• Title/Summary/Keyword: Web traffic

Search Result 364, Processing Time 0.034 seconds

A study to Predictive modeling of crime using Web traffic information (웹 검색 트래픽 정보를 이용한 범죄 예측 모델링에 관한 연구)

  • Park, Jung-Min;Chung, Young-Suk;Park, Koo-Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.93-101
    • /
    • 2015
  • In modern society, various crimes is occurred. It is necessary to predict the criminal in order to prevent crimes, various studies on the prediction of crime is in progress. Crime-related data, is announced to the statistical processing of once a year from the Public Prosecutor's Office. However, relative to the current point in time, data that has been statistical processing is a data of about two years ago. It does not fit to the data of the crime currently being generated. In This paper, crime prediction data was apply with Naver trend data. By using the Web traffic Naver trend, it is possible to obtain the data of interest level for crime currently being generated. It was constructed a modeling that can predict the crime by using traffic data of the Naver web search. There have been applied to Markov chains prediction theory. Among various crimes, murder, arson, rape, predictive modeling was applied to target. And the result of predictive modeling value was analyzed. As a result, it got the same results within 20%, based on the value of crime that actually occurred. In the future, it plan to advance research for the predictive modeling of crime that takes into the characteristics of the season.

Development of Vehicle Arrival Time Prediction Algorithm Based on a Demand Volume (교통수요 기반의 도착예정시간 산출 알고리즘 개발)

  • Kim, Ji-Hong;Lee, Gyeong-Sun;Kim, Yeong-Ho;Lee, Seong-Mo
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.2
    • /
    • pp.107-116
    • /
    • 2005
  • The information on travel time in providing the information of traffic to drivers is one of the most important data to control a traffic congestion efficiently. Especially, this information is the major element of route choice of drivers, and based on the premise that it has the high degree of confidence in real situation. This study developed a vehicle arrival time prediction algorithm called as "VAT-DV" for 6 corridors in total 6.1Km of "Nam-san area trffic information system" in order to give an information of congestion to drivers using VMS, ARS, and WEB. The spatial scope of this study is 2.5km~3km sections of each corridor, but there are various situations of traffic flow in a short period because they have signalized intersections in a departure point and an arrival point of each corridor, so they have almost characteristics of interrupted and uninterrupted traffic flow. The algorithm uses the information on a demand volume and a queue length. The demand volume is estimated from density of each points based on the Greenburg model, and the queue length is from the density and speed of each point. In order to settle the variation of the unit time, the result of this algorithm is strategically regulated by importing the AVI(Automatic Vehicle Identification), one of the number plate matching methods. In this study, the AVI travel time information is composed by Hybrid Model in order to use it as the basic parameter to make one travel time in a day using ILD to classify the characteristics of the traffic flow along the queue length. According to the result of this study, in congestion situation, this algorithm has about more than 84% degree of accuracy. Specially, the result of providing the information of "Nam-san area traffic information system" shows that 72.6% of drivers are available.

Detect H1TP Tunnels Using Support Vector Machines (SVM을 이용한 HTTP 터널링 검출)

  • He, Dengke;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.45-56
    • /
    • 2011
  • Hyper Text Transfer Protocol(HTTP) is widely used in nearly every network when people access web pages, therefore HTTP traffic is usually allowed by local security policies to pass though firewalls and other gateway security devices without examination. However this characteristic can be used by malicious people. With the help of HTTP tunnel applications, malicious people can transmit data within HTTP in order to circumvent local security policies. Thus it is quite important to distinguish between regular HTTP traffic and tunneled HTTP traffic. Our work of HTTP tunnel detection is based on Support Vector Machines. The experimental results show the high accuracy of HTTP tunnel detection. Moreover, being trained once, our work of HTTP tunnel detection can be applied to other places without training any more.

Processing Speed Improvement of HTTP Traffic Classification Based on Hierarchical Structure of Signature (시그니쳐 계층 구조에 기반한 HTTP 트래픽 분석 시스템의 처리 속도 향상)

  • Choi, Ji-Hyeok;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.191-199
    • /
    • 2014
  • Currently, HTTP traffic has been developed rapidly due to appearance of various applications and services based web. Accordingly, HTTP Traffic classification is necessary to effective network management. Among the various signature-based method, Payload signature-based classification method is effective to analyze various aspects of HTTP traffic. However, the payload signature-based method has a significant drawback in high-speed network environment due to the slow processing speed than other classification methods such as header, statistic signature-based. Therefore, we proposed various classification method of HTTP Traffic based HTTP signatures of hierarchical structure and to improve pattern matching speed reflect the hierarchical structure features. The proposed method achieved more performance than aho-corasick to applying real campus network traffic.

