• Title/Summary/Keyword: Traffic problem

Search Result 1,609, Processing Time 0.028 seconds

Dimensioning leaky bucket parameters considering the cell delay variation (셀 지연 변이를 고려한 리키 버킷 계수 결정 방법)

  • 이준원;이병기
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.8
    • /
    • pp.31-38
    • /
    • 1995
  • In this paper, we consider the leaky bucket parameter dimensioning problem in the presence of the cell delay variation(CDV) which arises at the customer premises network dud to the multiplexing with other traffic streams. We consider an ATM multiplexer in which a single CBR stream and several heterogeneous VBR traffic streams are multiplexed. Choosing an MMPP model for the bursty traffic streams, we derive an (MMPP+DD)/D/1/K queueing model for the evaluation of the CDV experienced by the CBR stream. We first evaluate the equilibrium queue length distribution embedded at tagged-cell arrival-time instants, based on whcih we calcuate the inter-cell time distribution and the distribution kof the number of tagged-cell departures in an arbitrary interval. Then we apply the analysis to the dimensionging problem of the leaky bucket parameters, examining how the employed traffic model affects the determination of the bucket size. Through numerical examples, we confirm that the Poisson traffic model can underestimate the bucket size, thus causing a considerable blocking probability for compliant use cells while the MMPP model can optimally design the bucket size which keeps the blocking probability under the target value.

  • PDF

Hybrid Scaling Based Dynamic Time Warping for Detection of Low-rate TCP Attacks

  • So, Won-Ho;Yoo, Kyoung-Min;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.592-600
    • /
    • 2008
  • In this paper, a Hybrid Scaling based DTW (HS-DTW) mechanism is proposed for detection of periodic shrew TCP attacks. A low-rate TCP attack which is a type of shrew DoS (Denial of Service) attacks, was reported recently, but it is difficult to detect the attack using previous flooding DoS detection mechanisms. A pattern matching method with DTW (Dynamic Time Warping) as a type of defense mechanisms was shown to be reasonable method of detecting and defending against a periodic low-rate TCP attack in an input traffic link. This method, however, has the problem that a legitimate link may be misidentified as an attack link, if the threshold of the DTW value is not reasonable. In order to effectively discriminate between attack traffic and legitimate traffic, the difference between their DTW values should be large as possible. To increase the difference, we analyze a critical problem with a previous algorithm and introduce a scaling method that increases the difference between DTW values. Four kinds of scaling methods are considered and the standard deviation of the sampling data is adopted. We can select an appropriate scaling scheme according to the standard deviation of an input signal. This is why the HS-DTW increases the difference between DTW values of legitimate and attack traffic. The result is that the determination of the threshold value for discrimination is easier and the probability of mistaking legitimate traffic for an attack is dramatically reduced.

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF

Exploring Air Traffic Controllers' Expertise through Cognitive Task Analysis (인지과제분석(Cognitive Task Analysis)을 통한 항공교통관제사의 전문성 확인)

  • Song, Chang-Sun;Kwon, Hyuk-Jin;Kim, Kyeong-Tae;Kim, Jin-Ha;Lee, Dong-Sik;Sohn, Young-Woo
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.4
    • /
    • pp.42-55
    • /
    • 2014
  • The purpose of this research was to identify expertise in ait traffic control by using cognitive skill analysis for novices and experts in routine and non-routine situations. The result of study was to understand expertise in air traffic control tasks in terms of what cognitive processes are responsible for the expert's high performance levels. The problem solving task was difficult for novices, but performed relatively automatically by experts in a routine situation. The difficulty could indicate the presence of controlled processing. Rather than rules and strategies, novices focused more on environmental factors, which merely increase cognitive load. In a non-routine situation, novices showed that they did not categorize the information consistently and alternative resources were not available for them. Experts, however, performed automatically a task by arranging and organizing information related to problem solving components in contexts without regard to a routine and non-routine situation. Especially experts developed a stable representation and directed alternative resources for air traffic flow and efficiency. Based on the results, cognitive processes of experts could be useful to understand expert performance and analyze the learning process, which imply the necessity of developing expertise systematically.

