• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.045 seconds

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.

ADS-B based Trajectory Prediction and Conflict Detection for Air Traffic Management

  • Baek, Kwang-Yul;Bang, Hyo-Choong
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.13 no.3
    • /
    • pp.377-385
    • /
    • 2012
  • The Automatic Dependent Surveillance Broadcast (ADS-B) system is a key component of CNS/ATM recommended by the International Civil Aviation Organization (ICAO) as the next generation air traffic control system. ADS-B broadcasts identification, positional data, and operation information of an aircraft to other aircraft, ground vehicles and ground stations in the nearby region. This paper explores the ADS-B based trajectory prediction and the conflict detection algorithm. The multiple-model based trajectory prediction algorithm leads accurate predicted conflict probability at a future forecast time. We propose an efficient and accurate algorithm to calculate conflict probability based on approximation of the conflict zone by a set of blocks. The performance of proposed algorithms is demonstrated by a numerical simulation of two aircraft encounter scenarios.

A Study on Conflict Detection and Resolution for Aircraft Separation Assurance in a Free Flight Environment (자유비행 환경에서의 항공기 분리보장을 위한 충돌 탐지 및 해결 방법에 대한 고찰)

  • Kim, Chang-Hwan;Kang, Ja-Young
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.18 no.3
    • /
    • pp.27-33
    • /
    • 2010
  • The goal for the CD&R system is to predict that a conflict is going to occur in the future, communicate the detected conflict to a human operator, and, in some cases, assist in the resolution of the conflict situation. To provide insight into different methods of conflict detection and resolution, a literature review of previous research models and current developmental and operational systems was performed. This paper focuses only on the specific attributes of each model, not on the depth to which a model has been analyzed, validated, or accepted. Thus, care should be taken to remember that a model that seems to be simple according to our categorization scheme may be significantly more viable than an apparently sophisticated model.

A Novel Architecture for Real-time Automated Intrusion Detection Fingerprinting using Honeypot

  • Siddiqui, Muhammad Shoaib;Hong, Choong-Seon
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1093-1095
    • /
    • 2007
  • As the networking and data communication technology is making progress, there has been an augmented concern about the security. Intrusion Detection and Prevention Systems have long being providing a reliable layer in the field of Network Security. Intrusion Detection System works on analyzing the traffic and finding a known intrusion or attack pattern in that traffic. But as the new technology provides betterment for the world of the Internet; it also provides new and efficient ways for hacker to intrude in the system. Hence, these patterns on which IDS & IPS work need to be updated. For detecting the power and knowledge of attackers we sometimes make use of Honey-pots. In this paper, we propose a Honey-pot architecture that automatically updates the Intrusion's Signature Knowledge Base of the IDS in a Network.

Design and Implementation of adaptive traffic signal simulator system for U-Traffic (U-Traffic의 적응형 교통 신호 시뮬레이터 구축에 대한 연구)

  • Jang, Won-Tae;Kang, Woo-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.480-487
    • /
    • 2012
  • In Busan, the structural limitations of the road, is causing severe traffic congestion and low speed of the vehicle. So the existing traffic control system needs improvements to its structure. A study on Optimal Traffic Signal System and Improvement for User Oriented Public Transit Service are required. U-city is a city or region with ubiquitous information technology. All information systems are linked, and virtually everything is linked to an information technologies. U-Traffic goal is to maximize of traffic information services based on advanced information technology to integrate of transportation infrastructure. The objectives of this research are : a vehicle detection method through a variety of sensors, an algorithm of the traffic signal system, a design and implementation a simulator to compare between the fixed traffic signal and adaptive traffic signal system. This simulator will have allowed analysis techniques for the study of traffic control. Results of simulator test shows that traffic congestion can be some reduce.

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

Analysis of Traffic Safety Effectiveness of Vehicle Seat-belt Wearing Detection System (주행차량 안전벨트 착용 검지시스템 교통안전 효과 분석)

  • Ji won Park;Su bin Park;Sang cheol Kang;Cheol Oh
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.5
    • /
    • pp.53-73
    • /
    • 2023
  • Although it is mandatory to wear a seat belt that can minimize human injury when traffic accident occurs, the number of traffic accident casualties not wearing seat belts still accounts for a significant proportion.The seat belt wearing detection system for all seats is a system that identifies whether all seat passengers wear a seat belt and encourages their usage, also it can be a useful technical countermeasure. Firstly, this study established the viability of system implementation by assessing the factors influencing the severity of injuries in traffic accidents through the development of an ordered probit model. Analysis results showed that the use of seat belts has statistically significant effects on the severity of traffic accidents, reducing the probability of death or serious injury by 0.054 times in the event of a traffic accident. Secondly, a meta-analysis was conducted based on prior research related to seat belts and injuries in traffic accidents to estimate the expected reduction in accident severity upon the implementation of the system.The analysis of the effect of accident severity reduction revealed that wearing seat belts would lead to a 63.3% decrease in fatal accidents, with the front seats showing a reduction of 75.7% and the rear seats showing a reduction of 58.1% in fatal accidents. Lastly, Using the results of the meta-analysis and traffic accident statistics, the expected decrease in the number of traffic accident casualties with the implementation of the system was derived to analyze the traffic safety effects of the proposed detection system. The analysis demonstrated that with an increase in the adoption rate of the system, the number of casualties in accidents where seat belts were not worn decreased. Specifically, at a system adoption rate of 60%, it is anticipated that the number of fatalities would decrease by more than three times compared to the current scenario. Based on the analysis results, operational strategies for the system were proposed to increase seat belt usage rates and reduce accident severity.

