• Title/Summary/Keyword: Generated traffic

Search Result 445, Processing Time 0.026 seconds

Self-similarity of SMS Traffic (SMS 트래픽의 Self-similarity)

  • Ha, Jun;Shin, Woo-Cheol;Park, Jin-Kyung;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.353-356
    • /
    • 2003
  • As the wireless mobile telecommunication system has been developed with astonishment, its offering service has also widely been expanded including various data service. Currently, the wireless mobile telecommunication network presents voice service that covers for the most part of the whole service areas. For this reason, the availability of the switching capacity in the mobile switching center(MSC) is manipulated by the required volume of voice service. However, considering the increase of data service, it is desirable for the current switching method to be modified for more efficiency. In this Paper, we analyze the data traffic caused by providing data service in the wireless mobile telecommunication network. For this, we are firstly going to review the result of the analysis in the feature of the data traffic. Secondly, based on the review, we are also going to perform analyzing the other feature of the data traffic normally generated in the wireless mobile telecommunication network. We expect that this paper would be utilized as an elementary source for the feature of the SMS data .traffic and it will be an honour for ourselves to work on it.

  • PDF

Flow Labeling Method for Realtime Detection of Heavy Traffic Sources (대량 트래픽 전송자의 실시간 탐지를 위한 플로우 라벨링 방법)

  • Lee, KyungHee;Nyang, DaeHun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.10
    • /
    • pp.421-426
    • /
    • 2013
  • As a greater amount of traffic have been generated on the Internet, it becomes more important to know the size of each flow. Many research studies have been conducted on the traffic measurement, and mostly they have focused on how to increase the measurement accuracy with a limited amount of memory. In this paper, we propose an explicit flow labeling technique that can be used to find out the names of the top flows and to increase the counting upper bound of the existing scheme. The labeling technique is applied to CSM (Counter Sharing Method), the most recent traffic measurement algorithm, and the performance is evaluated using the CAIDA dataset.

An Improved Detecting Scheme of Malicious Codes using HTTP Outbound Traffic (HTTP Outbound Traffic을 이용한 개선된 악성코드 탐지 기법)

  • Choi, Byung-Ha;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.47-54
    • /
    • 2009
  • Malicious codes, which are spread through WWW are now evolved with various hacking technologies However, detecting technologies for them are seemingly not able to keep up with the improvement of hacking and newly generated malicious codes. In this paper, we define the requirements of detecting systems based on the analysis of malicious codes and their spreading characteristics, and propose an improved detection scheme which monitors HTTP Outbound traffic and detects spreading malicious codes in real time. Our proposed scheme sets up signatures in IDS with confirmed HTML tags and Java scripts which spread malicious codes. Through the verification analysis under the real-attacked environment, we show that our scheme is superior to the existing schemes in satisfying the defined requirements and has a higher detection rate for malicious codes.

Comparison of Estimation Methods for the Density on Expressways Using Vehicular Trajectory Data from a Radar Detector (레이더검지기의 차량궤적 정보기반의 고속도로 밀도산출방법에 관한 비교)

  • Kim, Sang-Gu;Han, Eum;Lee, Hwan-Pil;Kim, Hae;Yun, Ilsoo
    • International Journal of Highway Engineering
    • /
    • v.18 no.5
    • /
    • pp.117-125
    • /
    • 2016
  • PURPOSES : The density in uninterrupted traffic flow facilities plays an important role in representing the current status of traffic flow. For example, the density is used for the primary measures of effectiveness in the capacity analysis for freeway facilities. Therefore, the estimation of density has been a long and tough task for traffic engineers for a long time. This study was initiated to evaluate the performance of density values that were estimated using VDS data and two traditional methods, including a method using traffic flow theory and another method using occupancy by comparing the density values estimated using vehicular trajectory data generated from a radar detector. METHODS : In this study, a radar detector which can generate very accurate vehicular trajectory within the range of 250 m on the Joongbu expressway near to Dongseoul tollgate, where two VDS were already installed. The first task was to estimate densities using different data and methods. Thus, the density values were estimated using two traditional methods and the VDS data on the Joongbu expressway. The density values were compared with those estimated using the vehicular trajectory data in order to evaluate the quality of density estimation. Then, the relationship between the space mean speed and density were drawn using two sets of densities and speeds based on the VDS data and one set of those using the radar detector data. CONCLUSIONS : As a result, the three sets of density showed minor differences when the density values were under 20 vehicles per km per lane. However, as the density values become greater than 20 vehicles per km per lane, the three methods showed a significant difference among on another. The density using the vehicular trajectory data showed the lowest values in general. Based on the in-depth study, it was found out that the space mean speed plays a critical role in the calculation of density. The speed estimated from the VDS data was higher than that from the radar detector. In order to validate the difference in the speed data, the traffic flow models using the relationships between the space mean speed and the density were carefully examined in this study. Conclusively, the traffic flow models generated using the radar data seems to be more realistic.

