Secure and bandwidth-on-demand full-service access network

1998 ◽  
Author(s):  
L.M. Wang ◽  
Y. Chai ◽  
M.H. Shih ◽  
E.S. Choa
2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Xueyuan Yin ◽  
Xingshu Chen ◽  
Lin Chen ◽  
Hui Li

To satisfy security concerns including infrastructure as a service (IaaS) security framework, security service access, network anomaly detection, and virtual machine (VM) monitoring, a layered security framework is built which composes of a physical layer, a virtualization layer, and a security management layer. Then, two security service access methods are realized for various security tools from the perspective of whether security tools generate communication traffic. One without generating traffic employs the VM traffic redirection technology and the other leveraged the mechanism of multitasking process access. Moreover, a stacked LSTM-based network anomaly detection agentless method is proposed, which has advantages of a higher ratio of precision and recall. Finally, a Hypervisor-based agentless monitoring method for VMs based on dynamic code injection is proposed, which has benefits of high security of the external monitoring method and good context analysis of the internal monitoring mechanism. The experimental results demonstrate the effectiveness of the proposed protection framework and the corresponding security mechanisms, respectively.


Author(s):  
Shigeo Urushidani ◽  
Michihiro Aoki ◽  
Motonori Nakamura ◽  
Michihiro Koibuchi ◽  
Kensuke Fukuda ◽  
...  

2015 ◽  
Vol 1 (10) ◽  
pp. 376
Author(s):  
Bhubneshwar Sharma

ATM provides functionality that is similar to bothcircuit switchingandpacket switchingnetworks: ATM usesasynchronoustime-division multiplexing, and encodes data into small, fixed-sizedpackets(ISO-OSIframes) calledcells.This differs from approaches such as theInternet ProtocolorEthernetthat use variable sized packets and frames. ATM uses aconnection-orientedmodel in which avirtual circuitmust be established between two endpoints before the actual data exchange begins. These virtual circuits may be permanent To make m-banking application a success bandwidth management is an important issue. The increased flexibility and mobility feature of wireless ATM and its bandwidth on demand function is motivating a large number of carriers towards deployment of the WATM networks. But there are certain issues which are required to be addressed in WATM. The issues are cost effective planning of network, location management and handover management


Author(s):  
Alaitz Mendiola ◽  
Jasone Astorga ◽  
Eduardo Jacob ◽  
Kostas Stamos ◽  
Artur Juszczyk ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document