• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.026 seconds

Design and Implementation of Unified Network Security System support for Traffic Management (종단간 트래픽 관리를 지원하는 통합 네트워크 보안시스템 설계 및 구현)

  • Hwang, Ho-Young;Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.267-273
    • /
    • 2011
  • The importance of networking capability is gaining more weight for enterprise business and high-speed Internet access with guaranteed security management is essential to companies. This paper presents a unified network security management solution to support high-speed Internet access, active security management, traffic classification and control. The presented system provides firewall, VPN, intrusion detection, contents filtering, traffic management, QoS management, and history log functions in unified manner implemented in a single appliance device located at the edge of enterprise networks. This will enable cost effective unified network security solution to companies.

Detecting Anomalies, Sabotage, and Malicious Acts in a Cyber-physical System Using Fractal Dimension Based on Higuchi's Algorithm

  • Marwan Albahar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.

Decision Making Support System for VTSO using Extracted Ships' Tracks (항적모델 추출을 통한 해상교통관제사 의사결정 지원 방안)

  • Kim, Joo-Sung;Jeong, Jung Sik;Jeong, Jae-Yong;Kim, Yun Ha;Choi, Ikhwan;Kim, Jinhan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.310-311
    • /
    • 2015
  • Ships' tracking data are being monitored and collected by vessel traffic service center in real time. In this paper, we intend to contribute to vessel traffic service operators' decision making through extracting ships' tracking patterns and models based on these data. Support Vector Machine algorithm was used for vessel track modeling to handle and process the data sets and k-fold cross validation was used to select the proper parameters. Proposed data processing methods could support vessel traffic service operators' decision making on case of anomaly detection, calculation ships' dead reckoning positions and etc.

  • PDF

Development and Comparison of Centralized and Decentralized ATIS Models with Simulation Method

  • Kim, Hoe-Kyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.2
    • /
    • pp.1-8
    • /
    • 2011
  • Traffic congestion is a source of significant economic and social costs in urban areas. Intelligent Transportation Systems (ITS) are a promising means to help alleviate congestion by utilizing advanced sensing, computing, and communication technologies. This paper proposes and investigates a basic and advanced ITS framework Advanced Traveler Information System (ATIS) using wireless Vehicle to Roadside (Centralized ATIS model: CA model) and Vehicle to Vehicle (DeCentralized ATIS model: DCA model) communication and assuming an ideal communication environment in the typical $6{\times}6$ urban grid traffic network. Results of this study indicate that an ATIS using wireless communication can save travel time given varying combinations of system characteristics: traffic flow, communication radio range, and penetration ratio. Also, all tested metrics of the CA and DCA models indicate that the system performance of both models is almost identical regardless of varying traffic demand and penetration ratios. Therefore, DCA model can be a reasonable alternative to the fixed infrastructure based ATIS model (CA model).

Development of Vehicle Detection System by Using Motion Vector of Corner Point (특징점의 모션벡터를 이용한 차량 검지 시스템 개발)

  • Han, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.261-267
    • /
    • 2007
  • The research about Intelligence Transport Systems(ITS) is actively studied for the traffic problem solution recently. Also, the various methods to detect vehicles moving in the roads are studied. This research using image processing technology is to give the drivers the road information quickly by developing Vehicle Detection System that detects through traffics. Purpose or this research is developing efficient algorithm to facilitate hardware composition. We use morphology method to extract corner points in the images captured by CCD camera. Also, the proposed algorithm detects vehicle's moving area by using motion vectors between corner points. The experiments of the proposed algorithm whose processing time was shortened show good results in vehicle detection on the live road images.

  • PDF

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.

Traffic Sign Area Detection System Based on Color Processing Mechanism of Human (인간의 색상처리방식에 기반한 교통 표지판 영역 추출 시스템)

  • Cheoi, Kyung-Joo;Park, Min-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.63-72
    • /
    • 2007
  • The traffic sign on the road should be easy to distinguishable even from far, and should be recognized in a short time. As traffic sign is a very important object which provides important information for the drivers to enhance safety, it has to attract human's attention among any other objects on the road. This paper proposes a new method of detecting the area of traffic sign, which uses attention module on the assumption that we attention our gaze on the traffic sign at first among other objects when we drive a car. In this paper, we analyze the previous studies of psycophysical and physiological results to get what kind of features are used in the process of human's object recognition, especially color processing, and with these results we detected the area of traffic sign. Various kinds of traffic sign images were tested, and the results showed good quality(average 97.8% success).

Development and Evaluation of a Left-Turn Actuated Traffic Signal Control Strategy using Image Detectors (영상검지기를 이용한 좌회전 감응식 신호제어전략 개발)

  • Eun, Ji-Hye;O, Yeong-Tae;Yun, Il-Su;Lee, Cheol-Gi;Kim, Nam-Seon;Han, Ung-Gu
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.2
    • /
    • pp.111-121
    • /
    • 2011
  • This paper discusses a method for optimizing the semi-actuated traffic signal control system by adjusting the initial interval according to the number of vehicles waiting for the green light in the actuated phase. We also present a Left-Turn actuated traffic signal control strategy that examines the vehicular noise in the detection area and determines the phase extension and the gap-out. In order to detect the vehicles in real-time, an image detector's Video Image Tracking technology was adopted. A 'Zone in Zone'method was implemented, and the image detection area is segmented into three zones: 1) Zone1 for verifying a vehicles obligatory presence, 2) Zone2 for counting the standby vehicles, and 3) Zone3 for examining the number of vehicles that have passed. The on-site assessment of the Left Turn Actuated Control is carried out using CORSIM, and the results show that the Control Delay decreased by 23.10%, 15.06%, and 4.34% compared to the delays resulted from pre-timed control, semi-actuated control-1 and semi-actuated control-2 traffic signal control systems respectively. The Queue Time also decreased by 36.24%, 20.10% and the Total Time by 14.36%, 7.02% for the same scenario. Which clearly demonstrates the operational efficiency. A sensitivity analysis reveals that the improvement from the propose traffic control strategy tends to increase as the through traffic volume reaches a saturated condition and the left-turn traffic volume decreases.

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF

Development of Left Turn Response System Based on LiDAR for Traffic Signal Control

  • Park, Jeong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.181-190
    • /
    • 2022
  • In this paper, we use a LiDAR sensor and an image camera to detect a left-turning waiting vehicle in two ways, unlike the existing image-type or loop-type left-turn detection system, and a left-turn traffic signal corresponding to the waiting length of the left-turning lane. A system that can efficiently assign a system is introduced. For the LiDAR signal transmitted and received by the LiDAR sensor, the left-turn waiting vehicle is detected in real time, and the image by the video camera is analyzed in real time or at regular intervals, thereby reducing unnecessary computational processing and enabling real-time sensitive processing. As a result of performing a performance test for 5 hours every day for one week with an intersection simulation using an actual signal processor, a detection rate of 99.9%, which was improved by 3% to 5% compared to the existing method, was recorded. The advantage is that 99.9% of vehicles waiting to turn left are detected by the LiDAR sensor, and even if an intentional omission of detection occurs, an immediate response is possible through self-correction using the video, so the excessive waiting time of vehicles waiting to turn left is controlled by all lanes in the intersection. was able to guide the flow of traffic smoothly. In addition, when applied to an intersection in the outskirts of which left-turning vehicles are rare, service reliability and efficiency can be improved by reducing unnecessary signal costs.