data traffic
Recently Published Documents


TOTAL DOCUMENTS

1155
(FIVE YEARS 381)

H-INDEX

30
(FIVE YEARS 8)

With the rapid development of mobile Internet technology, mobile network data traffic presents an explosive growth trend. Especially, the proportion of mobile video business has become a large proportion in mobile Internet business. Mobile video business is considered as a typical business in the 5G network, such as in online education. The growth of video traffic poses a great challenge to mobile network. In order to provide users with better quality of experience (QoE), it requires mobile network to provide higher data transmission rate and lower network delay. This paper adopts a combined optimization to minimize total cost and maximize QoE simultaneously. The optimization problem is solved by ant colony algorithm. The effectiveness is verified on experiment.


2022 ◽  
Vol 11 (3) ◽  
pp. 1-11
Author(s):  
Sudhakar Sengan ◽  
Osamah Ibrahim Khalaf ◽  
Vidya Sagar P. ◽  
Dilip Kumar Sharma ◽  
Arokia Jesu Prabhu L. ◽  
...  

Existing methods use static path identifiers, making it easy for attackers to conduct DDoS flooding attacks. Create a system using Dynamic Secure aware Routing by Machine Learning (DAR-ML) to solve healthcare data. A DoS detection system by ML algorithm is proposed in this paper. First, to access the user to see the authorized process. Next, after the user registration, users can compare path information through correlation factors between nodes. Then, choose the device that will automatically activate and decrypt the data key. The DAR-ML is traced back to all healthcare data in the end module. In the next module, the users and admin can describe the results. These are the outcomes of using the network to make it easy. Through a time interval of 21.19% of data traffic, the findings demonstrate an attack detection accuracy of over 98.19%, with high precision and a probability of false alarm.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 519
Author(s):  
Gianmarco Romano

Massive multiple-input multiple-output (mMIMO) communication systems and the use of millimeter-wave (mm-Wave) bands represent key technologies that are expected to meet the growing demand of data traffic and the explosion of the number of devices that need to communicate over 5G/6G wireless networks [...]


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 410
Author(s):  
Muhammad Altaf Khan ◽  
Moustafa M. Nasralla ◽  
Muhammad Muneer Umar ◽  
Ghani-Ur-Rehman ◽  
Shafiullah Khan ◽  
...  

Wireless sensor networks (WSNs) are low-cost, special-purpose networks introduced to resolve various daily life domestic, industrial, and strategic problems. These networks are deployed in such places where the repairments, in most cases, become difficult. The nodes in WSNs, due to their vulnerable nature, are always prone to various potential threats. The deployed environment of WSNs is noncentral, unattended, and administrativeless; therefore, malicious attacks such as distributed denial of service (DDoS) attacks can easily be commenced by the attackers. Most of the DDoS detection systems rely on the analysis of the flow of traffic, ultimately with a conclusion that high traffic may be due to the DDoS attack. On the other hand, legitimate users may produce a larger amount of traffic known, as the flash crowd (FC). Both DDOS and FC are considered abnormal traffic in communication networks. The detection of such abnormal traffic and then separation of DDoS attacks from FC is also a focused challenge. This paper introduces a novel mechanism based on a Bayesian model to detect abnormal data traffic and discriminate DDoS attacks from FC in it. The simulation results prove the effectiveness of the proposed mechanism, compared with the existing systems.


2022 ◽  
Vol 70 (1) ◽  
pp. 1769-1780
Author(s):  
Hye-Min Kwon ◽  
Seng-Phil Hong ◽  
Mingoo Kang ◽  
Jeongwook Seo

