• 제목/요약/키워드: Traffic monitoring and analysis

Search Result 232, Processing Time 0.026 seconds

Evaluation of Traffic Load and Moisture-Induced Nonlinear In-Situ Stress on Pavement Foundation Layers (도로기초에서 교통 및 환경하중에 의한 비선형 현장 응력 거동 평가)

  • Park, Seong-Wan;Hwang, Kyu-Young;An, Dong-Seok;Jeong, Mun-Kyoung;Seo, Young-Guk
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.11-16
    • /
    • 2009
  • Better understanding of in-situ mechanical behavior of pavement foundations is very important to predict long-term effects on the system performance of transport infrastructure. In order to do that, resilient stiffness characterization of geomaterals is needed to properly adopt such mechanistic analysis under both traffic and environmental loadings. In this paper, in situ monitoring data from KHC test road was used to analyze the non-linearity of stress conditions under traffic and moisture loadings. Then, the predicted non-linear response using finite element method with a selected constitutive model of foundation geomaterials are verified with the field data.

  • PDF

Development of Traffic Situation Integrated Monitoring Indicators Combining Traffic and Safety Characteristics (교통소통과 안전 특성을 결합한 교통상황 모니터링 지표 개발)

  • Young-Been Joo;Jun-Byeong Chae;Jae-Seong Hwang;Choul-Ki Lee;Sang-Soo Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.1
    • /
    • pp.13-25
    • /
    • 2024
  • In traffic management, gaps in understanding traffic conditions continue to exist. While the self-belonging problem indicator develops relative to speed, belonging, and self-based relative inclination, it does not apply elimination criteria that may indicate situations that contrast with attribute-specific problems. In this study, we develop integrated indicators that specify communication situations and safety levels for modeling. We review indicators of changes in traffic conditions and raise safety issues, reviewing the indicators so that ITS data can be applied, analyzing the relationships between indicators through factor analysis. We develop combined, integrated indicators that can show changes and stability in traffic situations and that can be applied in traffic information centers to contribute to the development of a traffic environment that can monitor related traffic conditions.

Harmful Traffic Detection by Web Traffic Analysis (웹 트래픽 분석을 통한 유해 트래픽 탐지)

  • Shin, Hyun-Jun;Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.221-229
    • /
    • 2007
  • Security of the port TCP/80 has been demanded by reason that the others besides web services have been rapidly increasing use of the port. Existing traffic analysis approaches can't distinguish web services traffic from application services when traffic passes though the port. monitoring method based on protocol and port analysis were weak in analyzing harmful traffic using the web port on account of being unable to distinguish payload. In this paper, we propose a method of detecting harmful traffic by web traffic analysis. To begin, traffic Capture by real time and classify by web traffic. Classed web traffic sorts each application service details and apply weight and detect harmful traffic. Finally, method propose and implement through coding. Therefore have a purpose of these paper to classify existing traffic analysis approaches was difficult web traffic classified normal traffic and harmful traffic and improved performance.

  • PDF

LAN Packet Trace Analysis-What is the Extent of WWW Traffic\ulcorner (LAN 패킷 분석을 통한 WWW이 통신상에 끼치는 영향)

  • Lee, Ben;Andreas Schmid;Go, Jin-Gwang;Gwak, Han-Tak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2900-2910
    • /
    • 1999
  • Since its introduction in the early 1990s, the quick growth of the world Wide Web (WWW) traffic raises the question whether past LAN packet traces still reflect the current situation or whether they have become obsolete. For this study, several LAN packet traces were obtained by monitoring the LAN of a typical academic environment. The tools for monitoring the network were a stand-alone HP LAN Protocol Analyzer as well as the free-ware software tool tcpdump. Our main focus was placed on acquiring a low-level overview of the LAN traffic. Thus, we could determine what protocols were mainly used and how the packet sizes were distributed. In particular, we were interested in establishing the amount of WWW traffic on the LAN, and what MIME-Types this traffic is subdivided into. Our results indicate that in a typical academic environment such as ours, conventional sources of LAN traffic such as NFS are still predominant, whereas WWW traffic plays a rather marginal role. Furthermore, we verified that a large portion of the network packets contains little or no data at all, while another significant portion of the packets has sizes around the MTU. Consequently, research in the networking field has to direct its focus on issues beyond the WWW.

