• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.024 seconds

Estimation of Detection Performance for Vehicle FMCW Radars Using EM Simulations

  • Yoo, Sungjun;Kim, Hanjoong;Byun, Gangil;Choo, Hosung
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.1
    • /
    • pp.13-19
    • /
    • 2019
  • This paper proposes a systematic method for estimating detection performances of a frequency-modulated continuous wave radar using electromagnetic simulations. The proposed systematic method includes a radar system simulator that can obtain range-Doppler images using the electromagnetic (EM) simulations in conjunction with a test setup employed for performance evaluation of multiple targets at different velocities in a traffic environment. This method is then applied for optimizing the half-power beamwidths of the antenna array using an evaluation metric defined to improve the detection strengths for the multiple targets. The optimized antenna has vertical and horizontal half-power beam widths of $10^{\circ}$ and $60^{\circ}$, respectively. The results confirm that that the proposed systematic method is suitable to improve the radar detection performance with the enhanced radar-Doppler images.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

An Estimation Methodology of Empirical Flow-density Diagram Using Vision Sensor-based Probe Vehicles' Time Headway Data (개별 차량의 비전 센서 기반 차두 시간 데이터를 활용한 경험적 교통류 모형 추정 방법론)

  • Kim, Dong Min;Shim, Jisup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.2
    • /
    • pp.17-32
    • /
    • 2022
  • This study explored an approach to estimate a flow-density diagram(FD) on a link in highway traffic environment by utilizing probe vehicles' time headway records. To study empirical flow-density diagram(EFD), the probe vehicles with vision sensors were recruited for collecting driving records for nine months and the vision sensor data pre-processing and GIS-based map matching were implemented. Then, we examined the new EFDs to evaluate validity with reference diagrams which is derived from loop detection traffic data. The probability distributions of time headway and distance headway as well as standard deviation of flow and density were utilized in examination. As a result, it turned out that the main factors for estimation errors are the limited number of probe vehicles and bias of flow status. We finally suggest a method to improve the accuracy of EFD model.

A Driving Information Centric Information Processing Technology Development Based on Image Processing (영상처리 기반의 운전자 중심 정보처리 기술 개발)

  • Yang, Seung-Hoon;Hong, Gwang-Soo;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.31-37
    • /
    • 2012
  • Today, the core technology of an automobile is becoming to IT-based convergence system technology. To cope with many kinds of situations and provide the convenience for drivers, various IT technologies are being integrated into automobile system. In this paper, we propose an convergence system, which is called Augmented Driving System (ADS), to provide high safety and convenience of drivers based on image information processing. From imaging sensor, the image data is acquisited and processed to give distance from the front car, lane, and traffic sign panel by the proposed methods. Also, a converged interface technology with camera for gesture recognition and microphone for speech recognition is provided. Based on this kind of system technology, car accident will be decreased although drivers could not recognize the dangerous situations, since the system can recognize situation or user context to give attention to the front view. Through the experiments, the proposed methods achieved over 90% of recognition in terms of traffic sign detection, lane detection, and distance measure from the front car.

Implementation Of DDoS Botnet Detection System On Local Area Network (근거리 통신망에서의 DDoS 봇넷 탐지 시스템 구현)

  • Huh, Jun-Ho;Hong, Myeong-Ho;Lee, JeongMin;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.678-688
    • /
    • 2013
  • Different Different from a single attack, in DDoS Attacks, the botnets that are distributed on network initiate attacks against the target server simultaneously. In such cases, it is difficult to take an action while denying the access of packets that are regarded as DDoS since normal user's convenience should also be considered at the target server. Taking these considerations into account, the DDoS botnet detection system that can reduce the strain on the target server by detecting DDoS attacks on each user network basis, and then lets the network administrator to take actions that reduce overall scale of botnets, has been implemented in this study. The DDoS botnet detection system proposed by this study implemented the program which detects attacks based on the database composed of faults and abnormalities collected through analyzation of hourly attack traffics. The presence of attack was then determined using the threshold of current traffic calculated with the standard deviation and the mean number of packets. By converting botnet-based detection method centering around the servers that become the targets of attacks to the network based detection, it was possible to contemplate aggressive defense concept against DDoS attacks. With such measure, the network administrator can cut large scale traffics of which could be referred as the differences between DDoS and DoS attacks, in advance mitigating the scale of botnets. Furthermore, we expect to have an effect that can considerably reduce the strain imposed on the target servers and the network loads of routers in WAN communications if the traffic attacks can be blocked beforehand in the network communications under the router equipment level.