2021 ◽  
Vol 14 (1) ◽  
pp. 18
Author(s):  
Shoujiang Dang ◽  
Rui Han

In scientific domains such as high-energy particle physics and genomics, the quantity of high-speed data traffic generated may far exceed the storage throughput and be unable to be in time stored in the current node. Cooperating and utilizing multiple storage nodes on the forwarding path provides an opportunity for high-speed data storage. This paper proposes the use of flow entries to dynamically split traffic among selected neighbor nodes to sequentially amortize excess traffic. We propose a neighbor selection mechanism based on the Local Name Mapping and Resolution System, in which the node weights are computed by combing the link bandwidth and node storage capability, and determining whether to split traffic by comparing normalized weight values with thresholds. To dynamically offload traffic among multiple targets, the cooperative storage strategy implemented in a programmable data plane is presented using the relative weights and ID suffix matching. Evaluation shows that our proposed schema is more efficient compared with end-to-end transmission and ECMP in terms of bandwidth usage and transfer time, and is beneficial in big science.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Ming Wan ◽  
Xinlu Xu ◽  
Yan Song ◽  
Quanliang Li ◽  
Jiawei Li

Due to its openness and simplicity, Modbus TCP has wide applications to facilitate the actual management and control in industrial wireless fields. However, its potential security vulnerabilities can also create lots of complicated information security challenges, which are increasingly threatening the availability of industrial real-time traffic delivery. Although anomaly detection has been recognized as a workable security measure to identify attacks, the critical step to successfully extract data characteristics is an extremely difficult task. In this paper, we focus on the continuous control mode in industrial processes and propose a control tracing feature algorithm to extract the function-driven tracing characteristics from Modbus TCP data traffic. Furthermore, this algorithm can flexibly integrate the time factor with critical functional operations and adequately describe the dynamic control change of technological processes. To closely cooperate with this algorithm, one optimized SVM (support vector machine) classifier is introduced as the practicable decision engine. By designing one applicable attack mode, we develop an in-depth and meticulous analysis on the decision accuracy, and all experimental results clearly explain that the extracted features can strongly reflect the changing pattern of continuous functional operations, and the proposed algorithm can effectively cooperate with the optimized SVM classifier to distinguish abnormal Modbus TCP data traffic.


2021 ◽  
Vol 1 (1) ◽  
pp. 281-290
Author(s):  
Rifki Indra Perwira ◽  
Hari Prapcoyo

SDN is a new technology in the concept of a network where there is a separation between the data plane and the control plane as the brain that regulates data forwarding so that it becomes a target for DDoS attacks. Detection of DDoS attacks is an important topic in the field of network security. because of the difficulty of detecting the difference between normal traffic and anomalous attacks. Based on data from helpnetsecurity.com, in 2020 there were 4.83 million attempted DoS/DDoS attacks on various services, this shows that network security is very important. Various methods have been used in detecting DDoS attacks such as using a threshold on passing network traffic with an average traffic size compared to 3 times the standard deviation, the weakness of this method is if there is a spike in traffic it will be detected as an attack even though the traffic is normal so that it increases false positives. To maintain security on the SDN network, the reason is that a system is needed that can detect DDoS attacks anomalously by taking advantage of the habits that appear on the system and assuming that if there are deviations from the habits that appear then it is declared a DDoS attack, the SVM method is used to categorize the data traffic obtained from the controller to detect whether it is a DDoS attack or not. Based on the tests conducted with 500 training data, the accuracy is 99,2%. The conclusion of this paper is that the RBF SVM kernel can be very good at detecting anomalous DDoS attacks.


2021 ◽  
Author(s):  
Liang Chen ◽  
Kunpeng Zheng ◽  
Yang Li ◽  
Xuelian Yang ◽  
Han Zhang ◽  
...  

OTN (Optical Transmission Networks) is one of the mainstream infrastructures over the ground-transmission networks, with the characteristics of large bandwidth, low delay, and high reliability. To ensure a stable working of OTN, it is necessary to preform high-level accurate functions of data traffic analysis, alarm prediction, and fault location. However, there is a serious problem for the implementation of these functions, caused by the shortage of available data but a rather-large amount of dirty data existed in OTN. In the view of current pretreatment, the extracted amount of effective data is very less, not enough to support machine learning. To solve this problem, this paper proposes a data augmentation algorithm based on deep learning. Specifically, Data Augmentation for Optical Transmission Networks under Multi-condition constraint (MVOTNDA) is designed based on GAN Mode with the demonstration of variable-length data augmentation method. Experimental results show that MVOTNDA has better performances than the traditional data augmentation algorithms.


Sign in / Sign up

Export Citation Format

Share Document