  • PDF

Performance Measurement and Analysis of Intranet using DPE-based Performance Management System

  • Kim, Seoung-Woo;Kim, Chul;Shin, Jae-Kwang;Kim, Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.282-294
    • /
    • 2002
  • The modern telecommunication networks are composed of various network-type and are managed by various management technologies, such as TMN, SNMP, TINA etc. Furthermore, the network user's needs of real-time multimedia services are rapidly increasing. In order to guarantee the user-requested quality-of-service(QoS) and keep the network utilization at maximum, it is required to manage the network performance continuously after the network is deployed. The performance management function should provide the useful information for the network expansion and the capacity reallocation in the future. In this paper, we propose a DPE-based performance management architecture for the integrated management of the heterogeneous network elements with TMN and SNMP. We propose an approach to provide the Intranet traffic monitoring and analysis function using layered network management concept and distributed processing technology. The proposed architecture has been designed and implemented based on multiprocess and multithread structure to support concurrent processing. To manage the traffic according to the Intranet service categories, we implemented an ITMA(Intelligent Traffic Monitoring Agent) with packet capture library. With the proposed architecture, we could measure and analyze the real Intranet traffic of Yeungnam University.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Improvement of Network Traffic Monitoring Performance by Extending SNMP Function

  • Youn Chun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.171-175
    • /
    • 2004
  • Network management for detail analysis can cause speed decline of application in case of lack band width by traffic increase of the explosive Internet. Because a manager requests MIB value for the desired objects to an agent by management policy, and then the agent responds to the manager. Such processes are repeated, so it can cause increase of network traffic. Specially, repetitious occurrence of sending-receiving information is very inefficient for a same object when a trend analysis of traffic is performed. In this paper, an efficient SNMP is proposed to add new PDUs into the existing SNMP in order to accept time function. Utilizing this PDU, it minimizes unnecessary sending-receiving message and collects information for trend management of network efficiently. This proposed SNMP is tested for compatibility with the existing SNMP and decreases amount of network traffic largely

  • PDF

Traffic Volume Dependent Displacement Estimation Model for Gwangan Bridge Using Monitoring Big Data (교량 모니터링 빅데이터를 이용한 광안대교의 교통량 의존 변위 추정 모델)

  • Park, Ji Hyun;Shin, Sung Woo;Kim, Soo Yong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.2
    • /
    • pp.183-191
    • /
    • 2018
  • In this study a traffic volume dependent displacement estimation model for Gwangan Bridge was developed using bridge monitoring big data. Traffic volume data for four different vehicle types and the vertical displacement data in the central position of the Gwangan Bridge were used to develop and validate the estimation model. Two statistical estimation models were developed using multiple regression analysis (MRA) and principal component analysis (PCA). Estimation performance of those two models were compared with actual values. The results show that both the MRA and the PCA based models are successfully estimating the vertical displacement of Gwangan Bridge. Based on the results, it is concluded that the developed model can effectively be used to predict the traffic volume dependent displacement behavior of Gwangan Bridge.

Log Analysis System Design using RTMA

  • Park, Hee-Chang;Myung, Ho-Min
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2004.04a
    • /
    • pp.225-236
    • /
    • 2004
  • Every web server comprises a repository of all actions and events that occur on the server. Server logs can be used to quantify user traffic. Intelligent analysis of this data provides a statistical baseline that can be used to determine server load, failed requests and other events that throw light on site usage patterns. This information provides valuable leads on marketing and site management activities. In this paper, we propose a method of design for log analysis system using RTMA(realtime monitoring and analysis) technique.

  • PDF

Analysis of abnormal traffic controller deployed in Internet access point (인터넷 액세스점에서의 이상 트래픽 제어기 성능분석)

  • Kim Kwangsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.107-115
    • /
    • 2005
  • ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than $30{\%}.$ When traffic intended unknown attack occurs, network IDS is high false positive probability and so is limited to apply. In this environment, the ATC can be a key player to help the network node such as router to control abnormal traffic.