• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.028 seconds

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

Intrusion Detection Methodology for SCADA system environment based on traffic self-similarity property (트래픽 자기 유사성(Self-similarity)에 기반한 SCADA 시스템 환경에서의 침입탐지방법론)

  • Koh, Pauline;Choi, Hwa-Jae;Kim, Se-Ryoung;Kwon, Hyuk-Min;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.267-281
    • /
    • 2012
  • SCADA system is a computer system that monitors and controls the national infrastructure or industrial process including transportation facilities, water treatment and distribution, electrical power transmission and distribution, and gas pipelines. The SCADA system has been operated in a closed network, but it changes to open network as information and communication technology is developed rapidly. As the way of connecting with outside user extends, the possibility of exploitation of vulnerability of SCADA system gets high. The methodology to protect the possible huge damage caused by malicious user should be developed. In this paper, we proposed anomaly detection based intrusion detection methodology by estimating self-similarity of SCADA system.

Development of Traffic Safety Monitoring Technique by Detection and Analysis of Hazardous Driving Events in V2X Environment (V2X 환경에서 위험운전이벤트 검지 및 분석을 통한 교통안전 모니터링기법 개발)

  • Jeong, Eunbi;Oh, Cheol;Kang, Kyeongpyo;Kang, Younsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.1-14
    • /
    • 2012
  • Traffic management centers (TMC) collect real-time traffic data from the field and have powerful databases for analysing, recording, and archiving the data. Recent advanced sensor and communication technologies have been widely applied to intelligent transportation systems (ITS). Regarding sensors, various in-vehicle sensors, in addition to global positioning system (GPS) receiver, are capable of providing high resolution data representing vehicle maneuverings. Regarding communication technologies, advanced wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-vehicle infrastructure (V2I), which are generally referred to as V2X, have been widely used for traffic information and operations (references). The V2X environment considers the transportation system as a network in which each element, such as the vehicles, infrastructure, and drivers, communicates and reacts systematically to acquire information without any time and/or place restrictions. This study is motivated by needs of exploiting aforementioned cutting-edge technologies for developing smarter transportation services. The proposed system has been implemented in the field and discussed in this study. The proposed system is expected to be used effectively to support the development of various traffic information control strategies for the purpose of enhancing traffic safety on highways.

Detection Performance Comparison of ADS-B and TCAS Using Simulation (시뮬레이션을 활용한 ADS-B와 TCAS의 탐지 성능 비교)

  • So, Jun-Soo;KU, SungKwan;Hong, Gyo-young
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.465-472
    • /
    • 2015
  • In order to improve the performance of TCAS it should improve the performance of the sensor, which transmits a variety of information. In this paper, To improve the performance of the existing radar sensors such as being used in behalf of the next generation air traffic control system, ads-b the applied. In addition, ADS-B in a high precision by using information from the correction GPS system, SBAS assume would be able to apply an improved location accuracy for TCAS and analyzed TCAS and ADS-B. Played the simulation results, TCAS equipment receives the help of these ADS-B can calculate a CPA to determine the position of the aircraft in advance, and it was confirmed that it is possible to reduce the unnecessary RA operation, also, the pilot reduction and the workload, it has advantages such as fuel consumption and time associated with the reduced operation unnecessary RA was confirmed.

Development of Integrated Traffic Control System (Yolov5를 적용한 교통단속 통합 시스템 설계)

  • Yang, Young-jun;Jang, Sung-jin;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.239-241
    • /
    • 2022
  • Currently, in Korea, a multi-seater lane (HOV) and a designated lane system are being implemented to solve traffic congestion. However, in both systems, it is difficult to crack down on cases of violations without permission, so people are required to be assigned to areas that want to crack down. In this process, manpower and budget are inefficiently consumed. To compensate for these shortcomings, we propose the development of an integrated enforcement system through YOLO, a deep learning object recognition model. If the two systems are implemented and integrated using YOLO, they will have advantages in terms of manpower and budget over existing systems because only data learning and system maintenance are considered. In addition, in the case of violations in which it is difficult for the existing unmanned system to crack down, the effect of increasing the crackdown rate through continuous learning can be expected.

