• Title/Summary/Keyword: Web-traffic

Search Result 366, Processing Time 0.031 seconds

Investigation of Potential Fire Hazard Resources of Bridges on National Routes by Field and Web-based Satellite (현장 및 실내조사를 통한 일반국도교량의 화재위험요소 분석)

  • Kim, Yongjae;Kim, Seungwon;Ann, Hojune;Kong, Jungsik;Park, Cheolwoo
    • International Journal of Highway Engineering
    • /
    • v.19 no.6
    • /
    • pp.105-115
    • /
    • 2017
  • PURPOSES : The occurrence of unexpected disasters, including fire events, increases as the road network becomes complicated and traffic volume increases. When a fire event occurs on and under bridges, the damage extensively influences direct damage to structures, vehicles, and human life and secondary socioeconomic issues owing to traffic blockage. This study investigated potential fire-hazard risks on bridges of the Korean national route road. METHODS : The investigation was conducted using field investigation and analysis with satellite pictures and road views from commercial websites and the Bridge Management System (BMS). From the filed investigation, various potential fire resources were identified. The satellite pictures and road views were helpful in measuring and recognizing conditions underneath bridges, stowage areas, etc. RESULTS : There are various potential fire resources underneath bridges such as piled agricultural products, parked petroleum tanks, construction equipment, and attached high-voltage cables. A total of 94.6% of bridges have underneath clearances of less than 15 m. A bridge underneath volume that can stow a potential fire hazard resource was $7,332m^3$ on average, and most bridges have about $4,000m^3$ of space. Based on the BMS data, the amounts of PSC and steel girders were 29% and 25%, respectively. CONCLUSIONS : It was found that the amount of stowed potential fire hazard resources was proportional to the underneath space of bridges. Most bridges have less than 15 m of vertical clearance that can be considered as a critical value for a bridge fire. The fire risk investigation results should be helpful for developing bridge fire-protection tools.

DDoS attack traffic through the analysis of responses to research (트래픽 분석을 통한 DDoS 공격에 대한 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.1-6
    • /
    • 2014
  • DDoS (Distributed Denial Service, Distributed Service) attacks are being generated for a constant threat on the Internet, countermeasures for this have been proposed. However, the problem has become an increasingly effective instruction in any Measures are a variety of attacks and sophisticated attacks. Attackers can change a steady attack tools to respond to these, the experts as a countermeasure to this constantly research for a fresh attack. This paper is to introduce countermeasures to DDoS recent representative examples of 7.7DDoS and look for 3.3DDoS existing types of DDoS attacks increased PPS attacks, high traffic sent, web service delay and router and firewall settings, applications and to describe the DDoS countermeasures research by certification, is so that you can plan effectively for the future DDoS attacks proposed method.

  • PDF

A Dynamic Bandwidth Tuning Mechanism for DQDB in Client-Server Traffic Environments (클라이언트-서버 트래픽 환경에서 분산-큐 이중-버스의 동적 대역폭 조절 방식)

  • Kim, Jeong-Hong;Kwon, Oh-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3479-3489
    • /
    • 2000
  • Most of the study on fairness control method for Distributed-Queue Dual-Bus(DQDB) have been performed under specific load types such as equal probability load types or symmetric load types. On Web-based internet enviroments client-server load types are more practical traffic patlerns than specrfic load types. In this paper, an effiective fairness control method to distribute DQDR network bandwidth fairly to all stations under a client-server load is proposed. In order to implement a dynamic bandwidth timing capabihty needed to distribute the bandwidth fairty at heavy loads, the proposed method uses two pararnetexs, one is an access hrnit to legulate each station's packet transmission and the other is the number of extra emply slots that are yielded to downstream stations. In point of implementation this mechanism is simpler and easier than Bandwidth Tuning Mechanism(BTM) that uses an intermediate pattern and an adptation function. Simulation results show that it outperforms othen mecharusms.

  • PDF

A high speed processing method of web server cluster through round robin load balancing (라운드로빈 부하균형을 통한 웹 서버 클러스터 고속화 처리기법)

  • Sung Kyung;Kim Seok-soo;Park Gil-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1524-1531
    • /
    • 2004
  • This study analyzes a load balancing technique using Round Robin Algorithm. The study uses two software packages (Packet Capture and Round Robin Test Package) to check packet volume from Virtual Network structure (data generator, virtual server, Server1,2,3), and finds out traffic distribution toward Server1,2 and 3. The functions of implemented Round Robin Load Balancing Monitoring System include round robin testing, system monitoring, and graphical indication of data transmission and packet volume. As the result of the study shows, Round Robin Algorithm allows servers to ensure definite traffic distribution, unless incoming data loads differ much. Although error levels are high in some cases, they were eventually alleviated by repeated tests for a long period of time.

