• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.029 seconds

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.

Negative Selection within an Artificial Immune System for Network Intrusion Detection (네트워크 침입 탐지를 위한 인공 면역 시스템에서의 부정적 선택( Negative Selection) 알고리즘)

  • Kim, Jung-Won;Bentley, Peter J.;Choi, Jong-Uk
    • Annual Conference of KIPS
    • /
    • 2000.10a
    • /
    • pp.273-276
    • /
    • 2000
  • This paper describes on-going research, applying an artificial immune system to the problem of network intrusion detection. The paper starts by introducing the motivation and rationale of this research. After describing the overall architecture of the proposed artificial immune system fur network intrusion detection, the real network traffic data and its profile features used in this research are explained. As the first step of this effort, the negative selection algorithm, which is one of three significant evolutionary stages comprising an overall artificial immune system, is investigated and initial results are briefly discussed. Finally, the direction of future work is discussed based on this initial result and the contribution of this research is addressed.

  • PDF

Ship Detection Using Background Estimation of Video and AIS Informations (영상의 배경추정기법과 AIS정보를 이용한 선박검출)

  • Kim, Hyun-Tae;Park, Jang-Sik;Yu, Yun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2636-2641
    • /
    • 2010
  • To support anti-collision between ship to ship and sea-search and sea-rescue work, ship automatic identification system(AIS) that can both send and receive messages between ship and VTS Traffic control have been adopted. And port control system can control traffic vessel service which is co-operated with AIS. For more efficient traffic vessel service, ship recognition and display system is required to cooperated with AIS. In this paper, we propose ship detection system which is co-operated with AIS by using background estimation based on image processing for on the sea or harbor image extracted from camera. We experiment with on the sea or harbor image extracted from real-time input image from camera. By computer simulation and real world test, the proposed system show more effective to ship monitoring.

A Study on Candidate Lane Detection using Hybrid Detection Technique (하이브리드 검출기법을 이용한 후보 차선검출에 관한 연구)

  • Park, Sang-Joo;Oh, Joong-Duk;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.18-25
    • /
    • 2016
  • As more people have cars, the threat of traffic accidents is posed on men and women of all ages. The main culprit of traffic accidents is driving while intoxicated or drowsy. The method to recognize and prevent the cause of traffic accidents is to use lane detection. In this study, a total of 4,000 frames (day image: 2,900 frames, night image: 1,100 frames) were used to test lane detection. According to the test, in the case of day image, when the threshold of Sobel edge detection technique was detected with second-order differential equation, there was the highest candidate lane detection rate which was 86.1%. In the threshold of Canny edge detection technique, the highest detection rate of 88.0% was found at Low=50, and High=300. In the case of night image, the threshold of Sobel edge detection technique, when horizontal calculation and vertical calculation had second-order differential equation, and when horizontal-vertical calculation had 1.5th-order differential equation, there was the highest detection rate which was 83.1%. In the threshold of Canny edge detection technique, the highest detection rate of 89.9% was found at Low=50, and High=300.

Worm Detection and Containment using Earlybird and Snort on Deterlab (Deterlab 환경에서 Earlybird를 이용한 웜 탐지와 Snort 연동을 통한 웜 확산 차단)

  • Lee, Hyeong-Yun;Hwang, Seong-Oun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.71-76
    • /
    • 2013
  • A computer worm is a standalone malware computer program that probes and exploits vulnerabilities of systems. It replicates and spreads itself to other computers via networks. In this paper, we study how to detect and prevent worms. First, we generated Codered II traffic on the emulated testbed called Deterlab. Then we identified dubious parts using Earlybird and wrote down Snort rules using Wireshark. Finally, by applying the Snort rules to the traffic, we could confirmed that worm detection was successfully done.

