grouped cable forces. Furthermore, an online anomaly isolation and localization method for stay cables is established, and the complete decomposition contributions method is used to decompose the feature matrix of the grouped cable forces and build an anomaly isolation index. Finally, case studies were carried out to validate the proposed method using an in-service cable-stayed bridge equipped with a structural health monitoring system. The results show that the proposed approach is sensitive to the abnormal distribution of grouped cable forces and is robust to the influence of interference factors. In addition, the proposed approach can also localize the cables with abnormal cable forces online, which can be successfully applied to the field monitoring of cables for cable-stayed bridges.

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

Design of Defence Mechanism against DDoS Attacks in NCP-based Broadband Convergence Networks (NCP 기반의 광대역 융합 망에서 DDoS 공격 대응 기법 설계)

  • Han, Kyeong-Eun;Yang, Won-Hyuk;Yoo, Kyung-Min;Yoo, Jae-Young;Kim, Young-Sun;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.8-19
    • /
    • 2010
  • In this paper, we propose the NCP (Network Control Platform)-based defense mechanism against DDoS (Distributed Denial of Service) attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. We also define defense modules, the threshold and packet drop-rate used for the response against DDoS attacks. NCP analyzes whether DDoS attacks are occurred or not based on the flow and queue information collected from SR (Source Router) and VR (Victim Router). Attack packets are dopped according to drop rate decided from NCP. The performance is simulated using OPNET and evaluated in terms of the queue size of both SR and VR, the transmitted volumes of legitimate and attack packets at SR.

Outlier Filtering and Missing Data Imputation Algorithm using TCS Data (TCS데이터를 이용한 이상치제거 및 결측보정 알고리즘 개발)

  • Do, Myung-Sik;Lee, Hyang-Mee;NamKoong, Seong
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.241-250
    • /
    • 2008
  • With the ever-growing amount of traffic, there is an increasing need for good quality travel time information. Various existing outlier filtering and missing data imputation algorithms using AVI data for interrupted and uninterrupted traffic flow have been proposed. This paper is devoted to development of an outlier filtering and missing data imputation algorithm by using Toll Collection System (TCS) data. TCS travel time data collected from August to September 2007 were employed. Travel time data from TCS are made out of records of every passing vehicle; these data have potential for providing real-time travel time information. However, the authors found that as the distance between entry tollgates and exit tollgates increases, the variance of travel time also increases. Also, time gaps appeared in the case of long distances between tollgates. Finally, the authors propose a new method for making representative values after removal of abnormal and "noise" data and after analyzing existing methods. The proposed algorithm is effective.

Development of a Real-Time Video Image Tracking Algorithm for Incident Detection

  • Oh, Ju-Taek;Min, Joon-Young;Heo, Byung-Do;Kim, Myung-Seob
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.49-60
    • /
    • 2008
  • The current VIPS are not effective in safety point of view, because they are originally developed for mimicking loop detectors. Therefore, it is important to identify vehicle trajectories in real time, because recognizing vehicle movements over a detection zone enables to identify which situations are hazardous, and what causes them to be hazardous. In order to improve limited safety functions of the current VIPS, this research has developed a computer vision system of monitoring individual vehicle trajectories based on image processing, and offer the detailed information, for example, incident detection and conflict as well as traffic information via tracking image detectors. This system is capable of recognizing individual vehicle maneuvers and increasing the effectiveness of various traffic situations. Experiments were conducted for measuring the cases of incident detection and abnormal vehicle trajectory with rapid lane change.

  • PDF