• Title/Summary/Keyword: Traffic identification

Search Result 297, Processing Time 0.022 seconds

Field Measurements of the New CCTV Tower in Beijing

  • Xu, Y.L.;Zhan, S.;Xia, H.;Xia, Y.;Zhang, N.
    • International Journal of High-Rise Buildings
    • /
    • v.2 no.3
    • /
    • pp.171-178
    • /
    • 2013
  • The emergence of a growing number of tall buildings, often with unusual shapes and innovative structural systems, has led to the realization of the need for and the importance of field measurements. The new China Central Television (CCTV) Tower in Beijing is one of tall buildings with a highly unusual shape and a complex structural system, requiring field measurements to identify its dynamic characteristics for the subsequent dynamic analysis of the tower under wind excitation, seismic-induced ground motion and traffic-induced ground motion. The structural system and the finite element model of the CCTV Tower are first introduced in this paper. The computed natural frequencies and mode shapes are then presented as a reference for the field measurement. After introducing the arrangement of the ambient vibration measurement, the field measured natural frequencies and damping ratios of the CCTV Tower are presented and the measured natural frequencies are finally compared with the computed ones. It was found that the structural damping ratios of the CCTV Tower are small and the computed natural frequencies are smaller than the measured ones by about 12~17%.

Network Attacks Visualization using a Port Role in Network Sessions (트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화)

  • Chang, Beomhwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

Studies on the Improvement and Analysis of Data Entry Error to the AIS System for the Traffic Ships in the Korean Coastal Area (우리나라 연안해역을 통항하는 선박에 대한 AIS 데이터 입력 오류의 분석 및 개선 방안 연구)

  • JEON, Jae-Ho;JEONG, Tae-Gweon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.6
    • /
    • pp.1812-1821
    • /
    • 2016
  • The purpose of this study is to survey input data error of ship automatic identification system (AIS) and suggest its improvement. The effects of AIS were observed. Input data error of AIS was investigated by dividing it into dynamic data, static data by targeting actual ships and its improvement method was suggested. The findings are as follows. Looking into accidents before and after AIS is enforced to install on the ship, total collision were decreased after AIS installed. Static data error of AIS took place mainly in the case that ship name, call sign, MMSI, IMO number, ship type, location of antenna (ship length and width) were wrongly input or those data were not input initially. Dynamic data error of AIS was represented by input error of ship's heading. As errors of voyage related data take place as well, confusion is made in sailing or ship condition. Counter measures against the above are as follows. First, reliability of AIS data information should be improved. Second, incessant concern and management should be made on the navigation officers.

Integrated Video Analytics for Drone Captured Video (드론 영상 종합정보처리 및 분석용 시스템 개발)

  • Lim, SongWon;Cho, SungMan;Park, GooMan
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.243-250
    • /
    • 2019
  • In this paper, we propose a system for processing and analyzing drone image information which can be applied variously in disasters-security situation. The proposed system stores the images acquired from the drones in the server, and performs image processing and analysis according to various scenarios. According to each mission, deep-learning method is used to construct an image analysis system in the images acquired by the drone. Experiments confirm that it can be applied to traffic volume measurement, suspect and vehicle tracking, survivor identification and maritime missions.

An authenticated key distribution protocol for the CDMA mobile communication network (부호 분할 다중 접속 이동 통신망을 위한 인증 키 분해 프로토콜)

  • Hak S. Jeon;Dong K. Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.43-54
    • /
    • 1997
  • In this paper, we introduce a secure and minimal protocol for authenticated key distribution over the CDMA mobile communication network. The CDMA mobile communication network has been developed the security protocol that provides a means for user authentication and subsequent protection of user traffic. However, this model has no security assumptions for the intermediate, fixed networks. To avoiding these drawbacks, we introduce a minimal authenticated key distribution protocol. This protocol provides the security of the intermediate and fixed network in mobile environment, and maintains the confidentiality of user identification and the minimum size of information flow compared with the existing protocols.

Moon Phase based Threshold Determination for VIIRS Boat Detection

  • Kim, Euihyun;Kim, Sang-Wan;Jung, Hahn Chul;Ryu, Joo-Hyung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.1
    • /
    • pp.69-84
    • /
    • 2021
  • Awareness of boats is a main issue in areas of fishery management, illegal fishing, and maritime traffic, etc. For the awareness, Automatic Identification System (AIS) and Vessel-Pass System (V-PASS) have been widely used to collect the boat-related information. However, only using these systems makes it difficult to collect the accurate information. Recently, satellite-based data has been increasingly used as a cooperative system. In 2015, U.S. National Oceanic and Atmospheric Administration (NOAA) developed a boat detection algorithm using Visible Infrared Imaging Radiometer Suite (VIIRS) Day & Night Band (DNB) data. Although the detections have been widely utilized in many publications, it is difficult to estimate the night-time fishing boats immediately. Particularly, it is difficult to estimate the threshold due to the lunar irradiation effect. This effect must be corrected to apply a single specific threshold. In this study, the moon phase was considered as the main frequency of this effect. Considering the moon phase, relational expressions are derived and then used as offsets for relative correction. After the correction, it shows a significant reduction in the standard deviation of the threshold compared to the threshold of NOAA. Through the correction, this study can set a constant threshold every day without determination of different thresholds. In conclusion, this study can achieve the detection applying the single specific threshold regardless of the moon phase.

UDP-Based Active Scan for IoT Security (UAIS)

  • Jung, Hyun-Chul;Jo, Hyun-geun;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.20-34
    • /
    • 2021
  • Today, IoT devices are flooding, and traffic is increasing rapidly. The Internet of Things creates a variety of added value through connections between devices, while many devices are easily targeted by attackers due to security vulnerabilities. In the IoT environment, security diagnosis has problems such as having to provide different solutions for different types of devices in network situations where various types of devices are interlocked, personal leakage of security solutions themselves, and high cost, etc. To avoid such problems, a TCP-based active scan was presented. However, the TCP-based active scan has limitations that it is difficult to be applied to real-time systems due to long detection times. To complement this, this study uses UDP-based approaches. Specifically, a lightweight active scan algorithm that effectively identifies devices using UPnP protocols (SSDP, MDNS, and MBNS) that are most commonly used by manufacturers is proposed. The experimental results of this study have shown that devices can be distinguished by more than twice the true positive and recall at an average time of 1524 times faster than Nmap, which has a firm position in the field.

Analysis of Regulation and Standardization Trends for Drone Remote ID (드론 원격 식별 규정 및 표준화 동향 분석)

  • Kim, H.W.;Kang, K.S.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.

Identification of Unknown Cryptographic Communication Protocol and Packet Analysis Using Machine Learning (머신러닝을 활용한 알려지지 않은 암호통신 프로토콜 식별 및 패킷 분류)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.193-200
    • /
    • 2022
  • Unknown cryptographic communication protocols may have advantage of guaranteeing personal and data privacy, but when used for malicious purposes, it is almost impossible to identify and respond to using existing network security equipment. In particular, there is a limit to manually analyzing a huge amount of traffic in real time. Therefore, in this paper, we attempt to identify packets of unknown cryptographic communication protocols and separate fields comprising a packet by using machine learning techniques. Using sequential patterns analysis, hierarchical clustering, and Pearson's correlation coefficient, we found that the structure of packets can be automatically analyzed even for an unknown cryptographic communication protocol.