首页 > 最新文献

J. Networks最新文献

英文 中文
Replenishment Policies for Deteriorating Items with Ramp Type Demand and a Fixed Shelf-Life under Shortage 短缺条件下具有斜坡型需求和固定保质期的变质物品的补货策略
Pub Date : 2015-09-22 DOI: 10.4304/jnw.10.8.470-476
Kai-Wayne Chuang, Chien-Nan Lin
This study proposes a single-supplier, single-retailer inventory and pricing strategies for deteriorating items with ramp type demand and a fixed shelf-life u nder s hortage . In practice, there are many commodity such as food, medication exist the shelf life . Therefore the shelf life expiration date has become an important research topic in inventory management. We will discuss three cases. We assume that the inventory objective is to minimize the total cost per unit time of the system. By using the subroutine FindRoot in commercial software Mathematica 5.2, we obtain the optimal solutions
本研究提出了一个单一供应商,单一零售商库存和定价策略,以斜坡型需求和一个固定的货架期的退化物品的短缺。在实践中,有许多商品如食品、药品存在保质期。因此,保质期的有效期限已成为库存管理中的一个重要研究课题。我们将讨论三个案例。我们假设库存目标是使系统单位时间内的总成本最小化。利用商业软件Mathematica 5.2中的子程序FindRoot,得到了最优解
{"title":"Replenishment Policies for Deteriorating Items with Ramp Type Demand and a Fixed Shelf-Life under Shortage","authors":"Kai-Wayne Chuang, Chien-Nan Lin","doi":"10.4304/jnw.10.8.470-476","DOIUrl":"https://doi.org/10.4304/jnw.10.8.470-476","url":null,"abstract":"This study proposes a single-supplier, single-retailer inventory and pricing strategies for deteriorating items with ramp type demand and a fixed shelf-life u nder s hortage . In practice, there are many commodity such as food, medication exist the shelf life . Therefore the shelf life expiration date has become an important research topic in inventory management. We will discuss three cases. We assume that the inventory objective is to minimize the total cost per unit time of the system. By using the subroutine FindRoot in commercial software Mathematica 5.2, we obtain the optimal solutions","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"255 1","pages":"470-476"},"PeriodicalIF":0.0,"publicationDate":"2015-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73247735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formulating Heterogeneous Access Control model for MANET Emergency Services MANET应急服务异构访问控制模型的建立
Pub Date : 2015-08-17 DOI: 10.4304/jnw.10.7.407-412
Asmidar Abu Bakar, Elmunzir Hassan El Talib
Mobile ad hoc networks (MANETs) foster a new research trend in today’s computing. MANET unique features such as scalability, fault tolerant and autonomous system enable a network to be setup with or without any trusted authority makes it suitable for the emergency and rescue operations. During an emergency situation, there is a need for the information sharing among the group of rescuers. However, there is data collected during emergency which cannot be shared to all groups or within members in the same group. Thus, the privacy of data becomes a main concern here. We proposed a heterogeneous access control model which assigned an access to information during emergency based on information sensitivity and member-role in the group created at the emergency area. We formulate a complete HACM model with authentication and authorization. A privacy policy access policy is created and simple analysis with proving technique is used to evaluate it
移动自组网(manet)是当今计算领域的一个新的研究方向。MANET的独特功能,如可扩展性、容错能力和自主系统,使网络可以在有或没有任何可信权威的情况下建立,使其适合应急和救援行动。在紧急情况下,救援人员之间需要信息共享。但是,在紧急情况期间收集的数据不能与所有组或同一组的成员共享。因此,数据的隐私成为这里的主要关注点。提出了一种异构访问控制模型,该模型基于信息敏感性和在应急区域创建的群组中的成员角色来分配应急期间的信息访问权限。我们制定了一个完整的具有认证和授权的HACM模型。创建一个隐私策略访问策略,并使用简单的分析和证明技术对其进行评估
