• Title/Summary/Keyword: internet traffic data

Search Result 601, Processing Time 0.025 seconds

Automatic Payload Signature Generation System (페이로드 시그니쳐 자동 생성 시스템)

  • Park, Cheol-Shin;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.615-622
    • /
    • 2013
  • Fast and accurate signature extraction is essential to improve the performance of the payload signature-based traffic analysis methods. However the slow manual process in extracting signatures make difficult to deal with the rapidly changing application in current Internet environment. Therefore, in this paper we propose a system automatically generating signatures from ground-truth traffic data. In addition, we improve the efficiency of signature extraction by recognizing the application protocol using a protocol filters and generating signatures automatically according to the application-specific protocol contents. In order to verify the validity of the system proposed in this paper, we compared the signatures automatically generated from our system with the signatures manually created for a few popular applications.

A Study on the Optimal All-IP Network Design for Adopting IPTV Traffic (All-IP 네트워크에서 IPTV 트래픽 수용을 위한 최적의 설계 방안 연구)

  • Kim, Hyoung-Soo;Cho, Sung-Soo;Seol, Soon-Uk;Jun, Yun-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.68-71
    • /
    • 2009
  • All-IP network requires change of the existing IP network engineering methods as the convergence service market between communication and broadcasting industries using IP network is growing rapidly. Especially the video services like IPTV require more strict transmission quality and higher bandwidth than the existing data services. So it is difficult to design All-IP network by the over-provisioning method which used to be used for the existing IP network design. It also requires a heavy investment which becomes one of big obstacles to the IPTV service expansion. In order to reduce the investment costs, it is required to design an optimized network by maximizing the utilization of the network resources and at the same time maintaining the customer satisfaction in terms of service quality. In this paper, we first analyze the effects of IPTV traffic on the existing internet. Then we compare two traffic engineering technologies, which are dimensioning without admission control and dimensioning with admission control, on the All-IP network design by simulation. Finally, we suggest cost effectiveness of traffic engineering technologies for designing the All-IP network.

  • PDF

A Convergence of Realtime Traffic Shaping and IPS on Small Integrated Security Router (소형 통합보안라우터의 실시간 트래픽쉐이핑과 IPS의 융합)

  • Kim, Doan;Song, Hyunok;Lee, Sungok;Yang, Seungeui;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.454-455
    • /
    • 2019
  • IDC is a server-based facility with a stable line and power supply facility that manages 20 to 30 servers in an efficiently separated rack-level subnetwork. Here, we need a way to efficiently manage servers security, firewall, and traffic on a rack-by-rack basis. If three or five kinds of commercial equipment are adopted to support this, it may be a great burden to the management cost as well as the introduction cost. Therefore, in this paper, we propose a method to implement the five functions in one rack-unit small integrated security router. In particular, IDC intends to integrate traffic shaping and IPS, which are essential technologies, and to propose the utility accordingly.

  • PDF

An Implementation of Internet Real-Time Protocol for Satellite Multimedia Access Networks (위성 멀티미디어 액세스망에서 인터넷 실시간 전달 프로토콜 구현)

  • 이계상;진광자;안재영;오덕길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.216-219
    • /
    • 2000
  • Recently, with the advent of satellite communication technologies, network access services through satellites have emerged as an alternaive to existing access network services. Of satellite access services including multimedia services, the high speed internet access service will be one of the important services. Particularly, the efficient transportation of real time internet traffic seems very essential. The aim of this research is to examine the applicability of the IETF RTP protocol in the satellite access network. The RTP has been developed for the QoS-met tranportation protocol of real time traffic over the existing best-effort internet. This paper summmarizes the RW protocol, and desciribes the architecture and the data structure of the implementation of the RTP.

  • PDF

A Malicious Traffic Detection Method Using X-means Clustering (X-means 클러스터링을 이용한 악성 트래픽 탐지 방법)

  • Han, Myoungji;Lim, Jihyuk;Choi, Junyong;Kim, Hyunjoon;Seo, Jungjoo;Yu, Cheol;Kim, Sung-Ryul;Park, Kunsoo
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.617-624
    • /
    • 2014
  • Malicious traffic, such as DDoS attack and botnet communications, refers to traffic that is generated for the purpose of disturbing internet networks or harming certain networks, servers, or hosts. As malicious traffic has been constantly evolving in terms of both quality and quantity, there have been many researches fighting against it. In this paper, we propose an effective malicious traffic detection method that exploits the X-means clustering algorithm. We also suggest how to analyze statistical characteristics of malicious traffic and to define metrics that are used when clustering. Finally, we verify effectiveness of our method by experiments with two released traffic data.

