The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network operators need to assess the effects of routing policies and traffic engineering methods in order to guide planning and operational decisions related to peering. We propose a peering analysis framework based on the correlation of inferred AS paths and traffic flow information. We define the data sets needed and a four-step methodology designed to reduce network data dimensionality, determine...
Minimizing the flow completion times (FCTs), especially for the short flows, is widely deemed an important optimization goal in designing data center networks, while flow scheduling strategies play great role in achieving this target. Existing optimal scheduling algorithms severely depend on the prior knowledge of flow size, which is hard to implement in practice. Therefore, it is necessary to estimate...
We conduct the analysis of the traffic measured on the backbone link between the WIDE network that connects a number of leading universities in Japan and the upstream internet service provider. We study its statistical properties such as the packet sizes and time distributions between packets. To reveal the laws governing the end user activity and its impact on the network traffic dynamics, we next...
The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc. Every type of menace is characterized by a vector...
In the given work the questions of behaviour estimation of network traffic that has the self-similarity properties and the obtained data analysis have been considered by means of chaos theory. The obtained results describe operation efficiency of a computer network. The purpose of the research was to define the conditions of chaotic phenomena occurrence in infocommunication systems and the ways to...
Self-similarity is a phenomenon which has come into computer networks literatures during last two decades and plays a significant role in modeling of computer network traffics. It is generally accepted that computer network traffics are self-similar and they are dissimilar to Poisson-based traffics. Computer network models exert a considerable influence on improving quality of service. Therefore,...
Most assessments of network performance make use of metrics that are defined directly in terms of concepts relevant to the transport, network, link and physical layers. These measures of performance provide engineering data useful in characterizing those layers of the architecture, but they do not directly address the operational impact of network behavior. Measures of effectiveness do address operational...
The Suricata intrusion-detection system for computer-network monitoring has been advanced as an open-source improvement on the popular Snort system that has been available for over a decade. Suricata includes multi-threading to improve processing speed beyond Snort. Previous work comparing the two products has not used a real-world setting. We did this and evaluated the speed, memory requirements,...
Captured network traffic data is generally used to evaluate, validate and analyze novel solutions for various network problems. Hence, the quality and the completeness of the network traffic dataset are important for the analysis to yield correct results. However, the quality of the network traffic dataset is never questioned. In this work, we propose a systematic methodology to visually verify the...
We consider a model of congestion for computer networks based on a continuous-time finite-state homogeneous bivariate Markov chain. The model can be used to evaluate, via computer simulation, the performance of protocols and applications in a network with random path delays and packet losses due to traffic congestion. Only one of the processes of the bivariate Markov chain is observable. In our application,...
In this paper we study the outage probability of a hybrid CDMA wireless network in path loss channel. In the considered hybrid network an infrastructure of base stations is considered in order to improve the ad hoc network connectivity. Base stations are set up in fixed locations and they are connected through a wired core network. Mobile users are distributed randomly according to a Poisson point...
Denial of Service (DOS) network attacks continue to be a widespread problem throughout the internet. These attacks are designed not to steal data but to prevent regular users from accessing the systems. One particularly difficult attack type to detect is the distributed denial of service attack where the attacker commandeers multiple machines without the users' awareness and coordinates an attack...
Sharing of information leads to the need to transfer data between geographically distant locations. Identifying the most appropriate time period to execute the data transfer is essential to achieve the best data transfer throughput; e.g. one can forecast network traffic, identify future low network traffic activities between two entities, and plan the data transfer accordingly. This forecasting can...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
Accurate measurement of available bandwidth (ABW) is an important parameter to analyze network performance. Active measurement is an attractive approach as it has the advantage of controllability and flexibility for performing network measurement. However, it can affect both the data traffic and the measurement process itself if a significant amount of probe traffic is injected into the network. Furthermore,...
Call admission and congestion control mechanisms are the integral parts of any Quality of Service (QoS) design for computer networks that support integrated traffic. In this paper, we propose an call admission control algorithm and a congestion control algorithm for cluster based networks, which are used in a various set of applications that require QoS guarantees. We mainly consider queue length...
Traffic splitting plays a very important role in parallel traffic replay since it determines the amount of required PCs and guarantees replay quality for each generated sub-trace. Previously adopted simulation-based method for splitting high-speed network traffic introduces serious performance limitation as it distributes traffic load to the replay PCs in an iterative trial-and-error manner. In this...
While in computer networks the number of possible protocol encapsulations is growing day after day, network admin- istrators face ever increasing difficulties in selecting accurately the traffic they need to inspect. This is mainly caused by the limited number of encapsulations supported by currently available tools and the difficulty to exactly specify which packets have to be analyzed, especially...
In most articles dataflow in computer networks is described as a transfer function. Numerators, denominators and delay times give behaviors of these systems. Some systems show linear features, others have non-linear ones. All descriptions have some special results. Some of them present linear aspects of transfers, while other ones look for bottlenecks of the networks or prove stability of the systems...
As multimedia real-time businesses with representative of video come into the network services, real-time performance of campus network has are influenced by similar traffic of video passing through without control. In this paper, by use of the forwarding characteristics of packet/frame switch, a strategy to reduce the self-similar traffic's impact on network performance is discussed, which is based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.