{"title":"Formulating Heterogeneous Access Control model for MANET Emergency Services","authors":"Asmidar Abu Bakar, Elmunzir Hassan El Talib","doi":"10.4304/jnw.10.7.407-412","DOIUrl":"https://doi.org/10.4304/jnw.10.7.407-412","url":null,"abstract":"Mobile ad hoc networks (MANETs) foster a new research trend in today’s computing. MANET unique features such as scalability, fault tolerant and autonomous system enable a network to be setup with or without any trusted authority makes it suitable for the emergency and rescue operations. During an emergency situation, there is a need for the information sharing among the group of rescuers. However, there is data collected during emergency which cannot be shared to all groups or within members in the same group. Thus, the privacy of data becomes a main concern here. We proposed a heterogeneous access control model which assigned an access to information during emergency based on information sensitivity and member-role in the group created at the emergency area. We formulate a complete HACM model with authentication and authorization. A privacy policy access policy is created and simple analysis with proving technique is used to evaluate it","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"27 1","pages":"407-412"},"PeriodicalIF":0.0,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88189538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overlay Enhanced Mobility for the Internet of Things 覆盖增强的物联网移动性
Pub Date : 2015-08-17 DOI: 10.4304/jnw.10.7.420-430
Victor Kardeby, Ulf Jennehag, M. Gidlund
One of the major challenges to realize the Internet of Things is to support IP mobility for the large amount of connected entities when they move between different locations and access methods. Current solutions for mobility are host centric, requiring support from the infrastructure, or breaks backwards compatibility, which will take a long time or high economic motivation to implement. Solutions for context information exchange are created for specific, small, or localized scenarios with centralized coordination that do not scale well. There is therefore a need for a solution which both scales well, and support IP mobility, without additional demands on current or future Internet infrastructure.We propose the use of a dual-overlay network structure for both information dissemination and as an alternative to current IP mobility technologies. It separates identities from location by introducing a second overlay network where the identity-to-location association is stored. We show analytically that the proposed solution provide logarithmic latency for localization and reduces the overall workload when the number of sensors per host increases beyond seven, with a workload reduction of 15 percentage points at fifteen sensors per host.
实现物联网的主要挑战之一是支持大量连接实体在不同位置和访问方式之间移动时的IP移动性。当前的移动解决方案是以主机为中心的,需要基础设施的支持,或者破坏向后兼容性,这将需要很长时间或很高的经济动机来实现。上下文信息交换的解决方案是为特定的、小型的或本地化的场景创建的,这些场景具有集中式协调,不能很好地扩展。因此,需要一种既可扩展性好,又支持IP移动性的解决方案,而不会对当前或未来的互联网基础设施产生额外的需求。我们建议使用双覆盖网络结构进行信息传播,并作为当前IP移动技术的替代方案。它通过引入存储身份到位置关联的第二个覆盖网络将身份与位置分离。我们分析表明,所提出的解决方案为定位提供了对数延迟,并在每台主机的传感器数量增加到7个以上时减少了总体工作负载,每台主机15个传感器时工作负载减少了15个百分点。
{"title":"Overlay Enhanced Mobility for the Internet of Things","authors":"Victor Kardeby, Ulf Jennehag, M. Gidlund","doi":"10.4304/jnw.10.7.420-430","DOIUrl":"https://doi.org/10.4304/jnw.10.7.420-430","url":null,"abstract":"One of the major challenges to realize the Internet of Things is to support IP mobility for the large amount of connected entities when they move between different locations and access methods. Current solutions for mobility are host centric, requiring support from the infrastructure, or breaks backwards compatibility, which will take a long time or high economic motivation to implement. Solutions for context information exchange are created for specific, small, or localized scenarios with centralized coordination that do not scale well. There is therefore a need for a solution which both scales well, and support IP mobility, without additional demands on current or future Internet infrastructure.We propose the use of a dual-overlay network structure for both information dissemination and as an alternative to current IP mobility technologies. It separates identities from location by introducing a second overlay network where the identity-to-location association is stored. We show analytically that the proposed solution provide logarithmic latency for localization and reduces the overall workload when the number of sensors per host increases beyond seven, with a workload reduction of 15 percentage points at fifteen sensors per host.