  • PDF

The Development of Vehicle Counting System at Intersection Using Mean Shift (Mean Shift를 이용한 교차로 교통량 측정 시스템 개발)

  • Chun, In-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.38-47
    • /
    • 2008
  • A vehicle counting system at intersection is designed and implemented using analyzing a video stream from a camera. To separate foreground image from background, we compare three different methods, among which Li's method is chosen. Blobs are extracted from the foreground image using connected component analysis and the blobs are tracked by a blob tracker, frame by frame. The primary tracker use only the size and location of blob in foreground image. If there is a collision between blobs, the mean-shift tracking algorithm based on color distribution of blob is used. The proposed system is tested using real video data at intersection. If some huristics is applied, the system shows a good detection rate and a low error rate.

  • PDF

A decentralized approach to damage localization through smart wireless sensors

  • Jeong, Min-Joong;Koh, Bong-Hwan
    • Smart Structures and Systems
    • /
    • v.5 no.1
    • /
    • pp.43-54
    • /
    • 2009
  • This study introduces a novel approach for locating damage in a structure using wireless sensor system with local level computational capability to alleviate data traffic load on the centralized computation. Smart wireless sensor systems, capable of iterative damage-searching, mimic an optimization process in a decentralized way. The proposed algorithm tries to detect damage in a structure by monitoring abnormal increases in strain measurements from a group of wireless sensors. Initially, this clustering technique provides a reasonably effective sensor placement within a structure. Sensor clustering also assigns a certain number of master sensors in each cluster so that they can constantly monitor the structural health of a structure. By adopting a voting system, a group of wireless sensors iteratively forages for a damage location as they can be activated as needed. Since all of the damage searching process occurs within a small group of wireless sensors, no global control or data traffic to a central system is required. Numerical simulation demonstrates that the newly developed searching algorithm implemented on wireless sensors successfully localizes stiffness damage in a plate through the local level reconfigurable function of smart sensors.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Development of a WPAN-based Self-positioning System for Indoor Flying Robots (실내 비행 로봇을 위한 WPAN 기반 자가 측위 시스템 개발)

  • Lim, Jeong-Min;Jeong, Won-Min;Sung, Tae-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.5
    • /
    • pp.490-495
    • /
    • 2015
  • As flying robots are becoming popular, there are increased needs to use themforsuch purposes as parcel delivery, serving in restaurants, and stage performances. To control flying robots such as quad copters, localization is essential. In order to properly position flying robots, many techniques are in development, including IR (infra-red)-based systemswhich catch markers on a flying robot in order that it can position itself. However, this technique demonstrates only short coverage. Furthermore, localization from inertial sensors diverges as time passes. For this reason, this paper suggests a TWR (two-way ranging) based positioning technique. Despite the weaknesses in currently available TWR system, this paper suggests a self-positioning and outlier detection technique in order to provide reliable position information with a faster update rate. The self-positioning system sends a shorter message which reduces wireless traffic. By detecting and removing outlier measurements, a positioning result with better accuracy is acquired. Finally, this paper shows that the suggesting system detects outlierssequentially from less than half the number of anchors in localization system according to the degree of outlier in measurement and the noise level. By performing an outlier algorithm, better positioning accuracy is acquired as shown in the experimental result.

A Study on the Tracking Algorithm for BSD Detection of Smart Vehicles (스마트 자동차의 BSD 검지를 위한 추적알고리즘에 관한 연구)

  • Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.47-55
    • /
    • 2023
  • Recently, Sensor technologies are emerging to prevent traffic accidents and support safe driving in complex environments where human perception may be limited. The UWS is a technology that uses an ultrasonic sensor to detect objects at short distances. While it has the advantage of being simple to use, it also has the disadvantage of having a limited detection distance. The LDWS, on the other hand, is a technology that uses front image processing to detect lane departure and ensure the safety of the driving path. However, it may not be sufficient for determining the driving environment around the vehicle. To overcome these limitations, a system that utilizes FMCW radar is being used. The BSD radar system using FMCW continuously emits signals while driving, and the emitted signals bounce off nearby objects and return to the radar. The key technologies involved in designing the BSD radar system are tracking algorithms for detecting the surrounding situation of the vehicle. This paper presents a tracking algorithm for designing a BSD radar system, while explaining the principles of FMCW radar technology and signal types. Additionally, this paper presents the target tracking procedure and target filter to design an accurate tracking system and performance is verified through simulation.