• Title/Summary/Keyword: traffic preventing

Search Result 130, Processing Time 0.025 seconds

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

Priority Management Using the QGIS for Sources of Contaminated Soil in Gyeonggi-do Province (QGIS를 이용한 경기도내 토양오염원의 중점관리 지점 선정)

  • Son, Yeong-Geum;Kim, Ji-Young;Park, Jin-Ho;Im, Heung-Bin;Kim, Jong-Su
    • Journal of Environmental Health Sciences
    • /
    • v.46 no.1
    • /
    • pp.88-95
    • /
    • 2020
  • Object: The purpose of this study was to select priority points for soil management using the location of groundwater and to suggest this method for soil contamination surveys. Method: Groundwater impact range was set to an area of 100 to 500 meters from the center point of agricultural groundwater wells. Data on industrial complex and factory areas, areas of stored or used ores and scrap metals, areas associated with waste and recycling, and traffic-related facilities areas were collected and checked for whether they fall within the groundwater impact range. Longitude and latitude coordinates of these data were mapped on the groundwater impact range using QGIS (Quantum Geographic Information System). Results: Considering the groundwater impact range, the points were selected as follows: 589 points were selected from 6,811 factories and 259 points were selected from 1,511 recycling business points. Traffic-related facility areas were divided between gas stations, bus depots, and auto mechanics. Thirty-four points were selected from 149 bus depots and 573 points were selected from 6,013 auto mechanic points. From the 2,409 gas station points, 323 were selected. Conclusion: Contaminated soil influences groundwater and crops, which can harm human health. However, soil pollution is not easily identified, so it is difficult to determine what has occurred. Pollution must be prevented beforehand and contaminated soil found. By selecting and investigating soil contamination survey points in consideration of the location of groundwater wells, we can safely manage water resources by preventing groundwater contamination in advance.

A Study on Development of Median Encroachment Accident Model (중앙선침범사고 예측모델의 개발에 관한 연구)

  • 하태준;박제진
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.5
    • /
    • pp.109-117
    • /
    • 2001
  • The median encroachment accident model proposed in this paper is the first step to develop cost-effective criteria about installing facilities preventing traffic accidents by median encroachment. This model consists of expected annual number of median encroachment on roadway and conditional probability to collide with vehicles on opposite lane after encroachment. Expected encroachment number is related to traffic volume and quote from a study of Hutchinson & Kennedy(1966). The probability of vehicle collision is composed of assumed headway distribution of opposite directional vehicles (negative exponential distribution), driving time of encroaching vehicle and Gap & Gap acceptance model. By using expected accident number yielded from the presented model, it will be able to calculate the benefit of reduced accident and to analyze the cost of installing facilities. Therefore this will help develop cost-effective criteria of what, to install in the median.

  • PDF

Analysis for the causes of sea collisions, with particular emphasis on the lookout (선박충돌사고의 원인분석(경계를 중심으로))

  • Hugh, I.;Joo, J.H.
    • Journal of the Korean Institute of Navigation
    • /
    • v.12 no.1
    • /
    • pp.71-84
    • /
    • 1988
  • For traffic proceeding in random directions on a plane surface the frequency of collision, if no avoiding action in taken ,is approximately proportional to the square of the traffic density and directly proportional to the size and speed of the ship, Avoiding is normally taken and the rte of collisions is therefore also governed by additional factors such as the visibility, the effectiveness of the collisionavoidance rules, the competence of personnel or watchkeeping attitude, the maneuverability of the ship and the efficiency of radar and other equipments. From the viewpoint of watchkeeper who is responsible for maneuvering, watchkeeping attitude such as lookout and action to avoid collision is the most controllable factor among those mentioned above. In practice, according to the investigation of the institution of marine courts, about 50% co collisions occurred is caused by disorbedience to steering and sailing rules of international regulations for preventing collision at sea including lookout. So we classify the process of collisions with first sight of another ship , assessment of risk of collisions and action to avoid collisions and make a factural survey about lookout and action to avoid collisions from the point on "time" and " distance", namely relationship among ship's size, speed, first sight time of another ship, action to avoid collisions ,and distance from sight of another ship to collision occurred. According to the results of the actual survey , we come to conclude that most of collisions occurred are due to improper lookout and ineffective action to avoid collision which means time lag from first sight of another ship to time of action taken to avoid collision is relatively long. is relatively long.

  • PDF

Extended ROHC Compression Algorithm for The Efficient Data Traffic Transmission in the IPv6 (차세대 IP체계에서 효율적인 데이터 전송을 위한 확장된 ROHC 알고리즘)

  • Kim Kyung-shin;Kang Moon-sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.187-198
    • /
    • 2005
  • In this paper, we propose the enhanced header compression scheme for the efficient data traffic transmission in Ipv6 networks. The bandwidth of wireless links and IP networks will probably be limited due to properties of the physical medium and regulatory limits on the use of frequencies for radio communications. That is major cause of user throughput reduction. Therefore, We discuss the IPHC(RFC2507) and ROHC(RFC3095) scheme. IPHC is simple header compression scheme and ROHC is enhanced header compression that have fast optimal recovery scheme. We have studied the enhanced header compression scheme in ROHC. We will show that indication of compression context values preventing from packet losses can provide the fast recovery of compression state. Computer simulations show that the proposed scheme has better performance than the previous one.