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"7 1","pages":"420-430"},"PeriodicalIF":0.0,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87898314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of Selection Policy with Various Virtual Machine Instances in Dynamic VM Consolidation for Energy Efficient at Cloud Data Centers 云数据中心动态虚拟机整合中不同虚拟机实例选择策略的能效评估
Pub Date : 2015-08-17 DOI: 10.4304/jnw.10.7.397-406
G. F. Shidik, Azhari, K. Mustofa
Various VM instances in Cloud Infrastructure provide flexibility for user to meet their computation requirements. However, this condition leads to the complex infrastructure that require numerous resources and consumes massive electricity due to the flexibility of VM instances. This paper concern in evaluate VM selection policy in Dynamic VM Consolidation. The study would evaluate our proposed method Constant Position Selection Policy (CPS) that compared with other VM Selection Policy such as Minimum Migration Time (MMT),Random Choice(RC) and Maximum Correlation (MC).Evaluation process of this study, measured the performance of Energy Consumption, SLAV, SLATAH, and PDMwith real workload trace data from PlanetLab VMs in various VM instances. Result the proposed method able to minimizing energy consumption of cloud data center in various VM instances with acceptable SLA
云基础设施中的各种虚拟机实例为用户提供了灵活的计算需求。但是,由于VM实例的灵活性,这种情况会导致复杂的基础设施,需要大量的资源和消耗大量的电力。本文研究了动态虚拟机整合中虚拟机选择策略的评价问题。该研究将评估我们提出的方法恒定位置选择策略(CPS),并将其与其他虚拟机选择策略(如最小迁移时间(MMT),随机选择(RC)和最大相关性(MC)进行比较。在本研究的评估过程中,使用来自PlanetLab VM在各种VM实例中的真实工作负载跟踪数据测量了Energy Consumption、SLAV、SLATAH和pdm的性能。结果提出的方法能够在可接受的SLA下最小化云数据中心在不同VM实例中的能耗
{"title":"Evaluation of Selection Policy with Various Virtual Machine Instances in Dynamic VM Consolidation for Energy Efficient at Cloud Data Centers","authors":"G. F. Shidik, Azhari, K. Mustofa","doi":"10.4304/jnw.10.7.397-406","DOIUrl":"https://doi.org/10.4304/jnw.10.7.397-406","url":null,"abstract":"Various VM instances in Cloud Infrastructure provide flexibility for user to meet their computation requirements. However, this condition leads to the complex infrastructure that require numerous resources and consumes massive electricity due to the flexibility of VM instances. This paper concern in evaluate VM selection policy in Dynamic VM Consolidation. The study would evaluate our proposed method Constant Position Selection Policy (CPS) that compared with other VM Selection Policy such as Minimum Migration Time (MMT),Random Choice(RC) and Maximum Correlation (MC).Evaluation process of this study, measured the performance of Energy Consumption, SLAV, SLATAH, and PDMwith real workload trace data from PlanetLab VMs in various VM instances. Result the proposed method able to minimizing energy consumption of cloud data center in various VM instances with acceptable SLA","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"35 1","pages":"397-406"},"PeriodicalIF":0.0,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74800602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Time-Dependent Variation of the Centrality Measures of the Nodes during the Evolution of a Scale-Free Network 无标度网络演化过程中节点中心性测度的随时间变化
Pub Date : 2015-08-17 DOI: 10.4304/jnw.10.7.431-442
N. Meghanathan
