• Title/Summary/Keyword: internet traffic data

Search Result 601, Processing Time 0.034 seconds

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

A Protocol Analyzer for SW based Multimedia Communication System (SIP 기반 멀티미디어 통신 시스템을 위한 프로토콜 분석기)

  • Jung In-hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.312-333
    • /
    • 2005
  • SIP(Session Initiation Protocol) has been proposed for session control protocol of Internet multimedia communication system like VoIP(Voice over IP). SIP has complicated session control steps to support various kinds of audio and video formats and to assure service quality of real time data communication. Up until now, existing protocol analyzers can not provide such detailed information of SIP based communication system. In this paper, therefore, we propose a new protocol analyzer as a tool that can analyze and diagnose SIP based multimedia communication system throughout the session initiation, data exchange and session change steps. The propose traffic analyzer, which is called STAT(SIP based Traffic Analysis Tool), Is implemented on Winder's environment so that it is generally usable and extensible. Since STAT analyze low level packets captured via Ethernet broadcasting property, it is able to provide session status and real time traffic monitoring information without any affection to the communication system. The STAT which is implemented in this paper. therefore, is expected to be a useful tool for developing and managing of a SIP based multimedia communication system.

Detection and Identification of Moving Objects at Busy Traffic Road based on YOLO v4 (YOLO v4 기반 혼잡도로에서의 움직이는 물체 검출 및 식별)

  • Li, Qiutan;Ding, Xilong;Wang, Xufei;Chen, Le;Son, Jinku;Song, Jeong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.141-148
    • /
    • 2021
  • In some intersections or busy traffic roads, there are more pedestrians in a specific period of time, and there are many traffic accidents caused by road congestion. Especially at the intersection where there are schools nearby, it is particularly important to protect the traffic safety of students in busy hours. In the past, when designing traffic lights, the safety of pedestrians was seldom taken into account, and the identification of motor vehicles and traffic optimization were mostly studied. How to keep the road smooth as far as possible under the premise of ensuring the safety of pedestrians, especially students, will be the key research direction of this paper. This paper will focus on person, motorcycle, bicycle, car and bus recognition research. Through investigation and comparison, this paper proposes to use YOLO v4 network to identify the location and quantity of objects. YOLO v4 has the characteristics of strong ability of small target recognition, high precision and fast processing speed, and sets the data acquisition object to train and test the image set. Using the statistics of the accuracy rate, error rate and omission rate of the target in the video, the network trained in this paper can accurately and effectively identify persons, motorcycles, bicycles, cars and buses in the moving images.

On Providing Anonymity in Ad Hoc Networks (Ad Hoc Network에서 익명성 제공에 관한 연구)

  • Kang, Seung-Seok
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.93-103
    • /
    • 2007
  • Networking environments are exposed to outside attacks and privacy threats. Due to broadcast nature of radio transmissions, wireless devices experience more vulnerable situations than those of wired network devices. This paper assumes that a wireless device has two network interfaces, one for accessing internet using 3G services, and the other for constructing an ad hoc network. To deal with privacy threats, this paper introduces an approach in which wireless devices form a special ad hoc network in order to exchange data using anonymous communications. One or more intermediate peers should be involved in the construction of an anonymous path. The proposed anonymous communication mechanism discourages traffic analysis and improves user privacy. According to simulation results, the anonymous connection in an ad hoc network prefers the intermediate peer(s) which is located near the source and/or the destination peer, rather than randomly-selected peers.

  • PDF

Design and Comparative Performance Analysis of Fully Distributed Mobility Management Scheme on PMIPv6 (PMIPv6 기반의 완전 분산형 이동성 관리 기법의 설계 및 성능 비교 분석)

  • Lee, Han-Bin;Lee, Jong Hyup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.220-223
    • /
    • 2016
  • Explosive growth of smartphone-based mobile nodes has increased exponentially the mobile data traffic on the Internet. To reduce the traffic load on the network and to support the seamless mobility of the mobile nodes, the IETF and 3GPP have standardized a number of mobility management mechanisms. More recently, they are making an effort to find some schemes to distribute the networking systems that involve in the mobility management in order to assure the scalability and the reliability of the network. In IETF, DMM concept for the distributed mobility management on the Internet is being discussed. Specifically, the DMM can be classified into the partially distributed management and fully distributed management. In this paper, we propose a fully distributed mobility management scheme (FuDMM) on PMIPv6-based network by applying the extended NDP. We also present the performance of FuDMM using the comparative analysis with the existing ones.

