• Title/Summary/Keyword: Traffic identification

Search Result 297, Processing Time 0.05 seconds

Pattern-based Signature Generation for Identification of HTTP Applications (HTTP 응용들의 식별을 위한 패턴 기반의 시그니쳐 생성)

  • Jin, Chang-Gyu;Choi, Mi-Jung
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.101-111
    • /
    • 2013
  • Internet traffic volume has been increasing rapidly due to popularization of various smart devices and Internet development. In particular, HTTP-based traffic volume of smart devices is increasing rapidly in addition to desktop traffic volume. The increased mobile traffic can cause serious problems such as network overload, web security, and QoS. In order to solve these problems of the Internet overload and security, it is necessary to accurately detect applications. Traditionally, well-known port based method is utilized in traffic classification. However, this method shows low accuracy since P2P applications exploit a TCP/80 port, which is used for the HTTP protocol; to avoid firewall or IDS. Signature-based method is proposed to solve the lower accuracy problem. This method shows higher analysis rate but it has overhead of signature generation. Also, previous signature-based study only analyzes applications in HTTP protocol-level not application-level. That is, it is difficult to identify application name. Therefore, previous study only performs protocol-level analysis. In this paper, we propose a signature generation method to classify HTTP-based traffics in application-level using the characteristics of typical semi HTTP header. By applying our proposed method to campus network traffic, we validate feasibility of our method.

A study on the estimation of underwater shipping noise using automatic identification system data (선박자동식별장치 데이터를 이용한 수중 선박소음 추정 연구)

  • Park, Ji Sung;Kang, Donhyug;Kim, Hansoo;Kim, Mira;Cho, Sungho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.3
    • /
    • pp.129-138
    • /
    • 2018
  • In port and coastal areas where ship traffic is frequent, ship noise dominantly influences underwater noise in low frequency band below 1 kHz. In this paper, we propose a modeling method to estimate the underwater shipping noise using the voyage information of ship observed in AIS (Automatic Identification System). For the purpose of ship noise modeling, the navigation information of the vessels operating in the southern part of Jeju was observed using AIS and underwater noise was measured by installing a hydrophone in the experimental area to verify the modeled ship noise. AIS data were used to model the noise level of ship and compared with measured underwater noise. The variation of noise level with time was found to be similar, and the cause of the error was discussed. Through this study, it was confirmed that the noise level of ship can be estimated within 5 dB error range using AIS data.

A MOM-based algorithm for moving force identification: Part I - Theory and numerical simulation

  • Yu, Ling;Chan, Tommy H.T.;Zhu, Jun-Hua
    • Structural Engineering and Mechanics
    • /
    • v.29 no.2
    • /
    • pp.135-154
    • /
    • 2008
  • The moving vehicle loads on a bridge deck is one of the most important live loads of bridges. They should be understood, monitored and controlled before the bridge design as well as when the bridge is open for traffic. A MOM-based algorithm (MOMA) is proposed for identifying the timevarying moving vehicle loads from the responses of bridge deck in this paper. It aims at an acceptable solution to the ill-conditioning problem that often exists in the inverse problem of moving force identification. The moving vehicle loads are described as a combination of whole basis functions, such as orthogonal Legendre polynomials or Fourier series, and further estimated by solving the new system equations developed with the basis functions. A number of responses have been combined, some numerical simulations on single axle, two axle and multiple-axle loads, being either constant or timevarying, have been carried out and compared with the existing time domain method (TDM) in this paper. The illustrated results show that the MOMA has higher identification accuracy and robust noise immunity as well as producing an acceptable solution to ill-conditioning cases to some extent when it is used to identify the moving force from bridge responses.

A Study on the Current State and Improvement of the AIS (AIS 시스템의 현황과 개선 방안에 관한 연구)

  • Park Gyei-Kark;Jung Jae-Yong;Lee Ju-Whan;Seo Ki-Yeol
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2005.05a
    • /
    • pp.209-213
    • /
    • 2005
  • The current AIS network and. system are run on a full scale with 22 ground stations and. 11 operational systems, completing a nation-wide, integrated network However, currently it needs to manage sea traffic by linking AIS to VIS which 1vs a limited service area due to restricted radar detection zones in harbors or coastal areas. Accordingly this study analyzes the current status of the AIS system and. proposes technological and. operational improvement plan of the current AIS system through investigating the actual conditions of the AIS system and. its operations.