DDoS Attack Analysis Using the Improved ATMSim (개선된 ATMSim을 이용한 DDoS 공격 분석)

  • Jeong, Hae-Duck J.;Ryu, Myeong-Un;Ji, Min-Jun;Cho, You-Been;Ye, Sang-Kug;Lee, Jong-Suk R.
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.19-28
    • /
    • 2016
  • Internet traffic has been significantly increasing due to the development of information and communication networks and the growing numbers of cell phone users that access networks. This paper connects to this issue by presenting a way to detect and analyze a typical DDoS attack that results in Internet breaches and network attacks, which are on the increase. To achieve this goal, we improve features and GUI of the existing ATMSim analysis package and use it. This package operates on a network flow-based analysis method, which means that normal traffic collected through an internal LAN at the Korean Bible University campus as well as anomaly traffic with DDoS attacks are generated. Self-similarity processes are used to analyze normal and anomaly traffic that are collected and generated from the improved ATMSim. Our numerical results obtained from three Hurst parameter estimate techniques show that there is quantitatively a significant difference between normal traffic and anomaly traffic from a self-similarity perspective.

Flexible Multimedia Streaming Based on the Adaptive Chunk Algorithm (적응 청크 알고리즘 기반 멀티미디어 스트리밍 알고리즘)

  • Kim Dong-Hwan;Kim Jung-Keun;Chang Tae-Gyu
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.5
    • /
    • pp.324-326
    • /
    • 2005
  • An adaptive Chunk algorithm is newly devised and a collaborative streaming is designed for high quality multimedia streaming service under time varying traffic conditions. An LMS based prediction filter is used to compensate the effect of time varying background traffic of the WAN. The underflow is generated for the $20\~28\%$ of the data stored in the central server by applying the FARIMA(Fractional Autoregressive Integrated Moving Average) traffic modeling method. The proposed algorithm is tested with the MPEG-2 video files and compensates $71\~85\%$ of central stream underflow.

An Effective ABR Flow Control Algorithm of ATM (ATM망의 ABR 트래픽 관리에 관한 연구)

  • 임청규
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.132-138
    • /
    • 1998
  • A network of Asynchronous Transfer Mode (ATM) will be required to carry the traffics(CVR, VBR, UBR, ABR) generated by a wide range of services. The traffic ABR uses the remined space of the CBR/VBR traffics bandwith. The Rate-based, the Credit-based, and the mixed method that are implementing the control loop of ABR traffic service is on study. In this paper, a new algorithm that can be considered in ATM and effectively manage ABR traffic using VS/VD method and EPRCA algorithm is proposed on the switch of the Rate-based method

  • PDF

Gantry Robot with Extended Workspace for Pavement Sign Painting Operations

  • Hong Daehie;Lee Woo-Chang;Chu Baeksuk;Kim Tae-Hyung;Choi Woo Chun
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.1268-1279
    • /
    • 2005
  • The current method for pavement sign marking operations is labor-intensive and very dangerous due to the exposure of workers to passing traffic. It also requires blocking traffic for a long period of time resulting serious traffic jam. This paper deals with the development of a robotic system for automating the pavement sign painting operations. The robotic system consists of gantry frame equipped with transverse drive rail and automatic paint spray system. The workspace of the gantry robot is extended to one-lane width with the transverse rail system. This research also includes the development of font data structures that contain the shape information of pavement signs, such as Korean letters, English letters and symbols. The robot path is generated with this font data through the procedures of scaling up/down and partitioning the signs to be painted depending on the workspace size.

Intrusion Detection for IoT Traffic in Edge Cloud (에지 클라우드 환경에서 사물인터넷 트래픽 침입 탐지)

  • Shin, Kwang-Seong;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.138-140
    • /
    • 2020
  • As the IoT is applied to home and industrial networks, data generated by the IoT is being processed at the cloud edge. Intrusion detection function is very important because it can be operated by invading IoT devices through the cloud edge. Data delivered to the edge network in the cloud environment is traffic at the application layer. In order to determine the intrusion of the packet transmitted to the IoT, the intrusion should be detected at the application layer. This paper proposes the intrusion detection function at the application layer excluding normal traffic from IoT intrusion detection function. As the proposed method, we obtained the intrusion detection result by decision tree method and explained the detection result for each feature.

NetFlow based IPv6 user's Flow traffic monitoring (NetFlow 기반 IPv6 사용자 Flow traffic 모니터링)

  • Kim, Sung-Su;Song, Wang-Cheol;Oh, Yong-Taek;Choi, Deok-Jai
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.42-46
    • /
    • 2006
  • As the next generation internet (NGI) is supporting High-speed in Gbps rate with the appearance of advanced network technologies, various applications that require high data rates. have been experimented and operated. By using high speed application services, many kinds of problems can be generated but we cannot easily grasp their reasons. However, if the user monitors the end-to-end one's flow data information (path and data rate in each router, state of each router) he can find them more accurately Until now, we have found out the fact that systems which can network-widely monitor end-to-end flow have not be developed yet, only simple systems which can monitor user's individual flow data at just one node are developed In this study, we suggest and materialize a system which can analyze bandwidth in real time by searching routing paths and measuring packet transfer rate between end-to-end flow data and supported flow traffic of using IPv6.

  • PDF