connection request
Recently Published Documents


TOTAL DOCUMENTS

17
(FIVE YEARS 2)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Abhijit Dnyaneshwar Jadhav ◽  
Vidyullatha Pellakuri

Abstract Network security and data security are the biggest concerns now a days. Every organization decides their future business process based on the past and day to day transactional data. This data may consist of consumers confidential data, which needs to be kept secure. Also, the network connections when established with the external communication devices or entities, a care should be taken to authenticate these and block the unwanted access. This consists of identification of the malicious connection nodes or identification of normal connection nodes. We expect, everytime whenever there is a connection request, it should be recognized as a type of normal node or malicious node connection request. For that, we use a continuous monitoring of the network input traffic to recognize the malicious connection request called as an intrusion and this type of monitoring system is called as Intrusion detection system(IDS). IDS helps us to protect our network and data from insecure and malicious network connections. Many such systems exists in the real time scenario, but they have critical issues of performance like accuracy and efficiency. These issues are addressed as a part of this research work of IDS using machine learning techniques. The TP-IDS is designed in two phases for increasing accuracy. In phase I of TP-IDS, Suppor Vector Machine (SVM) and k Nearest Neighbor (kNN) are used. In phase II of TP-IDS, Decision Tree (DT) and Naïve Bayes (NB) are used, where phase II is the validation phase of the system for increasing accuracy. Also, both the phases are having Hadoop distributed file system underlying data storage & processing architecture, which allows parallel processing to increase the speed of the system and hence achieve the efficiency in TP-IDS.



2021 ◽  
pp. 90-98
Author(s):  
Christine Schäler ◽  
Klaus Strasser ◽  
Robert Damböck ◽  
Hans-Peter Schwefel


2020 ◽  
Vol 6 (2) ◽  
pp. 1-8
Author(s):  
Gulafsha Baig ◽  
Dharmendra Singh Yadav ◽  
Rupesh Dubey


2020 ◽  
Vol 7 (7) ◽  
pp. 6539-6549
Author(s):  
Riri Fitri Sari ◽  
Ruki Harwahyu ◽  
Ray-Guang Cheng


2019 ◽  
Vol 68 (7) ◽  
pp. 6937-6950
Author(s):  
Maurice J. Khabbaz ◽  
Hassan A. Artail


2018 ◽  
Vol 0 (0) ◽  
Author(s):  
Ujjwal ◽  
Jaisingh Thangaraj

Abstract In this paper, an algorithm for multipath connection provisioning in elastic optical network (EON) has been proposed. Initially, the algorithm prefers the single-path routing for service provisioning. But when single-path routing is not adequate to serve a dynamic connection, the algorithm switches to the connection request fragmentation. Its computation is based on the parameters such as capacity_constant and capacity_allowed to fragment the connection request on disjoint paths. Simulation results clearly state that the proposed algorithm performs well in service provisioning as compared to the traditional single-path routing algorithms and improves the average network throughput. Thereafter, we have investigated the limitation of Erlang B traffic model in EON for calculation of link blocking probability using routing and spectrum assignment (RSA) algorithm. It is verified by the following two ways: (i) effect on the blocking probability in case of constant load and (ii) effect of slot width on the blocking probability. Our simulation results indicate that in EON due to dynamic RSA, blocking probability is not constant in case of proportionate varying of call arrival and service rate giving constant load and blocking probability depends on the number of slots per link, but in Erlang B traffic model blocking probability is always constant in case of constant load and it considers wavelength per link instead of slots per link. This is attributed to the fact that Erlang B traffic model fails to calculate blocking probability accurately in EON. We have computed the carried traffic on 14 nodes, 21-link National Science Foundation Network (NSFNET) topology.



Author(s):  
Intan Ferina Irza ◽  
Zulhendra Zulhendra ◽  
Efrizon Efrizon

The internet world in the globalization era is now developing. Anyone and anywhere can access the internet if you already have the tools and connections are adequate. There are two-ways relationship in accessing a web, they are Client and Server. Good Web Server performance can affect the quality of two-ways relationship between Client and Server. There are two Web Servers that are widely used today are Apache and Nginx. As a media content provider is expected to meet all the needs of users, especially in terms of performance of the device itself. To prove how the apache and nginx Web Server performance compare to the data request by the user, it is necessary to do a test and compare the parameters of each Web Server. Based on the problems above, the authors want to analyze and compare the performance of both Web servers are Apache and Nginx, so users can choose the best Web Server. The author only compares the parameters of throughput, connection, request, reply and error by assigning load to each test and performed on attributes that exist on beritalinux.com virtually. After testing, the results obtained where in responding and connecting data that requested by the client of web application server nginx was superior to apache. From these results, it is recommended to admin on beritalinux.com to use nginx web server for better website performance.Keywords: Analysis, Performance, Web Server, Apache, Nginx, HTTPERF



2017 ◽  
Vol 2017 (1) ◽  
pp. 2560-2563
Author(s):  
Andreas Ulbig ◽  
Stephan Koch ◽  
Christos Antonakopoulos


2014 ◽  
Vol 701-702 ◽  
pp. 1093-1097
Author(s):  
Shu Du ◽  
Ze Hui Xu ◽  
Hai Tao Wang ◽  
Wei Fu Peng

In the IP-over-WDM networks, electric power is more consumed at IP layer. This letter proposes two power-saving dynamic connection provision algorithms, called Most Used First (MUF) and State Transmission Time Aware (STTA) respectively, which can direct the incoming connection request to already provisioned router line cards and chassis, and hence reduce the number of active IP devices so to save electric power. For a typical network, MUF and STTA can save over 3% and 7% power respectively comparing with conventional power-unaware approach.



Sign in / Sign up

Export Citation Format

Share Document