Detection and Control of Bursty Video and Packet Data Traffic

Author(s):  
C. Thompson ◽  
V. Harpanahalli ◽  
S. Mulpur ◽  
B. Jang
Keyword(s):  
Author(s):  
Volodymyr Smirnov ◽  
◽  
Natalia Smirnova ◽  

The purpose of the article is to develop an adaptive mobile network node architecture with an amorphous topology. The article describes the host controller architecture. The concept of a mobile network is described. The mobile network is adaptive, self-organizing, and able to operate autonomously. The presented mobile network node controller architecture is the object swarm control system basis. A stack of mobile network protocols is presented, consisting of a control protocol, a data exchange protocol and a configuration protocol. The nodes of the network controllers interaction is carried out using several transceivers. The use of multiple transceivers made it possible to distribute data traffic, configuration traffic, and management traffic over different channels, which made it possible to carry out information exchange at the same time. The protocol stack is minimized. The functionality of the host and the network object (swarm) is completely separated. The topology of the mobile network is not deterministic, amorphous and changes when the network objects move in space. In this case, some connections are lost and others arise. The routing tables are constantly updated. The network in accordance with the laid down algorithm, is able to build the necessary topology and organize the necessary connections in order to complete the task with a swarm of objects. The network is capable of building packet retransmission chains for remote network objects. Thus, the implementation of a mobile network at its low cost allows solving a certain range of problems. The performer can be either a separate object associated with the operator through a swarm of repeaters, or a swarm of objects. In order to increase the efficiency of the formation of routing tables and minimize the cluster structures in a mobile network, it is advisable to use optimization algorithms based on set theory. The mobile network is designed to control a swarm of objects, which can be UAVs, robotic objects and control systems for various technological processes.


2019 ◽  
Vol 8 (4) ◽  
pp. 7197-7201

The current problems raising as a horizon in the computational and networking sector is based on the unimaginable increase of high numbers of users which in turn results in high data traffic, limitations over products which are vendor specific, incurring high expenses in maintaining the existing network. This dilutes a major part of the beneficiaries in the sector to move towards Cloud Networks. All these happenings in the past has quietly increased the risks and challenges in the aspect of security considering both data and the infrastructure accommodating the data. In an attempt to address almost a major portion of the existing above said problems, Software Defined Networking was highly anticipated, however, it was considered as a theoretical approach. After the implementation of SDN networks by industrial giants like Google, the SDN concepts again managed to reach the safer hands of the researchers in the movement of enhancement. A very rapid and high speed research work has been initiated by researchers all around the globe in analysing the risk factors and implementation barricades stated in the Software Defined Networking architecture. The research work focus on adding values to the Quality of Service, Latency, Load Balancing and most importantly the security aspects in various metrics of the Software Defined Networking Architecture. The odd man out architecture of Software Defined Networking by decoupling data and control plane allows the network to be configured and maintained in a real time scenario pertaining to pose a complete view of the network and its flow. The fact that is considered as an advantage itself is a factor of question in the case of security in the overall SDN architecture. This paper focuses on a detailed view of SDN architecture with the existing security feature and continues with the expected threats and classifying the weak points in the SDN. This paper also briefs about the pros and cons of the existing applications in the SDN architecture.


Author(s):  
Ravi Kiran Varma P ◽  
S Kumar Reddy Mallidi ◽  
Rohit Rishi Muni

Aim: To design and evaluate the performance of a Grey Wolf Optimization (GWO) based wrapper feature selection applied to the Botnet malware detection system. Background: A botnet is malicious software that is controlled by a master and used to compromise a distributed set of systems, in turn targeting a victim. Powerful attacks like Distributed Denial of Service (DDoS) can be triggered using a botnet. With the rapid growth of the Internet of Things (IoT) and its omnipresence, the vulnerable IoT devices are also under threat of being a victim or a zombie. Objective: To optimize the listed botnet data traffic features, Grey Wolf Optimization (GWO), in a wrapper model, is used to search the useful features without affecting the classification accuracy. Method: The Botnet dataset consists of a total of 192 command and control (C& C) botnet channels HTTP traffic features, and network traffic session-based features. GWO optimization algorithm is used as a wrapper for feature selection, and evaluated on three different classifiers, viz., SVM, KNN, and DT. Results: Decision Tree (DT) and GWO wrapper produced the best results when compared with other classifiers. The output of the research reduces the botnet traffic features to 19 from 192, with an accuracy of 99.73% post the reduction. Conclusion: The proposed DT-GWO wrapper turns out to be an excellent choice for feature reduction for botnet attack detection. The strength of the DT-GWO wrapper is that it is able to retain the near full-feature accuracy even after a massive reduction of 90.10% of the features.


1988 ◽  
Vol 110 (4) ◽  
pp. 367-373 ◽  
Author(s):  
Yoram Halevi ◽  
Asok Ray

Computer networking is a reliable and efficient means for communications between disparate and distributed components in complex dynamical processes like advanced aircraft, spacecraft, and autonomous manufacturing plants. The role of Integrated Communication and Control Systems (ICCS) is to coordinate and perform interrelated functions, ranging from real-time multi-loop control to information display and routine maintenance support. In ICCS, a feedback control loop is closed via the common communication channel which multiplexes digital data from the sensor to the controller and from the controller to the actuator along with the data traffic from other loops and management functions. Due to the asynchronous time-division multiplexing of the network protocol, time-varying and possibly stochastic delays are introduced in the control system, which degrade the system dynamic performance and are a source of potential instability. The paper is divided into two parts. In the first part, the delayed control system is represented by a finite-dimensional, time-varying, discrete-time model which is less complex than the existing continuous-time models for time-varying delays; this approach allows for simpler schemes for analysis and simulation of ICCS. The second part of the paper addresses ICCS design considerations and presents simulation results for certain operational scenarios of ICCS.


Author(s):  
Volodymyr Smirnov ◽  
◽  
Natalia Smirnova ◽  

The purpose of the article is to develop an adaptive wireless LAN architecture for the technological processes, robotic devices and other objects control. The article describes the wireless LAN architecture. The concept of a wireless LAN is described. The wireless network is adaptive, self-organizing, and able to operate autonomously. The presented wireless network node controller architecture is the basis for many objects and Smart home control system small systems without using MQTT servers. The nodes of the network nodes interaction is carried out using several transceivers. The use of multiple transceivers made it possible to distribute data traffic, configuration traffic, and control traffic over different channels, which made it possible to carry out information exchange at the same time. The protocol stack is minimized. The functionality of the host and the network object is completely separated. The topology of the mobile network is not deterministic, amorphous and changes when the network objects move in space. In this case, some connections are lost and others arise. The routing tables are constantly updated. The network in accordance with the laid down algorithm, is able to build the necessary topology and organize the necessary connections in order to complete the task with a many objects. The network is capable of building packet retransmission chains for remote network objects. Thus, the wireless network implementation at its low cost allows solving a certain range of tasks. The performer can be either a separate object associated with the operator through a many repeaters. In order to increase the efficiency of the formation of routing tables and minimize the cluster structures in a wireless network, it is advisable to use optimization algorithms based on set theory. The local wireless network is designed to control an Internet of Things objects, robotic objects and control systems for various technological processes.


Sign in / Sign up

Export Citation Format

Share Document