The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Rerouting processes are considered to be especially important in modern computer networks. To provide the quality of service (QoS) in conditions of network equipment overloads and failures the rerouting protocols used must provide continuous access to the network for end users. One of effective approaches of support of fault-tolerant routing is use of subnet routing method. The purpose of work is...
The majority of modern routing algorithms in computer networks is based on Bellman-Ford and Dijkstra's algorithms. The efforts to calculate these algorithms lead to the complexity O(N3) and O(N2) correspondingly. Here N is the number of communication nodes or routers in computer network. When changing communication links bandwidth in given algorithms total recalculation of routing tables takes place...
In modern computer networks loading and bandwidth of communication links are optimized for providing high-quality service of network traffic, new services and technologies. As a rule, for this task the protocols of dynamic routing based on Dijkstra algorithm are used. Protocols of multipath routing for ensuring reliability and accuracy of the provided information allow to divide critical traffic and...
For some computer to find another in a network, there is a routing mechanism which describes how information is transferred between network nodes. The route is understood as sequence of network nodes through which it is possible to transmit information from source node to destination node. One of perspective methods of a computer network reliability increase is ensuring fast restoration of routes...
In the given work the questions of behaviour estimation of network traffic that has the self-similarity properties and the obtained data analysis have been considered by means of chaos theory. The obtained results describe operation efficiency of a computer network. The purpose of the research was to define the conditions of chaotic phenomena occurrence in infocommunication systems and the ways to...
According to the previous experience, the BP neural network have been holding the leading position in the forecast ability and the study precision. However, the running rate and the skilled speed are too slow to solve the smallest region issues, so Simulation Annealing is introduced in the article. It means that Simulation Annealing-BP neural network is used to the intelligent prediction model and...
Our previous studies revealed the structure of social networks, which are behind communication networks, by using various metrics of a communication service (amount of traffic, the number of users, etc.). Moreover, we proposed a communication frequency model between users based on a social network structure, and showed that it can reproduce the growth in the number of social networking service (SNS)...
A firewall is basically a defense device to control incoming and outgoing network traffic. Policies and rules are important components of a firewall that allow packets to pass through by network administration. However, administrators do not know what the destination policies and rules are, and bandwidth control and management are not efficient. A concept occurred that firewalls can transfer and learn...
The increase in network traffic has lead to the concept of congestion in computer networks. The problem of network congestion control remains a major issue in today's computer networks. Despite various methods and algorithms that has been proposed, however due to the dynamic nature of computer networks, no universal control method has been widely accepted. This paper reviews various conventional methods...
Consistency maintenance in distributed interactive applications (DIAs) is subjected to network characteristics such as limited bandwidth and latency. Predictive contract mechanisms are techniques that compensate for the effect of network latency by extrapolating future entity states from historical records. These approaches trade inconsistency within human perceptual limits for reduced network traffic...
Based on TCP protocol, this paper aims at TCP flows, discusses the effects of multivariate correlation analysis on network traffic, obtains the quantitative relationship between different types of TCP packets in each time unit by correlation coefficient matrix, and finally proposes an anomaly detection and analysis method based on the correlation coefficient matrix. The experimental results show that...
The recent era has witnessed tremendous increase in the usage of computer network applications. Users of any type and requirement are compelled to be on a network. Today, the computer has become a network machine rather than a standalone system. This has generated challenges to the network security devices in terms of accuracy and reliability.Intrusion Detection Systems (IDS) are designed for the...
The main contribution of this article is to propose a collaborative and distributed cache mechanism tailored for ad hoc networks. Each node's cache is partitioned into a shared area and a private area. The proposed collaborative cache is formed by each node's shared area, which is used to store contents relevant to the group, while the private area is used to store information relevant to its owner...
In this paper, we present a distributed algorithm that dynamically allocates the available resources of a service-oriented network to delay sensitive network services. Our algorithm is based on Gauss-Seidel type iterations. Thus, each node depends on its local information and sends/receives a small number of messages, until convergence is achieved. We use a utility-based framework to differentiate...
In a recent study, the chaotic phenomena of traffic has became an attractived topic in the filed of computer network. Based on theory of mean field, the mathematics model for describing the dynamic behavious of network traffic is presented, dynamical properties of this model are also analysed. It is shown that dynamical properties of the model is closely linked to the combination control parameter...
Covert channels are widely used for secret information transmission on networks. Although packet length based covert channels have greatly enhanced tamper resistance, they are still vulnerable to detections due to abnormal network traffic. Thus, in this paper, we are motivated to design a novel protocol-independent covert channel that could deliver normal network traffic. We simulated our covert channel...
Intrusion detection (ID) is an interesting approach that could be used to improve the security of network systems. IDS detects suspected patterns of network traffic on the remaining open parts through monitoring user activities (runtime gathering of data from system operations), and the subsequent analysis of these activities. The purpose of this work is to contribute ideas of finding a solution to...
We discuss the need for adaptive load control in network security environments in order to cope with the increasing bandwidth requirements. In earlier work, we developed a simple model to study the behavior of feedback loops for self-configuring security environments. We primarily considered the traffic between the monitoring probes, the IDS systems, and associated firewalls. We now enhanced the model...
In this paper we apply the nonlinear time series prediction method to the traffic measurements data. Based on the phase space reconstruction, the support vector machine prediction method is used to predict the traffic measurements data, and the neighbor point selection method is used to choose the number of nearest neighbor points for the support vector machine regression model. The experiment results...
A protocol anomaly detection model based on hidden Markov model (HMM) is given in this work which can verify normal and abnormal traffic. Then we demonstrate the model's correctness and effectiveness by using MIT Lincoln Laboratory 1999 DARPA Intrusion Detection Evaluation Data Set.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.