  • PDF

Application Study of Vessel Traffic Service: Dynamic Analysis of AIS for Shocheongcho Ocean Research Station (해상교통관제정보 활용 연구: 빅데이터 기반 해양 공간 선박 활동 특성 해석)

  • Park, Ju-Han;Kim, Seung-Ryong;Yang, Chan-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.206-207
    • /
    • 2019
  • 우리나라에서 해상교통관제시스템(Vessel Traffic Service, VTS) 구역을 설정하여, 관제사를 중심으로 한 VTS와 선박사이의 해상교통상황 등의 교환을 통해 항만의 안전과 항만운영의 효율을 높이고 있다. 향후, 연안으로 확대될 예정이다. 더 넓은 해역에 대해서는 해양안전종합정보시스템(GICOMS)이 있으며, 선박자동식별장치 (AIS), 장거리위치추적시스템 (LRIT) 등에서 송신하는 선박의 운항정보를 수신하여 전자해도에 표시하고 있다. 이와 같은 선박관제정보는 빅데이터로 향후 자동화된 분석과 제원체계가 요구된다. 여기서는 해상교통관제정보 기초 활용 연구로, 소청초 종합해양과학기지주변의 AIS (Automatic Identification System)정보를 사용하여 선박 활동 특성 해석을 진행하였다.

  • PDF

A Development of Analysis System for Vessel Traffic Display and Statistics based on Maritime-BigData (해상-빅데이터 기반 선박 항적 표시 및 해상교통량 통계 분석 시스템의 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Shin, Il-Sik;Song, Sang-Kee;Nam, Gyeung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1195-1202
    • /
    • 2016
  • Recently, a lot of studies that applying the big data technology to various fields, are progressing actively. In the maritime domain, the big data is the meaningful information which makes and gathers by the navigation and communication equipment from the many ships on the ocean. Also, importance of the maritime safety is emphasized, because maritime accidents are rising with increasing of maritime traffic. To support prevention of maritime accidents, in this paper, we developed a vessel traffic display and statistic system based on AIS messages from the many vessels of maritime. Also, to verify the developed system, we conducted tests for vessel track display function and vessel traffic statistic function based on two test scenarios. Therefore, we verified the effectiveness of the developed system for vessel tracks display, abnormal navigation patterns, checking failure of AIS equipments and maritime traffic statistic analyses.

Development of Vehicle Arrival Time Prediction Algorithm Based on a Demand Volume (교통수요 기반의 도착예정시간 산출 알고리즘 개발)

  • Kim, Ji-Hong;Lee, Gyeong-Sun;Kim, Yeong-Ho;Lee, Seong-Mo
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.2
    • /
    • pp.107-116
    • /
    • 2005
  • The information on travel time in providing the information of traffic to drivers is one of the most important data to control a traffic congestion efficiently. Especially, this information is the major element of route choice of drivers, and based on the premise that it has the high degree of confidence in real situation. This study developed a vehicle arrival time prediction algorithm called as "VAT-DV" for 6 corridors in total 6.1Km of "Nam-san area trffic information system" in order to give an information of congestion to drivers using VMS, ARS, and WEB. The spatial scope of this study is 2.5km~3km sections of each corridor, but there are various situations of traffic flow in a short period because they have signalized intersections in a departure point and an arrival point of each corridor, so they have almost characteristics of interrupted and uninterrupted traffic flow. The algorithm uses the information on a demand volume and a queue length. The demand volume is estimated from density of each points based on the Greenburg model, and the queue length is from the density and speed of each point. In order to settle the variation of the unit time, the result of this algorithm is strategically regulated by importing the AVI(Automatic Vehicle Identification), one of the number plate matching methods. In this study, the AVI travel time information is composed by Hybrid Model in order to use it as the basic parameter to make one travel time in a day using ILD to classify the characteristics of the traffic flow along the queue length. According to the result of this study, in congestion situation, this algorithm has about more than 84% degree of accuracy. Specially, the result of providing the information of "Nam-san area traffic information system" shows that 72.6% of drivers are available.

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

The Interpolation Method for the missing AIS Data of Ship

  • Nguyen, Van-Suong;Im, Nam-kyun;Lee, Sang-min
    • Journal of Navigation and Port Research
    • /
    • v.39 no.5
    • /
    • pp.377-384
    • /
    • 2015
  • The interpolation of missing AIS data can be used for recovering the lost data of a ship's state which is then able to produce useful information for VTS stations or other ships. Previous research has introduced some interpolating methods however there are some problems with regard to missing AIS data. This paper proposes one new method which includes linear interpolation, cubic Hermit interpolation and an identification mechanism to overcome some of those limitations, first AIS data regarding ship position, COG, SOG and HDG is divided into separate time series, then the characteristic of the missing data is investigated into through using an identification mechanism, an appropriate interpolation is selected to fit all the time series which matches the characteristics. Numerical experiments are carried out using real AIS data to validate the algorithm of this approach and the results are compared with the previous method, after which the actual missing area is suggested to be interpolated by the proposed method. The interpolation results show this approach can be applied well in practice.

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF