• Title/Summary/Keyword: traffic detection system

Search Result 532, Processing Time 0.027 seconds

A Travel Speed Prediction Model for Incident Detection based on Traffic CCTV (돌발상황 검지를 위한 교통 CCTV 기반 통행속도 추정 모델)

  • Ki, Yong-Kul;Kim, Yong-Ho
    • Journal of Industrial Convergence
    • /
    • v.18 no.3
    • /
    • pp.53-61
    • /
    • 2020
  • Travel speed is an important parameter for measuring road traffic and incident detection system. In this paper I suggests a model developed for estimating reliable and accurate average roadway link travel speeds using image processing sensor. This method extracts the vehicles from the video image from CCTV, tracks the moving vehicles using deep neural network, and extracts traffic information such as link travel speeds and volume. The algorithm estimates link travel speeds using a robust data-fusion procedure to provide accurate link travel speeds and traffic information to the public. In the field tests, the new model performed better than existing methods.

Robust Traffic Monitoring System by Spatio-Temporal Image Analysis (시공간 영상 분석에 의한 강건한 교통 모니터링 시스템)

  • 이대호;박영태
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1534-1542
    • /
    • 2004
  • A novel vision-based scheme of extracting real-time traffic information parameters is presented. The method is based on a region classification followed by a spatio-temporal image analysis. The detection region images for each traffic lane are classified into one of the three categories: the road, the vehicle, and the shadow, using statistical and structural features. Misclassification in a frame is corrected by using temporally correlated features of vehicles in the spatio-temporal image. Since only local images of detection regions are processed, the real-time operation of more than 30 frames per second is realized without using dedicated parallel processors, while ensuring detection performance robust to the variation of weather conditions, shadows, and traffic load.

DNS key technologies based on machine learning and network data mining

  • Xiaofei Liu;Xiang Zhang;Mostafa Habibi
    • Advances in concrete construction
    • /
    • v.17 no.2
    • /
    • pp.53-66
    • /
    • 2024
  • Domain Name Systems (DNS) provide critical performance in directing Internet traffic. It is a significant duty of DNS service providers to protect DNS servers from bandwidth attacks. Data mining techniques may identify different trends in detecting anomalies, but these approaches are insufficient to provide adequate methods for querying traffic data in significant network environments. The patterns can enable the providers of DNS services to find anomalies. Accordingly, this research has used a new approach to find the anomalies using the Neural Network (NN) because intrusion detection techniques or conventional rule-based anomaly are insufficient to detect general DNS anomalies using multi-enterprise network traffic data obtained from network traffic data (from different organizations). NN was developed, and its results were measured to determine the best performance in anomaly detection using DNS query data. Going through the R2 results, it was found that NN could satisfactorily perform the DNS anomaly detection process. Based on the results, the security weaknesses and problems related to unpredictable matters could be practically distinguished, and many could be avoided in advance. Based on the R2 results, the NN could perform remarkably well in general DNS anomaly detection processing in this study.

Detection of Deterioration of Traffic Signal Controller Through Real-Time Monitoring (실시간 감시를 통한 교통신호제어기의 열화 감지)

  • Kim, Eun Y.;Jang, Joong S.;Oh, Bong S.;Park, Sang C.
    • Journal of Applied Reliability
    • /
    • v.18 no.2
    • /
    • pp.153-160
    • /
    • 2018
  • Purpose: A traffic signal controller needs to control and coordinate to ensure that traffic and pedestrians move as smoothly as possible. Since a traffic signal controller has a significant impact on the safety of vehicles and pedestrians, it is important to monitor the failure and deterioration of the traffic signal controller. The purpose of this paper is to propose an IoT (Internet of Things)-based monitoring system for a traffic signal controller. Methods: Every traffic signal controller has a nominal system trajectory specified when it is deployed. The proposed IoT-based monitoring system collects the system trajectory information through real-time monitoring. By comparing the nominal system trajectory and the monitored system trajectory, we are able to detect the failure and deterioration of the traffic signal controller. Conclusion: The proposed IoT-based monitoring system can contribute to the safety of vehicles and pedestrians by maximizing the availability of a traffic signal controller.

