• Title/Summary/Keyword: Network Traffic Analysis

Search Result 1,117, Processing Time 0.028 seconds

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Study on Frequency Selection Method Using Case-Based Reasoning for Cognitive Radio (사례기반 추론 기법을 이용한 인지 라디오 주파수 선택 방법 연구)

  • Park, Jae-Hoon;Choi, Jeung Won;Um, Soo-Bin;Lee, Won-Cheol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.58-71
    • /
    • 2019
  • This paper proposes architecture of a cognitive radio engine platform and the allowable frequency channel reasoning method that enables acquisition of the allowable channels for the military tactical network environment. The current military tactical wireless communication system is increasing need to secure a supplementary radio frequency to ensure that multiple wireless networks for different military wireless devices coexist, so that tactical wireless communication between the same or different systems can be operated effectively. This paper presents the allowable frequency channel reasoning method based on cognitive radio engine for realizing DSA(Dynamic Spectrum Access) as an optimal available frequency channel. To this end, a case-based allowable frequency channel reasoning method for cognitive radio devices is proposed through modeling of primary user's traffic status and calculation of channel occupancy probability. Also through the simulation of the performance analysis, changing rate of collision probability between the primary users' occupancy channel and the available channel acquisition information that can be used by the cognitive radio device was analysed.

Analysis of Forwarding Schemes to Mitigate Data Broadcast Storm in Connected Vehicles over VNDN

  • Hur, Daewon;Lim, Huhnkuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.69-75
    • /
    • 2021
  • Limitation of the TCP/IP network technology included in the vehicle communication is due to the frequent mobility of the vehicle, the increase in intermittent connection requirements, and the constant presence of the possibility of vehicle hacking. VNDN technology enables the transfer of the name you are looking for using textual information without the need for vehicle identifiers like IP/ID. In addition, intermittent connectivity communication is possible rather than end-to-end connection communication. The data itself is the subject of communication based on name-based forwarding using two types of packets: Interest packet and Data packet. One of the issues to be solved for the realization of infotainment services under the VNDN environment is the traffic explosion caused by data broadcasting. In this paper, we analyze and compare the existing technologies to reduce the data broadcast storm. Through this, we derive and analyze the requirements for presenting the best data mitigation technique for solving the data explosion phenomenon in the VNDN environment. We expect this paper can be utilized as prior knowledge in researching improved forwarding techniques to resolve the data broadcast explosion in connected vehicles over NDN.

A Design of DDoS Attack Detection Scheme Using Traffic Analysis and IP Extraction in SIP Network (SIP망에서 트래픽 측정 및 IP 추출을 통한 DDoS공격 탐지 기법 설계)

  • Yun, Sung-Yeol;Sim, Yong-Hoon;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.729-732
    • /
    • 2010
  • 통신망의 발달로 다양한 인터넷 기반 기술들이 등장함에 따라 현재는 데이터뿐만 아닌 음성에 대한 부분도 IP 네트워크를 통해 전송하려는 움직임이 발판이 되어 VoIP(Voice Over Internet Protocol)라는 기술이 등장하였다. SIP(Session Initiation Protocol) 프로토콜 기반 VoIP 서비스는 통신 절감 효과가 큰 장점과 동시에 다양한 부가서비스를 제공하여 사용자 수가 급증하고 있다. VoIP 서비스는 호(Call)를 제어하기 위해 SIP 기반으로 구성이 되며, SIP 프로토콜은 IP 망을 이용하여 다양한 음성과 멀티미디어 서비스를 제공하게 되는데 IP 프로토콜에서 발생하는 인터넷 보안 취약점을 그대로 동반하기 때문에 DoS(Denial of Service) 및 DDoS(Distribute Denial of Service)에 취약한 성향을 가지고 있다. DDoS 공격은 단시간 내에 대량의 패킷을 타깃 호스트 또는 네트워크에 전송하여 네트워크 접속 및 서비스 기능을 정상적으로 작동하지 못하게 하거나 시스템의 고장을 유도하게 된다. 인터넷 기반 생활이 일상화 되어 있는 현 시점에서 안전한 네트워크 환경을 만들기 위해 DDoS 공격에 대한 대응 방안이 시급한 시점이다. DDoS 공격에 대한 탐지는 매우 어렵기 때문에 근본적인 대책 마련에 대한 연구가 필요하며, 정상적인 트래픽 및 악의적인 트래픽에 대한 탐지 시스템 개발이 절실히 요구되는 사항이다. 본 논문에서는 SIP 프로토콜 및 공격기법에 대해 조사하고, DoS와 DDoS 공격에 대한 특성 및 종류에 대해 조사하였으며, SIP를 이용한 VoIP 서비스에서 IP 분류와 메시지 중복 검열을 통한 DDoS 공격 탐지기법을 제안한다.

