The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increase in services that utilize ultra-high-speed networks have caused an increase in network traffic problems. Existing networks require new technologies because the management of these networks is difficult and the traffic problems cannot be easily solved. These challenges have prompted the development of software-defined networks (SDNs). SDNs divide existing network structures into data planes,...
IP traceback to the origin of denial of service (DoS) attack is extremely hard and most existing methods such as marking and logging based approaches are not practical and need changes in infrastructure. The flow-based IP traceback is a new approach which can use the advantages of metaheuristic algorithms. In this paper, a bee colony algorithm is applied to find the DoS attack source. The traffic...
The popularization of network P2P applications has brought a significant influence on people's Internet utilization behavior. In this context, this research conducted the case study at a university in Jiangsu province by analyzing the large quantity of data collected from high-performance network traffic control equipments, in order to reveal the distribution characteristics, changing pattern, and...
This paper proposes a method for the IP layer link aggregation using flow information to use all available mobile interfaces for backbone network access simultaneously in a vehicle mobile router. For this purpose, we present the design of the IP layer link aggregation functionality and the design of the aggregator which is the essential part of the IP layer link aggregation functionality. In the proposed...
The volume of Internet traffic increases every year, caused by increased amounts of individual information. Quality of Service (QoS) controls is necessary to manage this traffic. Differentiated Service (Diffserv) is a promising technique to realize scalable QoS control in the internet; extensive efforts have been made for its practical use and it is already introduced in some networks. The control...
In this paper, we establish the cluster-based CRN(Cognitive Radio Network) model and modeling the available channel. Then, based on the flow resource allocation model, combine the active traffic in the CRN, we formed the joint resource allocation optimization model for cluster-based CRN and proposed a joint resource allocation algorithm. The simulation result indicated that the solution of the algorithm...
The random packet sampling method is the simplest methodology for reducing the amount of packets that the network monitoring system has to process. However, the accuracy of anomaly detection is affected by the fact that this method biases a large IP flow. In order to reduce the impact of sampled traffic on network anomaly detecting, an adaptive traffic sampling method is proposed. This method is developed...
Malware attacks cause billions of dollars in economic damage worldwide yearly, and attackers are becoming smarter. We examine techniques for detecting worm propagation in a network using flow-level data. While worm exploits may be difficult to detect due to the wide range of payloads, the propagation phase of a worm is generally much easier to recognize. We examine this step and present one simple...
We report in this paper traffic measurements from Orange's commercial networks connecting ADSL and FTTH clients. Packet-level traces are used to evaluate the impact of the new fiber access network on traffic characteristics. We notably show that with the current level of deployment, only a minority of clients and flows really take advantage of the availability of high capacity and we observe the emergence...
This study presents a detailed flow-level empirical analysis of Peer-to-peer traffic. It is based on 24 hours long traffic traces that were collected on a backbone link in academic environment and in ADSL access. The flows were identified by 5-tuples and were categorized to three main categories: Peer-to-Peer, World-Wide-Web and TCP-big. Four main flow parameters were statistically analyzed: flow...
A network monitoring is an essential activity for managing, diagnosing, and protecting network resources. The network traffic gathering is a foundation of the network monitoring. For the detail network monitoring, both the packet information and the flow information is needed. However, in the sampling needed environments, the sampling method and timing of the packet and flow gathering tools are different...
In this paper, we propose a priority-based feedback flow control system (PFFCS) architecture that use the flow-based network intrusion detection to classify the traffic flows in the network into different priority classes and give different treatment to the flow-rates belonging to different classes, and PFFCS uses a control-theoretic approach to control network traffic and at the same time, adaptively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.