The Intelligent Intrusion Detection Systems using Automatic Rule-Based Method (자동적인 규칙 기반 방법을 이용한 지능형 침입탐지시스템)

  • Yang, Ji-Hong;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.6
    • /
    • pp.531-536
    • /
    • 2002
  • In this paper, we have applied Genetic Algorithms(GAs) to Intrusion Detection System(TDS), and then proposed and simulated the misuse detection model firstly. We have implemented with the KBD contest data, and tried to simulated in the same environment. In the experiment, the set of record is regarded as a chromosome, and GAs are used to produce the intrusion patterns. That is, the intrusion rules are generated. We have concentrated on the simulation and analysis of classification among the Data Mining techniques and then the intrusion patterns are produced. The generated rules are represented by intrusion data and classified between abnormal and normal users. The different rules are generated separately from three models "Time Based Traffic Model", "Host Based Traffic Model", and "Content Model". The proposed system has generated the update and adaptive rules automatically and continuously on the misuse detection method which is difficult to update the rule generation. The generated rules are experimented on 430M test data and almost 94.3% of detection rate is shown.3% of detection rate is shown.

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

Designing a system to defend against RDDoS attacks based on traffic measurement criteria after sending warning alerts to administrators (관리자에게 경고 알림을 보낸 후 트래픽 측정을 기준으로 RDDoS 공격을 방어하는 시스템 설계)

  • Cha Yeansoo;Kim Wantae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.109-118
    • /
    • 2024
  • Recently, a social issue has arisen involving RDDoS attacks following the sending of threatening emails to security administrators of companies and institutions. According to a report published by the Korea Internet & Security Agency and the Ministry of Science and ICT, survey results indicate that DDoS attacks are increasing. However, the top response in the survey highlighted the difficulty in countering DDoS attacks due to issues related to security personnel and costs. In responding to DDoS attacks, administrators typically detect anomalies through traffic monitoring, utilizing security equipment and programs to identify and block attacks. They also respond by employing DDoS mitigation solutions offered by external security firms. However, a challenge arises from the initial failure in early response to DDoS attacks, leading to frequent use of detection and mitigation measures. This issue, compounded by increased costs, poses a problem in effectively countering DDoS attacks. In this paper, we propose a system that creates detection rules, periodically collects traffic using mail detection and IDS, notifies administrators when rules match, and Based on predefined threshold, we use IPS to block traffic or DDoS mitigation. In the absence of DDoS mitigation, the system sends urgent notifications to administrators and suggests that you apply for and use of a cyber shelter or DDoS mitigation. Based on this, the implementation showed that network traffic was reduced from 400 Mbps to 100 Mbps, enabling DDoS response. Additionally, due to the time and expense involved in modifying detection and blocking rules, it is anticipated that future research could address cost-saving through reduced usage of DDoS mitigation by utilizing artificial intelligence for rule creation and modification, or by generating rules in new ways.

A Study on Incident Detection Model using Fuzzy Logic and Traffic Pattern (퍼지논리와 교통패턴을 이용한 유고검지 모형에 관한 연구)

  • Hong, Nam-Kwan;Choi, Jin-Woo;Yang, Young-Kyu
    • Journal of Korea Spatial Information System Society
    • /
    • v.9 no.1
    • /
    • pp.79-90
    • /
    • 2007
  • In this paper we proposed and implemented an incident detection model which combines fuzzy algorithm and traffic pattern in order to enhance the efficiency of incident detection for the highways with lamps. Most of the existing algorithms dealt with highways without lamps and can not be used for detecting incidents in the highways with lamps. The data used for model building are traffic volume, occupancy, and speed data. They have been collected by a loop sensor at 5 minutes interval at a point in the Internal Circular Highway of Seoul for the period of 3 months. In this model, the three parameters collected by sensor were fuzzified and combined with the daily traffic pattern of the link. The test of efficiency of the propsed model was performed by comparing the result of proposed model with traditional APID algorithm and fuzzy algorithm without the pattern data respectively. The result showed significant amount of improvement in reducing the false incident detection rate by 18%.

  • PDF

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

Blackbox-Based a Vehicle Emergency Situation Detection and Notification System (블랙박스 기반의 차량용 응급상황 감지 및 통보시스템)

  • Kwon, Doo-Wy;Lee, Hoon-Jae;Park, Su-Hyun;Do, Kyeong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2423-2428
    • /
    • 2010
  • The number of motor vehicle registrations in Korea is increasing steadily each year, driven by industry development and economic growth. The number of traffic accidents is also rapidly increasing. Korea has a relatively high number of traffic accidents among OECD member countries, and it ranks among the highest in traffic accident death rates. This death rate is higher compared to death rates as a proportion of the number of traffic accidents in each country. It is very common for drivers to lose consciousness in traffic collisions, which leads to a failure to carry out early emergency measures. In order to prevent such situations as well as hit-and-runs and people left uncared for after traffic accidents, there is a need for motor vehicle black boxes and accident report systems. This study addressed the need for an emergency evacuation system for people injured in traffic accidents and a secondary traffic accident prevention system by developing a motor vehicle emergency situation detection and report system combined with a black box, and materializing it as an actual system.