Scale-free networks are a type of complex networks in which the degree distribution of the nodes is according to the power-law. Centrality of the nodes is a quantitative measure of the importance of the nodes according to the topological structure of the network. The commonly used centrality measures are the degree-based degree centrality and eigenvector centrality and the shortest path-based closeness centrality and betweenness centrality. We use the widely studied Barabasi-Albert (BA) model to simulate the evolution of scale-free networks. The model works by adding new nodes to the network, one at a time, with the new node connected to m of the currently existing nodes. Accordingly, nodes that have been in the network for a longer time have greater chances of acquiring more links and hence a larger degree centrality. While the degree centrality of the nodes has been observed to show a concave down pattern of increase with time; but the time-dependent variation of the other centrality measures has not been analyzed until now. In this paper, we study the time-dependent variation of degree centrality, eigenvector centrality, closeness centrality and betweenness centrality of the nodes during the evolution of a scale-free network according to the BA model
无标度网络是一种节点度分布服从幂律的复杂网络。节点的中心性是根据网络拓扑结构对节点重要性的定量度量。常用的中心性度量有基于度的度中心性和特征向量中心性以及基于最短路径的亲密度中心性和中间度中心性。我们使用广泛研究的Barabasi-Albert (BA)模型来模拟无标度网络的演化。该模型通过向网络中添加新节点来工作,每次添加一个,新节点连接到当前存在的m个节点。因此,在网络中存在时间较长的节点有更大的机会获得更多的链接,因此具有更大的中心性。而节点的度中心性随时间的增加呈凹向下的模式;但其他中心性测度的随时间变化尚未得到分析。本文根据BA模型,研究了无标度网络演化过程中节点的度中心性、特征向量中心性、接近中心性和中间中心性随时间的变化规律
{"title":"Time-Dependent Variation of the Centrality Measures of the Nodes during the Evolution of a Scale-Free Network","authors":"N. Meghanathan","doi":"10.4304/jnw.10.7.431-442","DOIUrl":"https://doi.org/10.4304/jnw.10.7.431-442","url":null,"abstract":"Scale-free networks are a type of complex networks in which the degree distribution of the nodes is according to the power-law. Centrality of the nodes is a quantitative measure of the importance of the nodes according to the topological structure of the network. The commonly used centrality measures are the degree-based degree centrality and eigenvector centrality and the shortest path-based closeness centrality and betweenness centrality. We use the widely studied Barabasi-Albert (BA) model to simulate the evolution of scale-free networks. The model works by adding new nodes to the network, one at a time, with the new node connected to m of the currently existing nodes. Accordingly, nodes that have been in the network for a longer time have greater chances of acquiring more links and hence a larger degree centrality. While the degree centrality of the nodes has been observed to show a concave down pattern of increase with time; but the time-dependent variation of the other centrality measures has not been analyzed until now. In this paper, we study the time-dependent variation of degree centrality, eigenvector centrality, closeness centrality and betweenness centrality of the nodes during the evolution of a scale-free network according to the BA model","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"26 1","pages":"431-442"},"PeriodicalIF":0.0,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80240974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Different Geospatial Data on Hybrid Map Application 混合地图应用中的不同地理空间数据
Pub Date : 2015-08-17 DOI: 10.4304/jnw.10.7.413-419
Khairul Anshar, N. Suryana, Zahriah Othman, S. K. Baharin
Nowdays, there are many map applications that can be accessed through the web . All these applications are accessing different geospatial data stored on server only. The approach to display different geospatial data type, format, and source from local system becomes new topic in hybrid application for Smartphone. File protocol in XMLHttpRequest can be used to access a file from local system in hybrid application. Another approach is using File API provided by Native Application Framework. To incorporate this API, we create two new classes i.e. URI and HybridFileAPI , as a protocol and request class. These classes utilize File API to access a file in Smartphone local system. We starts the discussion with hybrid map application and system architecture to get understanding about components and processes involved in hybrid map application for Smartphone