A Study on the Awareness of Noise Pollution by Seoul Citizens - Focusing on Road Traffic Noise - (서울시민의 소음공해 인식에 대한 연구 - 도로 교통소음을 중심으로-)

  • 이효수;정인희;김동수;김흥식
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1996.10a
    • /
    • pp.394-401
    • /
    • 1996
  • Noise pollution, especially road traffic noise has become a major problem in Seoul. However, although noise can be sensed directly, it is considered somewhat less important compared to other environmental pollutions. In this study, we chose nine districts in Seoul and distributed a questionnaire composed of 23 questions in related to the awareness of noise pollution for 950 people living in Seoul. The results were analyzed according to district area, age, occupation, and were compared to the actual noise level measured by the Seoul Metropolitan Government. The analysis of the questionnaire show that road traffic noise is considered to be the main source of noise pollution in Seoul. People think that the individual and the Seoul Metropolitan Government are most responsible for the noise reduction in Seoul, but replies only little effort is put into when asked whether one has made any personal effort to reduce noise. We have concluded that noise pollution is not considered a hazardous problem to most Seoul citizens, and that most of them seem to be used to it. Yet, specific noise reduction policies, especially road traffic noise, are expected to take effect as quality of life is pursued due to economic enhancement.

  • PDF

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

A comparative Study of Noise Prediction Method for Road Traffic Noise Map -Focused on Foreign Traffic Noise Prediction Method- (소음지도 제작을 위한 도로교통 소음예측식 비교연구 -국외 예측식을 중심으로-)

  • Jang, Hwan;Bang, Min;Kim, Heung-Sik
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.709-714
    • /
    • 2008
  • The various computer programs are used in computer simulation of the traffic noise prediction. But the difference or problem of calculation method used for road traffic noise prediction is not exactly investigated. In this paper, Road traffic noise is predicted on the specific regions by using four prediction methods such as XPS31-133 model(France), RLS-90 model(Germany), ASJ RTN model(Japan) and FHWA model(U.S.A.), which are operated by a program named SoundPLAN, a program to predict road traffic noise. Those prediction values are compared with a measurement value. The results show that four prediction values for taraffic noise are a little different, because of various input factors according to the prediction methods.

  • PDF

Traffic Sign Recognition Considering the Intensity of Illumination (조도를 고려한 표지판 인식)

  • Cha, Yeon-Hwa;Chun, Chang-Mook;Kwon, Tae-Bum;Kang, Sung-Chul
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.2
    • /
    • pp.173-181
    • /
    • 2011
  • Recognition of traffic signs helps an unmanned ground vehicle to decide its behavior correctly, and it can reduce traffic accidents. However, low cost traffic sign recognition using a vision sensor is very difficult because the signs are exposed to various illumination conditions. This paper proposes a new approach to solve this problem using an illuminometer which detects the intensity of illumination. Using the intensity of illumination, the recognizer adjusts the parameters for image processing. Therefore, we can reduce the loss of information such as the shape and color of traffic signs. Experimental results show that the proposed method is able to improve the performance of traffic sign recognition in various weather and lighting conditions.

Intelligent Traffic Light using Fuzzy Neural Network

  • Park, Myeong-Bok;You-Sik, Hong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.1
    • /
    • pp.66-71
    • /
    • 2003
  • In the past, when there were few vehicles on the road, the T.O.D.(Time of Day) traffic signal worked very well. The T.O.D. signal operates on a preset signal cycling which cycles on the basis of the average number of average passenger cars in the memory device of an electric signal unit. Today, with increasing traffic and congested roads, the conventional traffic light creates startup-delay time and end lag time so that thirty to forty-five percent efficiency in traffic handling is lost, as well as adding to fuel costs. To solve this problem, this paper proposes a new concept of optimal green time algorithm, which reduces average vehicle waiting time while improving average vehicle speed using fuzzy rules and neural networks. Through computer simulation, this method has been proven to be much more efficient than fixed time interval signals. Fuzzy Neural Network will consistanly improve average waiting time, vehicle speed, and fuel consumption.

Technical Improvement of Traffic Noise Environmental Impact Assessment I (도로교통소음 환경영향평가 기법 개선 연구 I)

  • Park, Young-Min;Choi, Jin-Kwon;Chang, Seo-Il
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2005.11a
    • /
    • pp.55-58
    • /
    • 2005
  • This study was Performed to grasp of the problem and improvement in traffic noise environmental impact assessment(EIA). National institute of environmental research(NIER) traffic noise prediction model is in general use in internal EIA. In this study, NIER noise prediction model need to improve in that the predicted results lower than the measured results. The other predict model(KLC KEI) is more accurate. Also the volume and speed of traffic is need to standardize in traffic noise prediction.

  • PDF