Enterprise Network Weather Map System using SNMP (SNMP를 이용한 엔터프라이즈 Network Weather Map 시스템)

  • Kim, Myung-Sup;Kim, Sung-Yun;Park, Jun-Sang;Choi, Kyung-Jun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.93-102
    • /
    • 2008
  • The network weather map and bandwidth time-series graph are popularly used to understand the current and past traffic condition of NSP, ISP, and enterprise networks. These systems collect traffic performance data from a SNMP agent running on the network devices such as routers and switches, store the gathered information into a DB, and display the network performance status in the form of a time-series graph or a network weather map using Web user interface. Most of current enterprise networks are constructed in the form of a hierarchical tree-like structure with multi-Gbps Ethernet links, which is quietly different from the national or world-wide backbone network structure. This paper focuses on the network weather map for current enterprise network. We start with the considering points in developing a network weather map system suitable for enterprise network. Based on these considerings, this paper proposes the best way of using SNMP in constructing a network weather map system. To prove our idea, we designed and developed a network weather map system for our campus network, which is also described in detail.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

A Service Model Development Plan for Countering Denial of Service Attacks based on Artificial Intelligence Technology (인공지능 기술기반의 서비스거부공격 대응 위한 서비스 모델 개발 방안)

  • Kim, Dong-Maeong;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.587-593
    • /
    • 2021
  • In this thesis, we will break away from the classic DDoS response system for large-scale denial-of-service attacks that develop day by day, and effectively endure intelligent denial-of-service attacks by utilizing artificial intelligence-based technology, one of the core technologies of the 4th revolution. A possible service model development plan was proposed. That is, a method to detect denial of service attacks and minimize damage through machine learning artificial intelligence learning targeting a large amount of data collected from multiple security devices and web servers was proposed. In particular, the development of a model for using artificial intelligence technology is to detect a Western service attack by focusing on the fact that when a service denial attack occurs while repeating a certain traffic change and transmitting data in a stable flow, a different pattern of data flow is shown. Artificial intelligence technology was used. When a denial of service attack occurs, a deviation between the probability-based actual traffic and the predicted value occurs, so it is possible to respond by judging as aggressiveness data. In this paper, a service denial attack detection model was explained by analyzing data based on logs generated from security equipment or servers.

Design and Implementation of A Smart Crosswalk System based on Vehicle Detection and Speed Estimation using Deep Learning on Edge Devices (엣지 디바이스에서의 딥러닝 기반 차량 인식 및 속도 추정을 통한 스마트 횡단보도 시스템의 설계 및 구현)

  • Jang, Sun-Hye;Cho, Hee-Eun;Jeong, Jin-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.4
    • /
    • pp.467-473
    • /
    • 2020
  • Recently, the number of traffic accidents has also increased with the increase in the penetration rate of cars in Korea. In particular, not only inter-vehicle accidents but also human accidents near crosswalks are increasing, so that more attention to traffic safety around crosswalks are required. In this paper, we propose a system for predicting the safety level around the crosswalk by recognizing an approaching vehicle and estimating the speed of the vehicle using NVIDIA Jetson Nano-class edge devices. To this end, various machine learning models are trained with the information obtained from deep learning-based vehicle detection to predict the degree of risk according to the speed of an approaching vehicle. Finally, based on experiments using actual driving images and web simulation, the performance and the feasibility of the proposed system are validated.

English E-Learning System Based on .NET Framework (.Net Framework를 이용한 영어 이러닝 시스템)

  • Jeon, Soo-Bin;Jung, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.2
    • /
    • pp.357-372
    • /
    • 2012
  • Existing e-learning systems not only require complex admission processes but also do not give stepwise education methods according to individual learners' characteristic. These circumstances cause learners to lose educational interest so that their educational efficiency decreases. In particular, the present e-learning systems do not provide educational approaches suitable for infant and elementary children. Under this system, the e-learning education for children does not proceed completely without guardians. To solve this problem, we design and implement an English e-learning system for elementary children based on friendly and comfortable user interfaces. For children, the proposed system reflects their age and individual interesting per each e-learning stage. This system supports both the Web application platform and smart phone application platform for various client requirements. The proposed system manages 3 classes as English learning content. Learners can experience their own English e-learning course in each class, which is compiled by current educational ability. In addition to the general functions in e-learning system, the proposed system develops content buffering algorithm to reduce data traffic in server.

Design and Implementation of an Electronic Approval System for Intranet in Multi-Server Environment (멀티서버 환경에서 인트라넷용 전자결재시스템 설계 및 구현)

  • 박창서;고형화
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.11
    • /
    • pp.1-9
    • /
    • 1999
  • As our society turns into the information age from the industrial one, the ministry of information and communication has set up functional software standards for electronic approval systems Several software houses have developed such systems in the client/server environment and subsequently for the intranet. Although electronic approval systems for the intranet have the advantages of less costly implementation and ease of use, they create heavy network traffic, and have a poor document processing functionality resulting from the lack of document processor in web environments. This paper describes a system design that web browsers utilize the resources of clients by adopting the ActiveX technique in order to improve such mallets mentions above. In other words, to use the Hangul word processor as a document processor, the ActiveX control and the Hangul DDE API have been implemented in the form of the DDE server/client, which is capable of mutual communication, and the flow of electronic approve system has been controled by connecting. As a result of running the implemented system lot three months through a real company in multi-server environment, it shows the high usage of electronic approval system as the tate roaches 75%-93% for some departments.

  • PDF