• Title/Summary/Keyword: Generated traffic

Search Result 442, Processing Time 0.024 seconds

A Deep Learning Approach with Stacking Architecture to Identify Botnet Traffic

  • Kang, Koohong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.123-132
    • /
    • 2021
  • Malicious activities of Botnets are responsible for huge financial losses to Internet Service Providers, companies, governments and even home users. In this paper, we try to confirm the possibility of detecting botnet traffic by applying the deep learning model Convolutional Neural Network (CNN) using the CTU-13 botnet traffic dataset. In particular, we classify three classes, such as the C&C traffic between bots and C&C servers to detect C&C servers, traffic generated by bots other than C&C communication to detect bots, and normal traffic. Performance metrics were presented by accuracy, precision, recall, and F1 score on classifying both known and unknown botnet traffic. Moreover, we propose a stackable botnet detection system that can load modules for each botnet type considering scalability and operability on the real field.

Automatic Payload Signature Generation System (페이로드 시그니쳐 자동 생성 시스템)

  • Park, Cheol-Shin;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.615-622
    • /
    • 2013
  • Fast and accurate signature extraction is essential to improve the performance of the payload signature-based traffic analysis methods. However the slow manual process in extracting signatures make difficult to deal with the rapidly changing application in current Internet environment. Therefore, in this paper we propose a system automatically generating signatures from ground-truth traffic data. In addition, we improve the efficiency of signature extraction by recognizing the application protocol using a protocol filters and generating signatures automatically according to the application-specific protocol contents. In order to verify the validity of the system proposed in this paper, we compared the signatures automatically generated from our system with the signatures manually created for a few popular applications.

A Study on the Design and Realization of the VHF Transmitter for Air Traffic Control (항공관제용 VHF대역 송신기 설계 및 구현에 관한 연구)

  • Park, Wook-Ki;Kang, Suk-Youb;Park, Hyo-Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.9 no.2
    • /
    • pp.121-130
    • /
    • 2005
  • In this paper, we designed and fabricated the VHF wireless transmitter for air traffic control. Fundamental performance of the investigated wireless transmitter is designed and fabricated to satisfy existing commercial wireless transmitter specification for air traffic control. 25 W and 50 W of output power can be generated by changing the power amplification part only. It is based on transmitting voice communication using AM modulation. Investigated wireless transmitter for air traffic control consists of four module parts: power supply, control, low power transmission and power amplification. We designed 1W transmitter to operate without power amplification part. It can be used properly in a basic component of CNS/ATM.

  • PDF

Causal Relationship Between Indian Ports' Originated Container Traffic and Total Transshipments of Port of Colombo: A Granger Causality Analysis

  • Bandara, Sooriya;Ryoo, Dong-Keun;Ahn, Ki-Myung
    • Journal of Navigation and Port Research
    • /
    • v.42 no.5
    • /
    • pp.357-364
    • /
    • 2018
  • Colombo noticeably became the most economical gateway to the Indian subcontinent, in terms of cost as well as time. The Colombo Port Expansion Project (CPEP) started commencement with the purpose of accommodating mega ships, under the long-term strategies of making Colombo the hub of South Asia. In this context, the purpose of this study is to investigate the causal relationship between Indian ports' originated container traffic, and total transshipments of the port of Colombo, and also to identify the nature of the causality between the two variables, evaluating Granger causality test results. It finds unidirectional causality from total transshipments of Colombo to Indian ports' originated transshipments in the port of Colombo. It suggested that ongoing port expansion projects, opening up for new markets and attracting new shipping lines in the port of Colombo, have generated significant impact on Indian ports' container traffic, via the port of Colombo. Findings would be valuable for future forecasting of container traffic in Colombo port and the policy-making process in the port as well.

Traffic Analysis Monitoring System for Web Server Load Balancing (웹서버의 부하균형을 위한 트래픽상황분석 모니터링 시스템)

  • Choi E-Jung;Lee Eun-Seok;Kim Seok-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.79-85
    • /
    • 2005
  • In order to handle client's requests while multiple servers seamlessly work in the web server cluster environment, it is vital to implement a router that execute a routing using TCP information and requested target content. The implemented package software measured packet volume that was generated from data generator, virtual server, and server 1, 2, 3, and could find out traffic distribution toward Server 1, 2, 3. As the result of the study shows, Round Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some partial cases, they were eventually alleviated by repeated tests for a longer time.

  • PDF

CANCAR - Congestion-Avoidance Network Coding-Aware Routing for Wireless Mesh Networks

  • Pertovt, Erik;Alic, Kemal;Svigelj, Ales;Mohorcic, Mihael
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4205-4227
    • /
    • 2018
  • Network Coding (NC) is an approach recently investigated for increasing the network throughput and thus enhancing the performance of wireless mesh networks. The benefits of NC can further be improved when routing decisions are made with the awareness of coding capabilities and opportunities. Typically, the goal of such routing is to find and exploit routes with new coding opportunities and thus further increase the network throughput. As shown in this paper, in case of proactive routing the coding awareness along with the information of the measured traffic coding success can also be efficiently used to support the congestion avoidance and enable more encoded packets, thus indirectly further increasing the network throughput. To this end, a new proactive routing procedure called Congestion-Avoidance Network Coding-Aware Routing (CANCAR) is proposed. It detects the currently most highly-loaded node and prevents it from saturation by diverting some of the least coded traffic flows to alternative routes, thus achieving even higher coding gain by the remaining well-coded traffic flows on the node. The simulation results confirm that the proposed proactive routing procedure combined with the well-known COPE NC avoids network congestion and provides higher coding gains, thus achieving significantly higher throughput and enabling higher traffic loads both in a representative regular network topology as well as in two synthetically generated random network topologies.