  • PDF

Design of a machine learning based mobile application with GPS, mobile sensors, public GIS: real time prediction on personal daily routes

  • Shin, Hyunkyung
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.27-39
    • /
    • 2018
  • Since the global positioning system (GPS) has been included in mobile devices (e.g., for car navigation, in smartphones, and in smart watches), the impact of personal GPS log data on daily life has been unprecedented. For example, such log data have been used to solve public problems, such as mass transit traffic patterns, finding optimum travelers' routes, and determining prospective business zones. However, a real-time analysis technique for GPS log data has been unattainable due to theoretical limitations. We introduced a machine learning model in order to resolve the limitation. In this paper presents a new, three-stage real-time prediction model for a person's daily route activity. In the first stage, a machine learning-based clustering algorithm is adopted for place detection. The training data set was a personal GPS tracking history. In the second stage, prediction of a new person's transient mode is studied. In the third stage, to represent the person's activity on those daily routes, inference rules are applied.

Performance Evaluation of the QoS Guarantee Mechanisms for Medical Multimedia Network Using DiffServ (DiffServ를 이용한 의료용 멀티미디어 네트워크의 QoS 보장에 대한 성능평가)

  • 이상학
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.12
    • /
    • pp.1505-1516
    • /
    • 2001
  • The goal of Medical multimedia server is to develop computer hardware and software which would enable electronic access, storage, transmission, and display of patient data and images. Since the current network only provides so called "best-effort" services, it is impossible to satisfy QoS guarantee that is required for real time application services for emergency room, operating room etc. Accordingly, world-wide research is being made for a variety of services to provide QoS. he goal of DiffServ is to offer scalable differentiated service in Internet which are made possible by traffic classification and conditioning only performed at an edge(or a boundary) node. In case DiffServ was deployed in the Medical multimedia network, it is difficult to estimate how the QoS mechanism would affect totally the network performance. Therefore, we need to verify by simulation the design of algorithm which provide a variety of differentiated services. In QoS for Medical multimedia network, a simulator is designed and implemented using OPNET to investigate the performance of DiffServ QoS support mechanism. The developed DiffServ simulator may generate packets according to random, and bursty traffic models in order to incorporate diverse traffic conditions in the Medical multimedia network environment. Based on our simulation results, we confirmed that service differentiation is possible by using the EF(Expedited Forwarding) class in DiffServ networks.

  • PDF

A retransmission method for the improvement of the transmission reliability in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 전송 신뢰성 개선을 위한 재전송 방법)

  • Lee, Won-Jin;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.93-99
    • /
    • 2008
  • Most of the current research works on high-technology is being carried on to provide ubiquitous services to people. To make that possible, ubiquitous computing networks should be deployed in the first place, where ubiquitous sensor network (USN) will take a very big role. This paper is devoted to introduce a new transmission technique to make USN more independent and reliable as an infra-structure for ubiquitous services. The proposed scheme can elevate the network performance by ensuring the reliability of data transmission. Especially, the proposed scheme can reduce network traffic and communication cost by detecting data error without additional data and communication. In addition, it has an advantage of using the legacy routing protocols.

  • PDF

Pilot Symbol Assisted Weighted Data Fusion Scheme for Uplink Base-Station Cooperation System

  • Zhang, Zhe;Yang, Jing;Zhang, Jiankang;Mu, Xiaomin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.528-544
    • /
    • 2015
  • Base Station Cooperation (BSC) has been a promising technique for combating the Inter-Cell Interference (ICI) by exchanging information through a high-speed optical fiber back-haul to increase the diversity gain. In this paper, we propose a novel pilot symbol assisted data fusion scheme for distributed Uplink BSC (UBSC) based on Differential Evolution (DE) algorithm. Furthermore, the proposed scheme exploits the pre-defined pilot symbols as the sample of transmitted symbols to constitute a sub-optimal Weight Calculation (WC) model. To circumvent the non-linear programming problem of the proposed sub-optimal model, DE algorithm is employed for searching the proper fusion weights. Compared with the existing equal weights based soft combining scheme, the proposed scheme can adaptively adjust the fusion weights according to the accuracy of cooperative information, which remains the relatively low computational complexity and back-haul traffic. Performance analysis and simulation results show that, the proposed scheme can significantly improve the system performance with the pilot settings of the existing standards.

EPGA Implementation and Verification of CSIX Module (CSIX 모듈의 FPGA 구현 및 검증)

  • 김형준;손승일;강민구
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.9-17
    • /
    • 2002
  • CSIX-L1 is the Common Switch Interface that defines a physical interface for transferring information between a traffic manager (Network Processor) and a switching fabric in ATM, IP, MPLS, Ethernet and data communication areas. In Tx, data to be transmitted is generated in Cframe which is the base information unit and in Rx, original data is extracted from the received Cframe. CSIX-L1 suppots the 32, 64, 96, and 123-bit interface and generates a variable length CFrame and Idle Cframe. Also CSIX-L1 appends Padding byte and supports 16-bit Vertical parity, CSIX-L1 is designed using Xilinx 4,1i. After functional and timing simulations are completed. CSIX-L1 module is downloaded in Xilinx FPGA XCV1000EHQ240C and verified. The synthesized CSIX module operates at 27MHz.

  • PDF