Ship Detection for KOMPSAT and RADARSAT/SAR Images: Field Experiments

  • Yang Chan-Su;Kang Chang-Gu
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.144-147
    • /
    • 2004
  • Two different sensors (here, KOMPSAT and RADARSAT) are considered for ship detection, and are used to delineate the detection performance for their data. The experiments are set for coastal regions of Mokpo Port and Ulsan Port and field experiments on board pilot boat are conducted to collect in situ ship validation information such as ship type and length. This paper introduce mainly the experiment result of ship detection by both RADARSAT SAR imagery and landbased RADAR data, operated by the local Authority of South Korea, so called vessel traffic system (VTS) radar. Fine imagery of Ulsan Port was acquired on June 19, 2004 and in-situ data such as wind speed and direction, taking pictures of ships and natural features were obtained aboard a pilot ship. North winds, with a maximum speed of 3.1 m/s were recorded. Ship's position, size and shape and natural features of breakwaters, oil pipeline and alongside ship were compared using SAR and VTS. It is shown that KOMPSAT/EOC has a good performance in the detection of a moving ship at a speed of 7 kts or more an hour that ship and its wake can be imaged. The detection capability of RADARSAT doesn't matter how fast ship is running and depends on a ship itself, e.g. its material, length and type. Our results indicate that SAR can be applicable to automated ship detection for a VTS and SAR combination service.

  • PDF

Real-time Phishing Site Detection Method (피싱사이트 실시간 탐지 기법)

  • Sa, Joon-Ho;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.819-825
    • /
    • 2012
  • Nowadays many phishing sites contain HTTP links to victim web-site's contents such as images, bulletin board etc. to make the phishing sites look more real and similar to the victim web-site. We introduce a real-time phishing site detection system which makes use of the characteristic that the phishing sites' URLs flow into the victim web-site via the HTTP referer header field when the phishing site is visited. The detection system is designed to adopt an out-of-path network configuration to minimize effect on the running system, and a phishing site source code analysis technique to alert administrators in real-time when phishing site is detected. The detection system was installed on a company's web-site which had been targeted for phishing. As result, the detection system detected 40 phishing sites in 6 days of test period.

MIB 정보와 패킷 분석을 통한 DDoS 공격의 탐지

  • 김미혜;원승영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.49-55
    • /
    • 2004
  • DDoS is an attack type that interfere with normal service by running out network bandwidth, process throughput, and system resource. It can be recognized intuitively by network slowdown and connection impossibility state, but it is necessary to detect DDoS attack by exact and quantitative analysis. In this paper, the exact and efficient DDoS attack detection system which is able to detect traffic flooding by MIB information, and attack traffic by packet analysis is proposed and realized.

  • PDF

Design of a designated lane enforcement system based on deep learning (딥러닝 기반 지정차로제 단속 시스템 설계)

  • Bae, Ga-hyeong;Jang, Jong-wook;Jang, Sung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.236-238
    • /
    • 2022
  • According to the current Road Traffic Act, the 2020 amendment bill is currently in effect as a system that designates vehicle types for each lane for the purpose of securing road use efficiency and traffic safety. When comparing the number of traffic accident fatalities per 10,000 vehicles in Germany and Korea, the number of traffic accident deaths in Germany is significantly lower than in Korea. The representative case of the German autobahn, which did not impose a speed limit, suggests that Korea's speeding laws are not the only answer to reducing the accident rate. The designated lane system, which is observed in accordance with the keep right principle of the Autobahn Expressway, plays a major role in reducing traffic accidents. Based on this fact, we propose a traffic enforcement system to crack down on vehicles violating the designated lane system and improve the compliance rate. We develop a designated lane enforcement system that recognizes vehicle types using Yolo5, a deep learning object recognition model, recognizes license plates and lanes using OpenCV, and stores the extracted data in the server to determine whether or not laws are violated.Accordingly, it is expected that there will be an effect of reducing the traffic accident rate through the improvement of driver's awareness and compliance rate.

  • PDF

A Study on the Current State and Improvement of the AIS (AIS 시스템의 현황과 개선 방안에 관한 연구)

  • Park Gyei-Kark;Jung Jae-Yong;Lee Ju-Whan;Seo Ki-Yeol
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.05a
    • /
    • pp.209-213
    • /
    • 2005
  • The current AIS network and. system are run on a full scale with 22 ground stations and. 11 operational systems, completing a nation-wide, integrated network However, currently it needs to manage sea traffic by linking AIS to VIS which 1vs a limited service area due to restricted radar detection zones in harbors or coastal areas. Accordingly this study analyzes the current status of the AIS system and. proposes technological and. operational improvement plan of the current AIS system through investigating the actual conditions of the AIS system and. its operations.

  • PDF