• Title/Summary/Keyword: Web traffic

Search Result 363, Processing Time 0.023 seconds

A Study on the Buffer Management for Web Server (Web Server의 원활한 데이터 입출력을 위한 Buffer Management에 관한 연구)

  • Hong, Chang-Ho;Park, Kyung-Bae;Lee, Seung-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2000.11d
    • /
    • pp.815-817
    • /
    • 2000
  • 근래 Web Server의 안정된 운용의 중요성이 급증하는 Network Traffic과 더불어 점차 증대되고 있다. 기본적인 Network 구성망은 Ethernet으로 표준적인 프로토콜은 TCP/IP로 기반을 잡고 있다. 날로 증가하는 Network Traffic을 효과적으로 처리하기 위해서는 Network의 bandwidth 및 서버가 처리할 수 있는 데이터 양을 분석하여 병목현상을 줄이고 데이터의 흐름을 원활히 하기 위한 데이터 buffer들의 설치와 적절한 운영 방법에 관한 연구가 필요하다. 본 논문에서는 Web Server로부터 image 데이터를 전송 받아 이를 원활히 display하기 위한 Application Layer에서의 buffer 크기 및 제어방법에 관한 연구를 수행하고 특히 연속적인 이미지의 전송과 재생에 관한 buffer management에 관하여 고찰한다.

  • PDF

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

Development of Dynamic Traffic Information System based on GPS Technology (GPS 기술기반의 동적 도로소통정보시스템 개발)

  • Jang, Yong-Gu
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.3
    • /
    • pp.14-24
    • /
    • 2006
  • There are many problems and limits in equipments being used for traffic-volume analysis in the country. And traffic-volume information acquired through existing equipments is not provided in real-time. In the case of urban, there are limits on guarantee of trust on comprehending a appropriate road-volume because of difficulty on analyzing traffic-volume density and time series. And it is difficult to applicate in deciding a road policy as existing equipments don't provide the control information of traffic-flow. Therefore, it is necessary to build a road-flow policy rapidly and accurately through the road-flow information that analyze post-processed statistics data using traffic-flow investigation based on real time. In this study, we developed TICS(Traffic Information Collection System) based on GPS which could transmit traffic information transformed from car location information to traffic control center. And we developed TCS(Traffic Control System) based on Web GIS, which could manage and analyze transmitted traffic information, and it could offer handled road-flow information to Web-site in realtime.

  • PDF

A Comparative Study of Consumer's Hype Cycles Using Web Search Traffic of Naver and Google (웹 검색트래픽을 활용한 소비자의 기대주기 비교 연구: 네이버와 구글 검색을 중심으로)

  • Jun, Seung-Pyo;Kim, You Eil;Yoo, Hyoung Sun
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.4
    • /
    • pp.1109-1133
    • /
    • 2013
  • In an effort to discover new technologies and to forecast social changes of technologies, a number of technology life-cycle models have been developed and employed. The hype cycle, a graphical tool developed by a consulting firm, Gartner, is one of the most widely used models for the purpose and it is recognised as a practical one. However, more research is needed on theoretical frames, relations and empirical practices of the model. In this study, hype cycle comparisons in Korean and global search websites were performed by means of web-search traffic which is proposed as an empirical measurement of public expectation, analysed in a specific product or country in previous researches. First, search traffic and market share for new cars were compared in Korea and the U.S. with a view to identifying differences between the hype cycles in the two countries about the same product. The results show the similarity between the two countries with the statistical significance. Next, comparative analysis between search traffic and supply rate for several products in Korea was conducted to check out their patterns. According to the analysis, all the products seem to be at the "Peak of inflated expectations" in the hype cycles and they are similar to one another in the hype cycle. This study is of significance in aspects of expanding the scope of hype cycle analysis with web-search traffic because it introduced domestic web-search traffic analysis from Naver to analyse consumers' expectations in Korea by comparison with that from Google in other countries. In addition, this research can help to explain social phenomina more persuasively with search traffic and to give scientific objectivity to the hype cycle model. Furthermore, it can contribute to developing strategies of companies, such as marketing strategy.

