• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.03 seconds

HOG based Pedestrian Detection and Behavior Pattern Recognition for Traffic Signal Control (교통신호제어를 위한 HOG 기반 보행자 검출 및 행동패턴 인식)

  • Yang, Sung-Min;Jo, Kang-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.11
    • /
    • pp.1017-1021
    • /
    • 2013
  • The traffic signal has been widely used in the transport system with a fixed time interval currently. This kind of setting time was determined based on experience for vehicles to generate a waiting time while allowing pedestrians crossing the street. However, this strict setting causes inefficient problems in terms of economic and safety crossing. In this research, we propose a monitoring algorithm to detect, track and check pedestrian crossing the crosswalk by the patterns of behavior. This monitoring system ensures the safety for pedestrian and keeps the traffic flow in efficient. In this algorithm, pedestrians are detected by using HOG feature which is robust to illumination changes in outdoor environment. According to a complex computation, the parallel process with the GPU as well as CPU is adopted for real-time processing. Therefore, pedestrians are tracked by the relationship of hue channel in image sequence according to the predefined pedestrian zone. Finally, the system checks the pedestrians' crossing on the crosswalk by its HOG based behavior patterns. In experiments, the parallel processing by both GPU and CPU was performed so that the result reaches 16 FPS (Frame Per Second). The accuracy of detection and tracking was 93.7% and 91.2%, respectively.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

Network Attack Detection based on Multiple Entropies (다중 엔트로피를 이용한 네트워크 공격 탐지)

  • Kim Min-Taek;Kwon Ki Hoon;Kim Sehun;Choi Young-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.71-77
    • /
    • 2006
  • Several network attacks, such as distributed denial of service (DDoS) attack, present a very serious threat to the stability of the internet. The threat posed by network attacks on large networks, such as the internet, demands effective detection method. Therefore, a simple intrusion detection system on large-scale backbone network is needed for the sake of real-time detection, preemption and detection efficiency. In this paper, in order to discriminate attack traffic from legitimate traffic on backbone links, we suggest a relatively simple statistical measure, entropy, which can track value frequency. Den is conspicuous distinction of entropy values between attack traffic and legitimate traffic. Therefore, we can identify what kind of attack it is as well as detecting the attack traffic using entropy value.

Realization of Unified Protocol of Multi-functional Controller for Transfer of Vehicle Information on the Roads (차량 검지정보 전송을 위한 다기능 제어기 통합 프로토콜 구현)

  • Ahn, Seung-Yong;Lim, Sung-Kyu;Lee, Seung-Yo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.12
    • /
    • pp.1857-1863
    • /
    • 2012
  • The VDS(Vehicle Detection System) collects and transfers information about traffic situations in real time, therefore it makes the traffic management effective. Recently, the VDSs have provided good stability and accuracy in regard to system reliability and functions but they also have showed problems such as raising costs and consuming times when a new system is installed and/or the environmental requirements for the system are set up. The reason of the problems is that up to now the collection of the data and information about the traffic situations has been achieved by the 1:1 information exchange between the traffic control surveillance center and the each traffic field, between equipments and centers, and among data processing equipments and also centers. The communication systems used in the VDS are generally composed of 1 : 1 connection of the lines because the communication protocols are different in the most of the cases mentioned above. Consequently, this makes the number of communication lines become larger and causes the cost for the whole traffic information systems to increase. In this paper, a development of a controller to unify the communication protocols for the VDS is peformed to solve the problems which were mentioned above. Specially, the controller developed in this paper was applied to a radar vehicle detector and tested to show its usefulness. In addition to that, the developed controller was also designed to include functions to transfer the information about weather conditions on the roads.

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

Korean Traffic Speed Limit Sign Recognition in Three Stages using Morphological Operations (형태학적 방법을 사용한 세 단계 속도 표지판 인식법)

  • Chirakkal, Vinjohn;Kim, SangKi;Kim, Chisung;Han, Dong Seog
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.07a
    • /
    • pp.516-517
    • /
    • 2015
  • The automatic traffic sign detection and recognition has been one of the highly researched and an important component of advanced driver assistance systems (ADAS). They are designed especially to warn the drivers of imminent dangers such as sharp curves, under construction zone, etc. This paper presents a traffic sign recognition (TSR) system using morphological operations and multiple descriptors. The TSR system is realized in three stages: segmentation, shape classification and recognition stage. The system is designed to attain maximum accuracy at the segmentation stage with the inclusion of morphological operations and boost the computation time at the shape classification stage using MB-LBP descriptor. The proposed system is tested on the German traffic sign recognition benchmark (GTSRB) and on Korean traffic sign dataset.

  • PDF

Flow based Sequential Grouping System for Malicious Traffic Detection

  • Park, Jee-Tae;Baek, Ui-Jun;Lee, Min-Seong;Goo, Young-Hoon;Lee, Sung-Ho;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3771-3792
    • /
    • 2021
  • With the rapid development of science and technology, several high-performance networks have emerged with various new applications. Consequently, financially or socially motivated attacks on specific networks have also steadily become more complicated and sophisticated. To reduce the damage caused by such attacks, administration of network traffic flow in real-time and precise analysis of past attack traffic have become imperative. Although various traffic analysis methods have been studied recently, they continue to suffer from performance limitations and are generally too complicated to apply in existing systems. To address this problem, we propose a method to calculate the correlation between the malicious and normal flows and classify attack traffics based on the corresponding correlation values. In order to evaluate the performance of the proposed method, we conducted several experiments using examples of real malicious traffic and normal traffic. The evaluation was performed with respect to three metrics: recall, precision, and f-measure. The experimental results verified high performance of the proposed method with respect to first two metrics.

Threat Management System for Anomaly Intrusion Detection in Internet Environment (인터넷 환경에서의 비정상행위 공격 탐지를 위한 위협관리 시스템)

  • Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.157-164
    • /
    • 2006
  • The Recently, most of Internet attacks are zero-day types of the unknown attacks by Malware. Using already known Misuse Detection Technology is hard to cope with these attacks. Also, the existing information security technology reached the limits because of various attack's patterns over the Internet, as web based service became more affordable, web service exposed to the internet becomes main target of attack. This paper classifies the traffic type over the internet and suggests the Threat Management System(TMS) including the anomaly intrusion detection technologies which can detect and analyze the anomaly sign for each traffic type.

  • PDF

Determination Method of Signal Timing Plan Using Travel Time Data (통행시간 자료를 이용한 신호시간계획의 결정 방법)

  • Jeong, Young-Je
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.52-61
    • /
    • 2018
  • This research suggested the traffic signal timing calculation model for signal intersections based on sectional travel time. A detection system that collects sectional travel time data such as Urban Transport Information System(UTIS) is applied. This research developed the model to calculate saturation flow rate and demand volume from travel time information using a deterministic delay model. Moreover, this model could determine the traffic signal timings to minimize a delay based on Webster model using traffic demand volume. In micro simulation analysis using VISSIM and its API ComInterface, it checked the saturation conditions and determined the traffic signal timings to minimize the intersection delay. Recently, sectional vehicle detection systems are being installed in various projects, such as Urban Transportation Information System(UTIS) and Advanced Transportation Management System(ATMS) in Korea. This research has important contribution to apply the traffic information system to traffic signal operation sector.