The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The factional Brownian motion has attracted significant attention because it accurately represents Internet traffic characteristics and is amenable to analysis. A link between the probability density function of the steady-state queue size of a queue with a fractional Brownian input and the generalised Gamma distribution is discovered, and the mean, variance, third central moment and skewness are...
The explosive growth of Internet traffic has led to a dramatic increase in demand for data transmission capacity, which has spurred tremendous research activities in real-time traffic estimation and related methodologies. High-speed services and bulk transmission were available and various next-generation converged services are undergoing a change by various services. This paper presents improved...
In this paper, we present an optimization-based approach to control the outbound interdomain traffic for stub ASes. Our approach allows the network operator to define multiple traffic objectives. We present a genetic algorithm to specify a provider for destination prefix sets with the objective of minimizing configure changes , minimum cost and load balancing. In solving the assignment problem with...
A solution to evaluate network workload by data fusion is put forward, which can be for surveillance the traffic of interconnected communications network in order to keep the network working well by identifying potentially serious problems in the early stages and evaluating network performance. Through fusing the historic network traffic data and network online traffic data, which is based on least...
Motivated by performance evaluation of a computer communication system, we consider a renewal input, general service time, single-server, and infinite-capacity queuing system with generally distributed time-out threshold. We obtain two moment approximate formulas for the mean system performance measures (including the mean number of customers in the system and the mean response time) by using the...
Traffic measurements from communication networks have shown that network traffic is exhibiting self similar as well as long range dependence properties. In telecommunication networks, congestion events tend to persist, producing large delays and packet loss resulting in performance degradation. In order to guarantee quality of service to diverse Internet services, congestion prediction became a fundamental...
We propose a novel, passive, nonintrusive method to measure the one-way delay of all the packets flowing between customer sites connected by a provider backbone. Our approach does not sample traffic and requires the injection of a negligible amount of control packets, possibly none. This is obtained by deploying a Measurement Agent in each customer site and exploiting a covert channel to carry information...
The article discusses the use of the diffusion approximation in transient analysis of queueing models applied to investigate some aspects of Internet transmissions. In classical queuing theory, the analysis of transient states is complex and practically does not go far beyond M/M/1 queue and its modifications. However, the time dependent flows in computer networks and especially in Internet focus...
Some network anomalous events caused by same reason (e.g., DDoS, link failure) tend to present similar unusual change on multiple traffic observations, and this part of traffic usually exhibits anomalous features either on time or frequency domain. Motivated by this fact, this paper introduces a multidimensional traffic anomaly detection method based on independent component analysis (ICA). Considering...
PhoneFactortrade is a token-less two-factor authentication service for user remote logons. This allows users of an organization to be authenticated through an automated phone call to the user's phone before access is allowed. In this paper, we present the service management architecture of PhoneFactor that depends on both the Internet and the public switched telephone network (PSTN), and we identify...
This paper proposes a novel traffic engineering method using on-chip diorama network that consists of virtual nodes and virtual links. The diorama network is implemented on reconfigurable processor DAPDNA-2. In these years, traffic engineering has widely researched to guarantee QoS (quality of service). The proposal is an experimental solution with the on-chip diorama network, where virtual links...
The discovery of the batch renewal process (BRP) provides means to investigate the effect of traffic correlation independent of any other traffic characteristics. BRP is considered to be the least-biased choice traffic model, given only the measures of correlation, because the BRP is completely determined by the complete (infinitely denumerable) sets of count correlation and of interval correlation...
Zero-day shellcodes has become a major threat to the Internet with complex obfuscation techniques. However, even the state-of-the-art NIDS has small chances of detecting them because they rely on known signatures. This paper presents hybrid detection for zero-day polymorphic shellcodes (HDPS) against shellcodes using various obfuscations. Our approach employs a heuristic approach to detect return...
DNS is one of the internet's fundamental building blocks, used by various applications such as web and mail transfer. Therefore, monitoring DNS traffic has potential to detect host anomalies such as spammers and infected hosts in a network. However, previous works assume a small number of hosts or target on domain name anomalies, so that they cannot be applied to a large-scale networks due to performance...
Congestion inherently occurs on the network that are shared among several autonomous users due to traffic concentration on certain links. Such an imbalanced traffic load can be caused by network topological features or frequently and independently changing traffic loads. In terms of the topology, it has recently been demonstrated that the Internet has the scale-free property in its topology, which...
Due to the fact that P2P applications have dominantly accounted for the entire Internet traffic, how to efficiently manage P2P traffic has become increasingly important. It has been recently proposed that the underlying network information can be shared between ISPs and P2P service providers in order to achieve efficient resource utilization, with the locality-based peer selection being a specific...
When monitoring unsolicited network traffic automated detection and characterization of abrupt changes in the traffics statistical properties is important. These abrupt changes can either be due to a single or multiple anomalous activities taking place at the same time. The start of a new anomalous activity while another anomalous activity is in operation will result in a new change nested within...
In this paper, we investigate time-correlation of the connection request process of Web browsing applications and other Internet applications. Evidence of self-similarity in the Internet traffic has been pointed out in several papers, but mainly with reference to the volume of traffic, to the packet arrival process, or to the connection arrival process of aggregated traffic. In our study, instead,...
In this paper, we investigate selection strategies for rescue servers in a fully collaborative in which heterogeneous systems share spare resource to address hotspot problems experienced by individual members. Different from content replication, delays due to application replication and startup time of the resulting rescue servers will be taken into consideration. Details about our replication strategy,...
Peer-to-Peer (P2P) systems gained popularity and are responsible for a large share of today's Internet traffic. Nevertheless, their dynamic nature and the intended lack of control through central instances make their behavior unpredictable and, therefore, it is difficult to achieve a high level of Quality-of-Service for P2P traffic. Thus, peers are themselves responsible for dealing with these issues...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.