A Development of 3-D Resolution Algorithm for Aircraft Collision Avoidance

  • Kim, Youngrae;Lee, Sangchul;Lee, Keumjin;Kang, Ja-Young
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.14 no.3
    • /
    • pp.272-281
    • /
    • 2013
  • Traffic Collision Avoidance System (TCAS) is designed to enhance safety in aircraft operations, by reducing the incidences of mid-air collision between aircraft. The current version of TCAS provides only vertical resolution advisory to the pilots, if an aircraft's collision with another is predicted to be imminent, while efforts to include horizontal resolution advisory have been made, as well. This paper introduces a collision resolution algorithm, which includes both vertical and horizontal avoidance maneuvers of aircraft. Also, the paper compares between the performance of the proposed algorithm and that of algorithms with only vertical or horizontal avoidance maneuver of aircraft.

The Adaptive SPAM Mail Detection System using Clustering based on Text Mining

  • Hong, Sung-Sam;Kong, Jong-Hwan;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2186-2196
    • /
    • 2014
  • Spam mail is one of the most general mail dysfunctions, which may cause psychological damage to internet users. As internet usage increases, the amount of spam mail has also gradually increased. Indiscriminate sending, in particular, occurs when spam mail is sent using smart phones or tablets connected to wireless networks. Spam mail consists of approximately 68% of mail traffic; however, it is believed that the true percentage of spam mail is at a much more severe level. In order to analyze and detect spam mail, we introduce a technique based on spam mail characteristics and text mining; in particular, spam mail is detected by extracting the linguistic analysis and language processing. Existing spam mail is analyzed, and hidden spam signatures are extracted using text clustering. Our proposed method utilizes a text mining system to improve the detection and error detection rates for existing spam mail and to respond to new spam mail types.

DETECTING A LED TRAFFIC LIGHT FOR VISIBLE LIGHT COMMUNICATION SYSTEM

  • Premachandra, H.Chinthaka N.;Yendo, Tomohiro;Yamasato, Takaya;Fujii, Toshiaki;Tanimoto, Masayuki;Kimura, Yoshikatsu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.476-481
    • /
    • 2009
  • In this paper, we propose a visible light road-to-vehicle communication system at intersection as one of ITS technique. In this system, the communication between vehicle and a LED traffic light is approached using LED traffic light as the transmitter, and on-vehicle high-speed camera as the receiver. The LEDs in the transmitter are emitted with 500Hz and those emitting LEDs are captured by a high-speed camera for making communication. The images from the high-speed camera are processed to get luminance value of each LED in the transmitter. For this purpose, first transmitter should be found, then it should be tracked for each frame, and the luminance value of each LED in the transmitter should be captured. In our previous work, transmitter was found by getting the subtraction of two consecutive frames. In this paper, we mainly introduce an algorithm to detect the found transmitter in consecutive frames. Experimental results using appropriate images showed the effectiveness of the proposal

  • PDF

A Study on a Traffic Signal Operation system using complex Sensor (복합 센서를 이용한 교통 신호운영체계에 관한 연구)

  • Hwang, Gui-Youn;Jeong, Yang-Kwon;Choi, Hyung-Ju;Hui, Xue-Wu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1573-1580
    • /
    • 2013
  • This study is proposed traffic signal operating system to find existing problems of loop system and complex with doplar system, which have strong linearity, resistence of weather effects and wide range to improve delay problems that used in vehicle detection method. This proposed method have simulated on Southern-Gwangju station to Enter of SeoChang take about 10km by using VISSIM tool and we found this proposed method is 15% through(또는 to) 30% more effective than continuous progress interlocking system or crossing progress interlocking system.

Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System (침입탐지시스템에서 경보정보에 대한 대응 능력 모델링 및 성능분석)

  • Jeon Yong-Hee;Jang Jung-Sook;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.855-864
    • /
    • 2005
  • In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator using OPNET Modeller, for the performance analysis on the response capacity of alert information in the proposed system. At first, we model the arrival process of alert information resulted from abnormal traffic. In order to model the situation in which alert information is intensively produced, we apply the IBP(Interrupted Bernoulli Process) which may represent well the burstiness of traffic. Then we perform the simulation in order to gain some quantitative understanding of the system for our performance parameters. Based on the results of the performance analysis, we analyze factors which may hinder in accelerating the speed of security node, and would like to present some methods to enhance performance.