Energy and Air Quality Benefits of DCV with Wireless Sensor Network in Underground Parking Lots

  • Cho, Hong-Jae;Jeong, Jae-Weon
    • International Journal of High-Rise Buildings
    • /
    • v.3 no.2
    • /
    • pp.155-165
    • /
    • 2014
  • This study measured and compared the variation of ventilation rate and fan energy consumption according to various control strategies after installing wireless sensor-based pilot ventilation system in order to verify the applicability of demand-controlled ventilation (DCV) strategy that was efficient ventilation control strategy for underground parking lot. The underground parking lot pilot ventilation system controlled the ventilation rate by directly or indirectly tracking the traffic load in real-time after sensing data, using vehicle detection sensors and carbon monoxide (CO) and carbon dioxide ($CO_2$) sensor. The ventilation system has operated for 9 hours per a day. It responded real-time data every 10 minutes, providing ventilation rate in conformance with the input traffic load or contaminant level at that time. A ventilation rate of pilot ventilation system can be controlled at 8 levels. The reason is that a ventilation unit consists of 8 high-speed nozzle jet fans. This study proposed vehicle detection sensor based demand-controlled ventilation (VDS-DCV) strategy that would accurately trace direct traffic load and CO sensor based demand-controlled ventilation (CO-DCV) strategy that would indirectly estimate traffic load through the concentration of contaminants. In order to apply DCV strategy based on real-time traffic load, the minimum required ventilation rate per a single vehicle was applied. It was derived through the design ventilation rate and total parking capacity in the underground parking lot. This is because current ventilation standard established per unit floor area or unit volume of the space made it difficult to apply DCV strategy according to the real-time variation of traffic load. According to the results in this study, two DCV strategies in the underground parking lot are considered to be a good alternative approach that satisfies both energy saving and healthy indoor environment in comparison with the conventional control strategies.

Spatiotemporal Traffic Density Estimation Based on Low Frequency ADAS Probe Data on Freeway (표본 ADAS 차두거리 기반 연속류 시공간적 교통밀도 추정)

  • Lim, Donghyun;Ko, Eunjeong;Seo, Younghoon;Kim, Hyungjoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.208-221
    • /
    • 2020
  • The objective of this study is to estimate and analyze the traffic density of continuous flow using the trajectory of individual vehicles and the headway of sample probe vehicles-front vehicles obtained from ADAS (Advanced Driver Assitance System) installed in sample probe vehicles. In the past, traffic density of continuous traffic flow was mainly estimated by processing data such as traffic volume, speed, and share collected from Vehicle Detection System, or by counting the number of vehicles directly using video information such as CCTV. This method showed the limitation of spatial limitations in estimating traffic density, and low reliability of estimation in the event of traffic congestion. To overcome the limitations of prior research, In this study, individual vehicle trajectory data and vehicle headway information collected from ADAS are used to detect the space on the road and to estimate the spatiotemporal traffic density using the Generalized Density formula. As a result, an analysis of the accuracy of the traffic density estimates according to the sampling rate of ADAS vehicles showed that the expected sampling rate of 30% was approximately 90% consistent with the actual traffic density. This study contribute to efficient traffic operation management by estimating reliable traffic density in road situations where ADAS and autonomous vehicles are mixed.

Performance Test of APIS, DELOS Algorithm using Paramics (Paramics를 이용한 APID, DELOS평가)

  • Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.61-66
    • /
    • 2013
  • The central core of the Traffic Management System is an Incident Management System. Whole approach has been component-orientated, with a secondary emphasis being placed on the traffic characteristics at the sites. The first action taken during the development process was the selection of the required data for each components within the existing infrastructure of Algeria freeway system. After review and analysis of existing incident detection methodologies, Paramics was utilized to test the performance of APID, DELOS algorithms. The existing system of Algeria freeway was tested in a different configuration at different sections of freeway, thereby increasing the validity and scope of the overall findings. The incident detection module has been performed according to predefined system validation specifications. The Paramics simulation was done with the use of synchronous analysis, thereby providing a means for testing the incident detection module.