Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we present an approach for visualizing net flow data through clustering to identify anomalies in network traffic. Various clustering techniques are applicable for Intrusion Detection for identifying anomalous events. In this paper we present an approach based on Simple K-Means for analyzing network flow data using any flow data attribute, such as IP address, port, protocols etc, to detect...
Many potential safety problems result from the rapid development of P2P IPTV business, and the foundation for effectively managing the business is to accurately identify unstructured P2P multicast video streaming. In this paper, four flow features are proposed to distinguish unstructured P2P multicast video streaming from P2P file streaming by analyzing the working principle of unstructured P2P multicast...
A mechanism for reducing reverse traffic in the fuzzy logic based dual explicit congestion notification mechanism is proposed for satellite TCP/IP networks. A linguistic hedge based backward explicit congestion notification (BECN) activation function is employed in order to ensure that reverse traffic is generated only when congestion is extremely high. A source initiated RTT reverse traffic reduction...
Similar to the customer / service provider network model that exists in the Internet today, the Department of Defense's (DoD's) Global Information Grid (GIG) will consist of various customer networks (Army, Navy, etc.) that interconnect over a common core. Customer networks will source and sink IP traffic, and a transit network(s) will provide connectivity between geographically disparate customer...
This paper presents an analysis of satellite communications (SATCOM) systems that use Internet protocol (IP) with quality of service (QoS) metrics, and addresses IP efficiency measures. Key contributing elements for the IP efficiency are network structure, provisional efficiency, and bandwidth-on-demand features. IP bandwidth gains will also depend on the network size, the level of hierarchy, and...
In the tactical Internet, inter-domain links consist mostly of unreliable and low bandwidth wireless links. To enable seamless routing across different Autonomous Systems (ASes), we propose an inter-domain Traffic Engineering (TE) scheme to reroute traffic when congestion occurs. There are two components for the TE scheme. First, a Traffic Splitting (TS) scheme is used for load balancing among parallel...
The main purpose of vehicular networks is to improve safety and traffic efficiency. Geographic addressing and routing is currently the basic architecture solution adopted in most vehicular architectures and standards. However, it is also required that these vehicular architectures support the provision of additional IP based services and applications. One of these services is geo-enabled IP multicast,...
The net-centric vision for the global information grid (GIG) includes evolution toward Internet protocol (IP) based services. IP service profiles and in-service traffic flows in support of Warfighters in evolving deployments are highly variable, with end-to-end (E2E) flows typically spanning both terrestrial and satellite communications (SATCOM) networks. Communications planning, management and control...
Site multi-homing is an important capability in modern military networks. Resilience of a site is greatly enhanced when it has multiple upstream connections to the global information grid, including the global Internet. Similarly, the ability to provide traffic engineering for a site can be important in reducing delays and packet loss over low-bandwidth and/or high-delay uplinks. Current approaches...
Monitoring network traffic is important to analyze network state, so that it is necessary to observe various traffic data and then compute the data frequency counts. If we process all the incoming packets, a lot of computer resources (mainly memory and CPU) are needed. Stream mining based algorithms can approximately compute data frequency counts over data streams with small resources. Lossy counting...
The increasing popularity of P2P and multimedia applications around the world has resulted in significant global increases in network traffic. This paper investigates the traffic changes in our enterprise network by analyzing the day-long traffic traces from 2007 to 2009. We observe that there has been a substantial increase in traffic in the past few years; however, no single application type is...
Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data. With IPv6 slowly being deployed around the world, network intruders are beginning to adapt their tools and techniques to work over IPv6 (vs. IPv4). Many tools for visualizing network activity, while useful for detecting large scale attacks and network behavior anomalies still only...
Optimizing the satisfaction of users of distributed applications is an important yet non-trivial task. Data corruption incurred during network transmission plays a significant role in this context since it is likely to result in user frustration. As a countermeasure, Forward Error Correction (FEC) schemes complement source data with redundant information to enable data recovery at destination-side...
Knowing the length distributions of traffic flows passing through a network link is useful for some applications such as inferring traffic demands, characterizing source traffic, and detecting traffic anomalies. The collection of the necessary information on every packet becomes prohibitive in term of the consumption of resources by measurement operation in high speed links. Packet sampling has become...
In this paper, we study the application of PCA to the IP network anomaly detection. The algorithm is based on detecting changes in traffic feature distribution aggregated by sample entropy. This method of detection has originally been proposed to detect anomalous traffic on origin-destination flows in backbone networks. We have adjusted the algorithm so that it works with network traffic captured...
As the number of user of group services increases, ISP, service provider, and service user need efficient delivery of service. Although multicast delivery can provide the efficient delivery of service, it is not used widely because of deployment and management problems. As an alternate solution, many overlay multicast mechanisms are proposed, especially in [1] [2] [3] overlay multicast for supporting...
This paper, in accordance with the authors' continuing research investigates the effect of adding extra servers in Session Initiation Protocol (SIP) signaling network on session setup delay in the IP Multimedia Subsystem (IMS). The effect of applying more than one server in reducing waiting time in each of the nodes of the system is previously investigated by the authors in and applying more servers...
As an alternative solution to solve the tussles between the network operators and the peer-to-peer (P2P) applications, an informed peer selection (IPS) scheme like P4P is proposed. In IPS, each network operator installs a server that provides their network information to the peers as a guidance for peer selection and each peer chooses its communicating partner based on the guidance. Most existing...
The random nature of unstructured P2P overlays imbues them with enhanced self-* properties. Most of the algorithms which make searching in unstructured P2P systems scalable, such as dynamic querying and 1-hop replication, rely on the random nature of the overlay to function efficiently. However, they do not take into account the structure of the underlying physical communications network, which is...
After P2P file-sharing and VoIP telephony applications, VoD and live-streaming P2P applications have finally gained a large Internet audience as well. In this work, we define a framework for the comparison of these applications, based on the measurement and analysis of the traffic they generate. In order for the framework to be descriptive for all P2P applications, we first define the observable of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.