A Design of Web Browsing System based on Content Retransmission in Marine Satellite Network (해양 위성통신망에서 콘텐츠 재전송 기반 웹 브라우징 서비스 시스템 설계)

  • Kim, Jae-Ho;Kim, Geun-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1204-1213
    • /
    • 2013
  • With the development of digital satellite communication technology and the widespread use of smart devices, the demand for data communication in the maritime ship has increased. Recently, the communication between the maritime ship and the land is based on Inmarsat satellite service. The Inmarsat provides telephone, fax, data and telex service etc. However, since the satellite is payper-seconds billing service, the transmission of whole web contents to the maritime ship through the satellite causes high cost. In this paper, we propose web browsing system architecture that reduces the data traffic on the satellite link and retransmits the content selectively in order to solve these problems.

Constructing the integrated information system for the coast disaster area management using 3D web GIS technology

  • Jo Myung-Hee;Shin Dong-Ho;Pak Hyeon-Cheol;Hae Young-Jin;Kim Hyoung-Sub;Kim Jin-Sub
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.318-321
    • /
    • 2004
  • The damage scale and damage area in the coast have been increased dramatically because of calamities such as typhoon. tidal wave. flood and storm. Especially. 409 cases. which reach to about $40.9\%$ of natural disasters of 1,000 cases for the recent 15 years have happened on coast area. More than $40\%$ of natural disasters also occurred every year is happening in coastland. Therefore, there is a great need to construct all related GIS database such as atmospheric phenomena (typhoon. tidal wave, flood and storm). harbor facility, harbor traffic and ebb and flow. Furthermore. the certain system should be developed and integrated with NDMS (National Disaster Management System) by using 3D web GIS technology. In this study. the coast disaster area management system was designed and developed by using 3D web GIS technique so that the coast disaster area could be monitored and managed in real time and in visual. Finally. the future disaster in coast area could be predicted scientifically.

  • PDF

A Design of Redirection System for Server Selection on the Content Distribution Environment (콘텐츠 분산 환경에서 서버 선택을 위한 리다이렉션 시스템의 설계)

  • Kim, Seon-Ho;Ko, Hoon;Shin, Yongtae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.283-290
    • /
    • 2004
  • With the development of Web technologies, the demand for multimedia contents and network bandwidth is increasing explosively. In this situation, Caching, P2P and CDN are using for fast transmission with low traffic. In this research, we designed and implemented a redirection system for best replica selection where contents are distributed to multiple replicated web servers. This redirection system selects a close and least loaded replica and redirect a client's request to the replica. As a result, this system improved user-perceived performance. It is expected that this redirection system will contribute to the faster and more stable transmission of massive multimedia contents.

A Scheme for Acceleration of JavaScript Transmission Considering Software Module Reusability (소프트웨어 모듈 재사용성을 고려한 JavaScript 전송 가속화 방안)

  • Kim, Gijeong;Lee, Sungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.329-331
    • /
    • 2014
  • JavaScript is widely used to offer interactive web service and dynamic content. However, the number and size of JavaScript constituting the web page has been increasing steadily, and this circumstance leads to falling web performance. In this paper, we suggest a scheme for acceleration of JavaScript transmission considering software module reusability. We perform network simulation for the performance evaluation and analysis about the suggested scheme, and then confirm that the suggested scheme offers better performance in term of page loading time and the amount of traffic generated in the network than the transmission method using Gzip.

A Study on Differentiated Service for Web Server Contents QoS (차등화 서비스(Diffserv)를 이용한 Web Server Content의 효율적 QoS 보장에 관한 연구)

  • Kim, Jung-Yun;Ryu, In-Tae;Park, Jae-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1591-1594
    • /
    • 2002
  • BE(Best-Effort)방식의 인터넷에서 제공되던 Text위주의 서비스 제공 방식이 Multimedia 위주의 서비스로 점차 바뀌어 감에 따라, 기존의 BE(Best-Effort)방식으로는 Multimedia QoS(Quality of Service)를 보장하기가 어려워졌다. 이에 IETF(Internet Engineering Task Force)에서는 변화하는 인터넷 환경에서 QoS 보장을 위해 Diffserv(Differentiated Service)방식을 제안하게 되었다. 본 논문에서는 Content를 제공하는 Linux Web Server에서 패킷을 클래스 분류기준(Classification Method)에 의해 분류하고 Scheduling Algorithm을 적용하여 DSCP(Differentiated Service CodePoint) 값을 Web Server 자체에서 결정하여 경계라우터(Edge Router)로 전송하는 방식을 취하였으며, 이를 토대로 하여 경계라우터의 Traffic 부하를 줄이고, 경계라우터의 코어라우터(Core Router)화를 통해 더욱더 향상된 Differentiated Service를 제공하는 것이 목적이다. 이를 본 논문에서는 ns2 를 통해 IETF에서 제안된 Diffserv방식과 본 논문에서 제안한 방식의 Diffserv 방식과 현재의 BE방식을 비교하여 어느 정도의 성능 향상이 있었는지 비교 분석하였다.

  • PDF

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.