  • PDF

Development of Remote Radar/AIS Network System for Observing and Analyzing Vessel Traffic in Tokyo Bay

  • Hagiwara, Hideki;Shoji, Ruri;Tamaru, Hitoi;Liu, Shun;Okano, Tadashi
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.151-156
    • /
    • 2006
  • Accurate vessel traffic observation is indispensable to carry out vessel traffic management, design of vessel traffic route, planning of port construction, etc. In order to observe the vessel traffic accurately without many efforts such as the use of a ship or car equipped with special radar observation system and the preparation of observation staff, the authors have been developing completely automated remote radar/AIS network system covering the main traffic area in Tokyo Bay. The composite radar image observed at Yokosuka and Kawasaki radar stations with AIS information can be seen on web site of Internet. In addition to the development of radar/AIS observation system, the software to analyze observed vessel traffic flow has been developed. This software has various functions such as automatic tracking of ship's positions, automatic estimation of ship's size, automatic integration of radar image and AIS data, animation of ships' movements, extraction of dangerous ship encounters, etc. The configuration and functions of the developed remote radar/AIS network system are shown first in this paper. Then various functions of the software to analyze vessel traffic are introduced, and some analyzed results on the vessel traffic in Tokyo Bay are described demonstrating the effectiveness of the developed system.

  • PDF

Detection of Distributes Denial of Service Attacks through the analysis of traffic (트래픽 분석을 통한 효과적인 DDOS공격탐지방법)

  • 정휘석;이철호;최경희;정기현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.565-567
    • /
    • 2002
  • DDOS공격은 최근 인터넷 환경에서 큰 위험요소로 부각되고 있다. 하지만, DDOS공격을 완벽하게 막아내는 것은 현재까지 알려진 방법으로는 거의 불가능하다. 그 이유는DDOS 공격이 Vulnerability Exploit을 이용한 공격방법이 아니라 Network Resource를 고갈시켜서 공격대상 호스트의 서비스를 차단하기 때문이다. 그래서, DDOS공격을 방어하기 위해서는 DDOS공격 트래픽에 대한 정확한 분석과 탐지가 선행되어야 한다. 본 논문을 통해서 여러 가지 DDOS공격 Traffic의 특징을 살펴보고, Web traffic과의 차이를 통해 DDOS traffic을 탐지하는 방법을 제안하고자 한다.

  • PDF

A Web-based QoS-guaranteed Traffic Control system (웹 기반의 QoS 보장형 트래픽 제어 시스템)

  • 이명섭;신경철;류명춘;박찬현
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.45-48
    • /
    • 2002
  • This paper presents a QoS-guaranteed traffic control system which supports QoS of realtime packet transmission for the multimedia communication. The traffic control system presented in this paper applies the integrated service model and provides QoS o(packet transmission by means of determining the packet transmission rate with the policy of network manager and the optimal resource allocation according to the end-to-end traffic load. It also provides QoS for the realtime packet transmission through the AWF2Q+ Scheduling algorithm and per-class queuing method.

  • PDF

A Study on Latency Time Improvement of Electronic Commerce System Using Local Server and Web Cashing (로컬서버와 웹캐싱을 이용한 전자상거래 시스템의 지연속도 개선에 관한 연구)

  • Yoon,, Yong-Ki;Ko, Il-Seok;Leem, Choon-Seong
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.555-562
    • /
    • 2002
  • Increasing of electronic commerce users and high-capacity multimedia data is the main causes of increasing of load and network traffic in electronic commerce system. Increasing of load and network traffic brings the delay of service about client's request. And it's becoming factor that decreases customer satisfaction and corporation's competitive ability. So it is needed to research that consider efficient management and response time of electronic commerce system. In this paper, we designed electronic commerce system based on local server with web cashing function in order to solve load problem of electronic commerce system. And we proposed web cashing algorithm for local web server and analyzed performance by an experiment.

Implementation of a Real-time Network Traffic Management System (실시간 네트워크 트래픽 매니지먼트 시스템 구현)

  • Yong, Ki-Tak;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.8
    • /
    • pp.106-113
    • /
    • 2008
  • In this paper, we will design and substantiate the Network Traffic management system(MAGI), which makes up for the weak points of existing Network Monitoring tools and realize dynamic firewall; MRTG, ntop, ethereal, and nettest. The Network Traffic Monitoring and analyzing system differs from existing software-based Network Monitoring tools as MAGI is a combination of software and hardware. Not only the innovative web user interface applied to the software makes analyzing traffic simpler, but it also has a function for monitoring and managing conditions of the hardware. The web user interface implemented with PHP and MySQL helps to use the database and as a result, analyzing data becomes easier. On the hardware part, the appliance is configured as a bridge in a network. As a result, managed system does not have overload.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.