现在,有许多地图应用程序可以通过网络访问。所有这些应用程序都访问存储在服务器上的不同地理空间数据。如何从本地系统中显示不同的地理空间数据类型、格式和来源,成为智能手机混合应用的新课题。在混合应用程序中,XMLHttpRequest中的文件协议可用于从本地系统访问文件。另一种方法是使用本机应用程序框架提供的文件API。为了合并这个API,我们创建了两个新类,即URI和HybridFileAPI,作为协议和请求类。这些类利用文件API访问智能手机本地系统中的文件。本文从混合地图应用和系统架构入手,了解智能手机混合地图应用中涉及的组件和流程
{"title":"Different Geospatial Data on Hybrid Map Application","authors":"Khairul Anshar, N. Suryana, Zahriah Othman, S. K. Baharin","doi":"10.4304/jnw.10.7.413-419","DOIUrl":"https://doi.org/10.4304/jnw.10.7.413-419","url":null,"abstract":"Nowdays, there are many map applications that can be accessed through the web . All these applications are accessing different geospatial data stored on server only. The approach to display different geospatial data type, format, and source from local system becomes new topic in hybrid application for Smartphone. File protocol in XMLHttpRequest can be used to access a file from local system in hybrid application. Another approach is using File API provided by Native Application Framework. To incorporate this API, we create two new classes i.e. URI and HybridFileAPI , as a protocol and request class. These classes utilize File API to access a file in Smartphone local system. We starts the discussion with hybrid map application and system architecture to get understanding about components and processes involved in hybrid map application for Smartphone","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"35 1","pages":"413-419"},"PeriodicalIF":0.0,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80381149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks 资源受限网络中增强移动代理支持的异常检测与验证规范与验证
Pub Date : 2015-06-29 DOI: 10.4304/jnw.10.6.353-368
Muhammad Usman, V. Muthukkumarasamy, Xin-Wen Wu
Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS, but also for the detection of the anomalies caused by the delayed arrival of the in situ verification results. The formal specifications of the individual algorithmic functionalities are addressed by employing the Petri net theory. A bottom-up synthesis of the individual Petri net modules is carried out to formulate a unified model, which has helped in the identification and removal of inconsistencies in the system design. This process formally characterizes the behavioral properties and the overall workflow of the EAADS. The standard unified Petri net model is then extended into a corresponding high class Generalized Stochastic Petri Net (GSPN) model to formalize and analyze the temporal behavior of the EAADS in a highly nondeterministic communication environment. Finally, the GSPNbased temporal behavior is validated through implementation of the functional specifications on a real testbed composed of the resource constrained MICAz motes. The theoretical and experimental results demonstrate the ability of the EAADS to detect certain types of anomalies and the aptness of the temporal behavior of the EAADS for the low resource sensor networks even in a highly nondeterministic communication environment
现有的启用移动代理的异常检测方案没有考虑时间行为以实现其正确的功能和时间异常的检测。本研究采用整体系统的方法,通过设计两种新算法来设计增强型移动智能体异常检测系统(EAADS)。所提出的算法不仅对EAADS的完整性有重要意义,而且对原位验证结果延迟到达造成的异常的检测也很重要。采用Petri网理论解决了单个算法功能的形式化规范。对各个Petri网模块进行自下而上的综合,以形成一个统一的模型,这有助于识别和消除系统设计中的不一致性。这个过程正式地描述了EAADS的行为属性和整个工作流程。然后将标准的统一Petri网模型扩展为相应的高级广义随机Petri网(GSPN)模型,以形式化和分析高度不确定性通信环境下EAADS的时间行为。最后,通过在资源受限的MICAz模型组成的真实测试平台上实现功能规范,验证了基于gspn的时间行为。理论和实验结果表明,即使在高度不确定性的通信环境中,EAADS也能检测到某些类型的异常,并且在低资源传感器网络中,EAADS的时间行为也很合适