Implementation of Search Engine to Minimize Traffic Using Blockchain-Based Web Usage History Management System

  • Yu, Sunghyun;Yeom, Cheolmin;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.5
    • /
    • pp.989-1003
    • /
    • 2021
  • With the recent increase in the types of services provided by Internet companies, collection of various types of data has become a necessity. Data collectors corresponding to web services profit by collecting users' data indiscriminately and providing it to the associated services. However, the data provider remains unaware of the manner in which the data are collected and used. Furthermore, the data collector of a web service consumes web resources by generating a large amount of web traffic. This traffic can damage servers by causing service outages. In this study, we propose a website search engine that employs a system that controls user information using blockchains and builds its database based on the recorded information. The system is divided into three parts: a collection section that uses proxy, a management section that uses blockchains, and a search engine that uses a built-in database. This structure allows data sovereigns to manage their data more transparently. Search engines that use blockchains do not use internet bots, and instead use the data generated by user behavior. This avoids generation of traffic from internet bots and can, thereby, contribute to creating a better web ecosystem.

A Study on Generating Virtual Shot-Gathers from Traffic Noise Data (교통차량진동 자료에 대한 최적 가상공통송신원모음 제작 연구)

  • Woohyun Son;Yunsuk Choi;Seonghyung Jang;Donghoon Lee;Snons Cheong;Yonghwan Joo;Byoung-yeop Kim
    • Geophysics and Geophysical Exploration
    • /
    • v.26 no.4
    • /
    • pp.229-237
    • /
    • 2023
  • The use of artificial sources such as explosives and mechanical vibrations for seismic exploration in urban areas poses challenges, as the vibrations and noise generated can lead to complaints. As an alternative to artificial sources, the surface waves generated by traffic noise can be used to investigate the subsurface properties of urban areas. However, traffic noise takes the form of plane waves moving continuously at a constant speed. To apply existing surface wave processing/inversion techniques to traffic noise, the recorded data need to be transformed into a virtual shot gather format using seismic interferometry. In this study, various seismic interferometry methods were applied to traffic noise data, and the optimal method was derived by comparing the results in the Radon and F-K domains. Additionally, the data acquired using various receiver arrays were processed using seismic interferometry, and the results were compared and analyzed to determine the most optimal receiver array direction for exploration.

Traffic Correction System Using Vehicle Axles Counts of Piezo Sensors (피에조센서의 차량 축 카운트를 활용한 교통량보정시스템)

  • Jung, Seung-Weon;Oh, Ju-Sam
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.277-283
    • /
    • 2021
  • Traffic data by vehicle classification are important data used as basic data in various fields such as road and traffic design. Traffic data is collected through permanent and temporary surveys and is provided as an annual average daily traffic (AATD) in the statistical yearbook of road traffic. permanent surveys are collected through traffic collection equipment (AVC), and the AVC consists of a loop sensor that detects traffic volume and a piezo sensor that detects the number of axes. Due to the nature of the buried type of traffic collection equipment, missing data is generated due to failure of detection equipment. In the existing method, it is corrected through historical data and the trend of traffic around the point. However, this method has a disadvantage in that it does not reflect temporal and spatial characteristics and that the existing data used for correction may also be a correction value. In this study, we proposed a method to correct the missing traffic volume by calculating the axis correction coefficient through the accumulated number of axes acquired by using a piezo sensor that can detect the axis of the vehicle. This has the advantage of being able to reflect temporal and spatial characteristics, which are the limitations of the existing methods, and as a result of comparative evaluation, the error rate was derived lower than that of the existing methods. The traffic volume correction system using axis count is judged as a correction method applicable to the field system with a simple algorithm.

A Study on the Performance Analysis for Partial Buffer Sharing Priority Mechanism with Two Thresholds (두개의 임계치를 갖는 부분 버퍼공유 우선도 방식의 성능 분석에 관한 연구)

  • 박광채;이재호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.381-389
    • /
    • 1994
  • In the communication network, multimedia service such as high quality voice, high speed data, image etc. will be added to the existing service. This service generates new requirements for the communication networks. The priority control mechanism can be used to control multimedia traffics generated by many communication systems. The priority mechanism which assigns prioirities to generated cells according to service quality is one of the traffic control. The priority assignment can be divided by priority criterion for each traffic characteristics such as loss sensitivity and delay sensitivity. In this paper, we alnalyzed the partial buffur sharing (PBS) mechani느 as a traffic control reducing the cell loss, and proposed analysis method. We analyzed the PBS mechanism using classical approach as a Markov chain. In order to validata proposed analysis method, simulation is performed using simulation package SIMSCRIPT 11.5. From this results, we confirmed that proposed analysis method can be verified. Also, we presented cell loss probability of ATM network when this results are to be applied to ATM networks.

  • PDF