A Practical Unacknowledged Unicast Transmission in IEEE 802.11 Networks

  • Yang, Hyun;Yun, Jin-Seok;Oh, Jun-Seok;Park, Chang-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.3
    • /
    • pp.523-541
    • /
    • 2011
  • In current IEEE 802.11 wireless LAN, every unicast transmission requires an ACK from the receiver for reliability, though it consumes energy and bandwidth. There have been studies to remove or reduce ACK overhead, especially for energy efficiency. However none of them are practically used now. This paper introduces a noble method of selective unacknowledged transmission, where skipping an ACK is dynamically decided frame by frame. Utilizing the fact that a multicast frame is transmitted without accompanying an ACK in 802.11, the basic unacknowledged transmission is achieved simply by transforming the destination address of a frame to a multicast address. Since removing ACK is inherently more efficient but less strict, its practical profit is dependent on traffic characteristics of a frame as well as network error conditions. To figure out the selective conditions, energy and performance implications of unacknowledged transmission have been explored. Extensive experiments show that energy consumption is almost always reduced, but performance may be dropped especially when TCP exchanges long data with a long distance node through a poor wireless link. An experiment with a well-known traffic model shows that selective unacknowledged transmission gives energy saving with comparable performance.

Vehicle trajectory prediction based on Hidden Markov Model

  • Ye, Ning;Zhang, Yingya;Wang, Ruchuan;Malekian, Reza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3150-3170
    • /
    • 2016
  • In Intelligent Transportation Systems (ITS), logistics distribution and mobile e-commerce, the real-time, accurate and reliable vehicle trajectory prediction has significant application value. Vehicle trajectory prediction can not only provide accurate location-based services, but also can monitor and predict traffic situation in advance, and then further recommend the optimal route for users. In this paper, firstly, we mine the double layers of hidden states of vehicle historical trajectories, and then determine the parameters of HMM (hidden Markov model) by historical data. Secondly, we adopt Viterbi algorithm to seek the double layers hidden states sequences corresponding to the just driven trajectory. Finally, we propose a new algorithm (DHMTP) for vehicle trajectory prediction based on the hidden Markov model of double layers hidden states, and predict the nearest neighbor unit of location information of the next k stages. The experimental results demonstrate that the prediction accuracy of the proposed algorithm is increased by 18.3% compared with TPMO algorithm and increased by 23.1% compared with Naive algorithm in aspect of predicting the next k phases' trajectories, especially when traffic flow is greater, such as this time from weekday morning to evening. Moreover, the time performance of DHMTP algorithm is also clearly improved compared with TPMO algorithm.

An Efficient Downlink MAC Protocol for Multi-User MIMO WLANs

  • Liu, Kui;Li, Changle;Guo, Chao;Chen, Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4242-4263
    • /
    • 2017
  • Multi-User Multiple-Input Multiple-Output (MU-MIMO) technology has recently attracted significant attention from academia and industry because of it is increasingly important role in improving networks' capacity and data rate. Moreover, MU-MIMO systems for the Fifth Generation (5G) have already been researched. High Quality of Service (QoS) and efficient operations at the Medium Access Control (MAC) layer have become key requirements. In this paper, we propose a downlink MU-MIMO MAC protocol based on adaptive Channel State Information (CSI) feedback (called MMM-A) for Wireless Local Area Networks (WLANs). A modified CSMA/CA mechanism using new frame formats is adopted in the proposed protocol. Specifically, the CSI is exchanged between stations (STAs) in an adaptive way, and a packet selection strategy which can guarantee a fairer QoS for scenarios with differentiated traffic is also included in the MMM-A protocol. We then derive the expressions of the throughput and access delay, and analyze the performance of the protocol. It is easy to find that the MMM-A protocol outperforms the commonly used protocols in terms of the saturated throughput and access delay through simulation and analysis results.

Performance Test of APIS, DELOS Algorithm using Paramics (Paramics를 이용한 APID, DELOS평가)

  • Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.61-66
    • /
    • 2013
  • The central core of the Traffic Management System is an Incident Management System. Whole approach has been component-orientated, with a secondary emphasis being placed on the traffic characteristics at the sites. The first action taken during the development process was the selection of the required data for each components within the existing infrastructure of Algeria freeway system. After review and analysis of existing incident detection methodologies, Paramics was utilized to test the performance of APID, DELOS algorithms. The existing system of Algeria freeway was tested in a different configuration at different sections of freeway, thereby increasing the validity and scope of the overall findings. The incident detection module has been performed according to predefined system validation specifications. The Paramics simulation was done with the use of synchronous analysis, thereby providing a means for testing the incident detection module.

Optical Components for High Speed Optical Communications (대용량 광통신 부품 기술 동향)

  • Baek, Yongsoon
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.6
    • /
    • pp.297-310
    • /
    • 2013
  • With the explosive growth of internet data traffic due to the FTTH penetration, prevalence of smart devices and cloud network service, the demand for higher bandwidth is ever increasing with the pace of more than 40% annual growth. To accommodate ultra high bandwidth traffic, optical components in each hierarchy have progressed rapidly. WDM has begun to be deployed along with higher bandwidth service in the access network. Next-generation ROADM is under development for efficient network management in the metro network. For long-haul transmission, an advanced modulation scheme based on coherent transmission technology has been adopted to enhance spectral efficiency. In this paper, core components to meet the demands of high speed, high efficiency and low power consumption will be reviewed.