A Study on Improving the Billing System of the Wireless Internet Service (무선인터넷 서비스의 과금체계 개선에 관한 연구)

  • Min Gyeongju;Hong Jaehwan;Nam Sangsig;Kim Jeongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.597-602
    • /
    • 2005
  • In this study, file size for measurement and the service system's billing data were submitted to a comparative analysis by performing a verification test on the billing system of three major mobile communication services providers, based on the wireless Internet service packet. As shown in the result of the verification test, there were some differences in the billing data due to transmission overhead, according to the network quality that is affected by the wireless environment of mobile operators. Consequently, the packet analysis system was proposed as a means of applying consistent packet billing to all service providers being compared. If the packet analysis system is added to supplement the current billing system various user requirements can be met. Billing by Packet among mobile operators and differentiated billing based on the content value are available, since the packet data can be extracted through protocol analysis by service, and it can be classified by content tape through traffic data analysis. Furthermore, customer's needs can be satisfied who request more information on the detailed usage, and more flexible and diverse billing policies can be supported like application of charging conditions to the non-charging packet handling. All these services are expected to contribute to the popularization of the wireless Internet service, since user complaints about the service charge could be reduced.

Performance Analysis of a Packet Voice Multiplexer Using the Overload Control Strategy by Bit Dropping (Bit-dropping에 의한 Overload Control 방식을 채용한 Packet Voice Multiplexer의 성능 분석에 관한 연구)

  • 우준석;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.1
    • /
    • pp.110-122
    • /
    • 1993
  • When voice is transmitted through packet switching network, there needs a overload control, that is, a control for the congestion which lasts short periods and occurrs in local extents. In this thesis, we analyzed the performance of the statistical packet voice multiplexer using the overload control strategy by bit dropping. We assume that the voice is coded accordng to (4,2) embedded ADPCM and that the voice packet is generated and transmitted according to the procedures in the CCITT recomendation G. 764. For the performance analysis, we must model the superposed packet arrival process to the multiplexer as exactly as possible. It is well known that interarrival times of the packets are highly correlated and for this reason MMPP is more suited for the modelling in the viewpoint of accuracy. Hence the packet arrival process in modeled as MMPP and the matrix geometric method is used for the performance analysis. Performance analysis is similar to the MMPP IG II queueing system. But the overload control makes the service time distribution G dependent on system status or queue length in the multiplexer. Through the performance analysis we derived the probability generating function for the queue length and using this we derived the mean and standard deviation of the queue length and waiting time. The numerical results are verified through the simulation and the results show that the values embedded in the departure times and that in the arbitrary times are almost the same. Results also show bit dropping reduces the mean and the variation of the queue length and those of the waiting time.

  • PDF

Effectiveness Analysis and Application of Phosphorescent Pavement Markings for Improving Visibility (축광노면표시 시인성 개선에 따른 경제성 분석 및 적용방안)