  • PDF

A Study on Evaluation Method of ACC Test Considering Domestic Road Environment (국내도로 환경을 고려한 ACC 시험평가 방법에 관한 연구)

  • Kim, BongJu;Lee, SeonBong
    • Journal of Auto-vehicle Safety Association
    • /
    • v.9 no.4
    • /
    • pp.38-47
    • /
    • 2017
  • With automobiles sharply increasing worldwide, we are faced with serious social problems such as traffic accidents, traffic jams, environmental pollution, and economic inefficiency. In response, research on ITS is promoted mainly by regions with advanced automotive industry such as the US, Europe, and Japan. While Korea is working to get ahead to take global market through developing and turning into global standards systems related to ASV(Advanced Safety Vehicle), the country is not excellently prepared for such projects. The purpose of ACC is to control the vehicle's longitudinal speed and distance and minimize driver workload. Such a system should be useful in preventing accidents, as it reduces driver workload in the 21st-century world of telematics created by the development of automobile culture industry. In this light, the thesis presents a method to test and evaluate ACC system and a mathematical method to assess distance. Furthermore, for the proposed test and evaluation, theoretical values are tested with vehicle test and a database is acquired, by using vehicles equipped with an ACC system. We proposed the scenarios suitable for the domestic environment and conducted the actual road test. Theoretical evaluation criteria for developing ACC system may be employed and scenario-specific evaluation methods may find their useful application through testing the formula proposed by comparing the database and the mathematical method. and, many companies are expected to utilize the scenario in the developing stage of ACC, and be able to employ as a verification method by harnessing theoretical formula before a road test.

Implementation of User Connection Prevention System through LAN Monitoring from Internet Harmful Site (LAN 모니터링을 통한 인터넷 유해 사이트의 사용자 접속 방지 시스템 개발)

  • Park, Hyoung-Bae;Chung, Joong-Soo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.1-7
    • /
    • 1999
  • The Internet is emerging as a powerful tool in the area of information and communication technology. The WWW has been especially contributed to increase the internet demand because of its browser which has "Graphic User Interface". Nowadays number of hosts that supply harmful information such as pornographic materials, and the infringement of human rights is rapidly increased. Access to such materials is very easy. Therefore security system which will protect young users from access to harmful host is needed. This paper presents implementation of user system has database about harmful hosts at the Internet and monitors that the user traffic over LAM get touch with the hosts. The system can not make the user access the harmful host because it can over LAN. The performance analysis on the developed system monitoring the traffic over LAN of Andong university is carried out. The performance analysis of monitoring results satisfies with preventing users from the connection to the internet harmful sites.

  • PDF

The Analysis of Factors affecting Expressway Accident Involving Human Injuries using Logit Model (로짓모형을 활용한 고속도로 인적피해에 영향을 주는 요인분석)

  • Seo, Im-Ki;Lee, Ki-Young;Lee, Seong-Kwan;Park, Je-Jin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.3
    • /
    • pp.102-111
    • /
    • 2012
  • Expresway traffic accident is fatal accident by high speed, especially human injury is a great social issue. This paper aims to identify characteristic differences of highway accidents that involve human injuries or not. To analysis the elements that affect the two types of accidents used the logistic regression model. The analysis showed that human injury accident rate is increased in case of straight road, flat, or cut-slope areas, barriers, male driver, and older driver. These results provide the ground for actions to counter the problems. By discovering factors for accidents leading to fatality, this study can provide important implications for authorities that establish highway safety measures and policies in preventing human injuries or deaths from car accidents.

A Statistic-based Response System against DDoS Using Legitimated IP Table (검증된 IP 테이블을 사용한 통계 기반 DDoS 대응 시스템)

  • Park, Pilyong;Hong, Choong-Seon;Choi, Sanghyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.827-838
    • /
    • 2005
  • DDoS (Distributed Denial of Service) attack is a critical threat to current Internet. To solve the detection and response of DDoS attack on BcN, we have investigated detection algorithms of DDoS and Implemented anomaly detection modules. Recently too many technologies of the detection and prevention have developed, but it is difficult that the IDS distinguishes normal traffic from the DDoS attack Therefore, when the DDoS attack is detected by the IDS, the firewall just discards all over-bounded traffic for a victim or absolutely decreases the threshold of the router. That is just only a method for preventing the DDoS attack. This paper proposed the mechanism of response for the legitimated clients to be protected Then, we have designed and implemented the statistic based system that has the automated detection and response functionality against DDoS on Linux Zebra router environment.

Development of a Critical Value According to Dangerous Drive Behaviors (위험운전 유형에 따른 임계값 개발)

  • Oh, Ju-Taek;Cho, Jun-Hee;Lee, Sang-Yong;Kim, Young-Sam
    • International Journal of Highway Engineering
    • /
    • v.11 no.1
    • /
    • pp.69-83
    • /
    • 2009
  • According to the accident statistics of 2006, it can be recognized that drivers' characteristics and driving behaviors are the most causational factors on the traffic accidents. At present, many recording tools such as digital speedometer or black box are distributed in the market to meet social requests of decreasing traffic accidents and increasing safe driving behaviors. However, it is also true that the system preventing any possible vehicle accidents in advance has not been developed. In this study, we developed critical value for deciding dangerous driving behaviors. The developed critical value could be used to contribute to safety driving management systematization and safety driving behaviors.

  • PDF