• Title/Summary/Keyword: outbound traffic

Search Result 32, Processing Time 0.022 seconds

Enlargement of Harbour limit for expanding Anchorages in Ulsan Port (울산항 정박지 확충을 위한 항계 확장에 관한 연구)

  • Yun, Gwi-Ho;Kim, Bu-Young;Lee, Yun-Sok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2010.04a
    • /
    • pp.169-170
    • /
    • 2010
  • Ulsan Port is in the situation which the harbour limit and anchorages are less narrow than other trading ports and the occurrence probability of marine accidents is high due to heavy marine traffic Especially, the shortage of anchorages will become worse in case that the number of inbound and outbound vessels increases according to the development of Ulsan New Port. We will find and suggest the plan to enlarge the harbour limit essentially needed to expand anchorages in this research The reasonable type of harbour limit which is based on the survey by a group of experts, was determined after the decision of the range of harbour limit to accommodate the relevant anchorages.

  • PDF

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.

ArcGIS based Analysis of Multiple Accident Areas Caused by Marine Plastic Litter in Republic of Korea

  • Kim, Bo-Ram;Park, Young-Kwon
    • Applied Chemistry for Engineering
    • /
    • v.33 no.4
    • /
    • pp.408-418
    • /
    • 2022
  • Marine accidents involving the entanglement of marine litter have continued to increase, with over 300 to 400 cases per year according to the statistical agency. Entanglement of marine litter may also lead to large-scale marine accidents which cause capsizing and sinking, thereby further causing detrimental casualties and material damages, and thus exceptional attention and care are required. In this study, Incheon, Busan, and Geoje and Tongyeong were found to be the high-frequency locations for accidents, which were selected by considering the ArcGIS analysis about the marine accidents of entanglement of marine litter and the occurrence frequency by the standard. The characteristics of the multiple accident areas involving entanglement of marine litter were the coastal cities where fishing facilities or marine leisure related conditions were activated, with the port which handles much of the traffic of outbound and inbound vessels located nearby. Marine plastic pollution impacts not only the marine ecosystem and food chain, but also the hull and engine of ships, and may further pose threats to the safety of vessels and crews. It is necessary to find a common link between the relevant areas and to strive to remove the root causes of marine accidents by reducing marine litter.

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture

  • Jiang, Lirong;Feng, Gang;Qin, Shuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4268-4290
    • /
    • 2015
  • Future mobile communications face enormous challenges as traditional voice services are replaced with increasing mobile multimedia and data services. To address the vast data traffic volume and the requirement of user Quality of Experience (QoE) in the next generation mobile networks, it is imperative to develop efficient content distribution technique, aiming at significantly reducing redundant data transmissions and improving content delivery performance. On the other hand, in recent years cloud computing as a promising new content-centric paradigm is exploited to fulfil the multimedia requirements by provisioning data and computing resources on demand. In this paper, we propose a cooperative caching framework which implements State based Content Distribution (SCD) algorithm for future mobile networks. In our proposed framework, cloud service providers deploy a plurality of cloudlets in the network forming a Distributed Cloud Service Network (DCSN), and pre-allocate content services in local cloudlets to avoid redundant content transmissions. We use content popularity and content state which is determined by content requests, editorial updates and new arrivals to formulate a content distribution optimization model. Data contents are deployed in local cloudlets according to the optimal solution to achieve the lowest average content delivery latency. We use simulation experiments to validate the effectiveness of our proposed framework. Numerical results show that the proposed framework can significantly improve content cache hit rate, reduce content delivery latency and outbound traffic volume in comparison with known existing caching strategies.

A Research on the Cabin Service Quality Factors in a National Carrier affecting Overseas Tourist's Experience and Satisfactiont (여객의 해외여행 관광지 관광체험과 관광만족에 영향을 미치는 국적항공사 객실서비스 품질 요인 연구)

  • Yoon, Han-Young;Jang, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.188-197
    • /
    • 2019
  • This study analyzed empirically the effects of the perception of outbound passengers, who flew from Korea to overseas tourist destinations, on the cabin service quality, tourist experience, and tourist satisfaction. For empirical analysis, a survey was given to Korean passengers using a national carrier of South Korea. Based on empirical analysis, the researchers judged that the analysis results and implications could be applied to inbound foreign passengers who visited Korea for the tourism purposes if researchers generated significant results from empirical analysis. This paper designed a research model that represented the meaningful relationship among, airline cabin-service quality, tourist experience, and tourist satisfaction following preceding research. According to the analysis, that factors that consisted of the cabin service quality had a significant effect on the tourist satisfaction with a mediating effect of both the cognitive and emotional tourist experience. Therefore, the perception on airline's cabin service quality of the national carrier would be a starting point that can help improve the tourist satisfaction.

A Study on the estimation of traffic congestion for Pyeongtaek (Asan) port development (평택(아산)항 개발에 따른 교통혼잡도 평가에 관한 연구)

  • Kuk, Seung-Gi;Kim, Se-Won;Kim, Jeong-Hoon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.191-195
    • /
    • 2005
  • The port entry system of the inner harbor in Pyeongtaek (Asan) was planned as lock-gate in 'Master plan project on port planning in Asan industry base(1990)', but was changed to tidal harbor in 'Project maintaining Master Plan for comprehensive development of Pyeongtaek (Asan) port(2001)'. Accordingly, southern sea bank constructed under the lower part of Seohae-bridge will be removed so that inbound/outbound vessels for the inner harbor can navigate at all times. However, in the view of the safety on passing through the lower of Seohae-bridge, navigating conditions for the inner harbor will be restricted in the single-way of 50,000 DWT vessel and the two-day of vessel less than 30,000 DWT. Therefore, this study carried out the estimation of traffic congestion arising from these vessels with above restrictions after supposing annual inbound/outboubd vessel's numbers for loading and unloading cargo surveyed on the inner harbor.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.235-244
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated. the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread. and design a logic engine module. Three engines judge attack grades (Attack Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF

A Dynamic Update Engine of IPS for a DoS Attack Prevention of VoIP (VoIP의 DoS공격 차단을 위한 IPS의 동적 업데이트엔진)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.165-174
    • /
    • 2006
  • This paper attacked the unknown DoS which mixed a DoS attack, Worm and the Trojan horse which used IP Source Address Spoofing and Smurf through the SYN Flooding way that UDP, ICMP, Echo, TCP Syn packet operated, the applications that used TCP/UDP in VoIP service networks. Define necessity of a Dynamic Update Engine for a prevention, and measure Miss traffic at RT statistics of inbound and outbound parts in case of designs of an engine at IPS regarding an Self-learning module and a statistical attack spread, and design a logic engine module. Three engines judge attack grades (Attack, Suspicious, Normal), and keep the most suitable filtering engine state through AND or OR algorithms at Footprint Lookup modules. A Real-Time Dynamic Engine and Filter updated protected VoIP service from DoS attacks, and strengthened Ubiquitous Security anger, and were turned out to be.

  • PDF