  • Yi, Yongju;Lee, Kyujin;Kim, Sangtae;Choi, Keechoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.5
    • /
    • pp.815-825
    • /
    • 2017
  • Visibility of lane marking is impaired at night or in the rain, which thereby threatens traffic safety. Recently, various studies and technologies have been developed to improve lane marking visibility, such as the extension of lane marking life expectancy (up to 1.5 times), improvement of lane marking equipment productivity, improvement of lane marking visibility by applying phosphorescent material mixed paint. Cost-benefit analysis was performed with considering various benefit items that can be expected. About 45% of traffic accidents would be prevented by improving lane marking visibility. Additionally, accident reduction benefit and traffic congestion reduction benefit were calculated as much as 246 billion KRW per year and 12 billion KRW per year, respectively, by reducing repaint cycle due to enhanced durability. 45 billion KRW per year is expected to reduced with improved lane detection performance of autonomous vehicle. Meanwhile, total increased cost when introducing phosphorescent material mixed paint to 91,195km of nationwide road is identified as 1922 billion KRW per year. However, economic feasibility could not be secured with 0.16 of cost-benefit ratio when applied to the road network as a whole. In case of "Accident Hot Spot" analyzing section window (400m), one or more fatality or two or more injured (one or more injured in case of less than 2 lanes per direction) per year were caused by pavement marking related accident, economic feasibility was secured. In detail, 3.91 of cost-benefit ratio is estimated with comparison of the installation cost for 5,697 of accident hot spot and accident reduction benefit. Some limitations and future research agenda have also been discussed.

AHP Analysis Research to Improve the Busan Port Ship Supplies Industry (부산항 선용품산업의 개선을 위한 AHP 분석 연구)

  • Ei Mon Khaing;Cho, Ye-hee;Ha, Myoung-shin
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.2
    • /
    • pp.21-38
    • /
    • 2024
  • The current situation of ports and related industries is transitioning from quantitative growth in increased cargo volume and expansion of port facilities to qualitative growth in the role of ports through the creation of high value-added. Ports are now recognized as playing an important role in economic growth and development by generating high value-added, not just by increasing the amount of cargo and expanding port facilities. This study evaluated the importance of factors affecting the improvement of the Busan Port's marine equipment industry by using the Analytic Hierarchy Process(AHP) to derive the priority of improvement measures by factor and evaluate the importance of factors affecting the marine equipment industry. The factors that should be considered when selecting improvement measures for the marine equipment industry were selected as four factors: strengthening price competitiveness, increasing government and local government interest, strengthening promotion, and establishing a global network. The main sub-factors were composed of eight detailed evaluation factors by selecting two factors for each layer. The analysis was designed by dividing the factor hierarchy for selecting improvement measures for the marine equipment industry into three levels and creating survey questions for pairwise comparison. The priority of the analysis results using AHP showed that the factor with the highest priority was strengthening price competitiveness, followed by increasing government and local government interest, establishing a global network, and strengthening promotion. According to the analysis results for the second-level sub-factors, among the factors for strengthening price competitiveness, low distribution costs and storage costs were considered most important, followed by avoiding excessive competition among marine equipment companies. Among the factors for increasing government and local government interest, improving customs procedures and tariff refund procedures were considered most important, followed by strengthening incentives from the government and Busan City. Among the factors for establishing a global network, promoting large-scale marine equipment companies was considered most important, followed by actively participating in international marine equipment-related associations. Among the factors for strengthening promotion, active use of the Internet was considered most important, followed by holding domestic and international exhibitions. Based on this study, we hope to help activate Busan Port's market by enhancing its competitiveness through revitalizing its marine equipment industry, generating water traffic, and creating new value-added.

A Fundamental Study on Analysis of Electromotive Force and Updating of Vibration Power Generating Model on Subway Through The Bayesian Regression and Correlation Analysis (베이지안 회귀 및 상관분석을 통한 지하철 진동발전 모델의 수정과 기전력 분석)

  • Jo, Byung-Wan;Kim, Young-Seok;Kim, Yun-Sung;Kim, Yun-Gi
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.26 no.2
    • /
    • pp.139-146
    • /
    • 2013
  • This study is to update of vibration power generating model and to analyze electromotive force on subway. Analysis of electromotive force using power generation depending on classification of locations which are ballast bed and concrete bed. As the section between Seocho and Bangbae in the line 2 subway was changed from ballast bed to concrete bed, it could be analyzed at same condition, train, section. Induced electromotive force equation by Faraday's law was updated using Bayesian regression and correlation analysis with calculate value and experiment value. Using the updated model, it could get 40mV per one power generation in ballast bed, and it also could get 4mV per one power generation in concrete bed. If the updated model apply to subway or any train, it will be more effective to get electric power. In addition to that, it will be good to reduce greenhouse gas and to build a green traffic network.

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.