{"title":"Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks","authors":"Muhammad Usman, V. Muthukkumarasamy, Xin-Wen Wu","doi":"10.4304/jnw.10.6.353-368","DOIUrl":"https://doi.org/10.4304/jnw.10.6.353-368","url":null,"abstract":"Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS, but also for the detection of the anomalies caused by the delayed arrival of the in situ verification results. The formal specifications of the individual algorithmic functionalities are addressed by employing the Petri net theory. A bottom-up synthesis of the individual Petri net modules is carried out to formulate a unified model, which has helped in the identification and removal of inconsistencies in the system design. This process formally characterizes the behavioral properties and the overall workflow of the EAADS. The standard unified Petri net model is then extended into a corresponding high class Generalized Stochastic Petri Net (GSPN) model to formalize and analyze the temporal behavior of the EAADS in a highly nondeterministic communication environment. Finally, the GSPNbased temporal behavior is validated through implementation of the functional specifications on a real testbed composed of the resource constrained MICAz motes. The theoretical and experimental results demonstrate the ability of the EAADS to detect certain types of anomalies and the aptness of the temporal behavior of the EAADS for the low resource sensor networks even in a highly nondeterministic communication environment","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"61 1","pages":"353-368"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88039472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on Auto Detecting Defence Mechanisms against Application Layer Ddos Attacks in SIP Server SIP服务器对应用层Ddos攻击的自动检测防御机制研究
Pub Date : 2015-06-29 DOI: 10.4304/jnw.10.6.344-352
M. M. Alam, M. Y. Arafat, Feroz Ahmed
Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bogus positives that block legitimate users. In this paper, authors show application layer DoS attack for SIP server using some open source DoS attack tools and also suggest a mechanism that can protect a given SIP server from application-level DoS attacks especially the attacks targeting the resources including CPU, sockets, memory of the victim server. In this paper author’s attempt to illustrate application layer distributed denial of Service (DDoS) attack on SIP Server such as SIP flooding attack, real time transport (RTP) flooding attack using open source DDoS attack tools. We propose a new DDoS defence mechanism that protects SIP servers from application-level DDoS attacks based on the two methodologies: IPtables and fail2ban detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns.  A popular software known as Wireshark which is a network protocol analyzer is used to capture the packets during DoS attack from the victim server Ethernet interface to detect the attacking host IP address and analysis the types of attack.  We evaluate the performance of the proposed scheme via experiment
拒绝服务(DoS)或分布式拒绝服务(DDoS)是一种强大的攻击,它阻止系统向其合法用户提供服务。有几种方法可以过滤网络级攻击,但是应用程序级攻击很难在防火墙中检测到。应用程序级别的过滤在计算上可能很昂贵,而且难以扩展,同时仍然会产生阻止合法用户的假阳性。本文介绍了利用一些开源的DoS攻击工具对SIP服务器进行应用层DoS攻击,并提出了一种保护SIP服务器免受应用层DoS攻击的机制,特别是针对被攻击服务器的CPU、socket、内存等资源的攻击。本文试图说明应用层分布式拒绝服务攻击(DDoS)对SIP服务器的攻击,如SIP泛洪攻击,实时传输(RTP)泛洪攻击利用开源的DDoS攻击工具。本文提出了一种基于IPtables和fail2ban检测两种方法保护SIP服务器免受应用级DDoS攻击的新型DDoS防御机制。攻击流检测机制根据服务器上的症状或压力来检测附加流,因为仅根据传入流量模式来识别不良流变得越来越困难。网络协议分析器Wireshark是一种流行的网络协议分析器软件,它可以从受害服务器的以太网接口捕获DoS攻击时的报文,检测攻击主机的IP地址,分析攻击类型。我们通过实验来评估该方案的性能
{"title":"Study on Auto Detecting Defence Mechanisms against Application Layer Ddos Attacks in SIP Server","authors":"M. M. Alam, M. Y. Arafat, Feroz Ahmed","doi":"10.4304/jnw.10.6.344-352","DOIUrl":"https://doi.org/10.4304/jnw.10.6.344-352","url":null,"abstract":"Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bogus positives that block legitimate users. In this paper, authors show application layer DoS attack for SIP server using some open source DoS attack tools and also suggest a mechanism that can protect a given SIP server from application-level DoS attacks especially the attacks targeting the resources including CPU, sockets, memory of the victim server. In this paper author’s attempt to illustrate application layer distributed denial of Service (DDoS) attack on SIP Server such as SIP flooding attack, real time transport (RTP) flooding attack using open source DDoS attack tools. We propose a new DDoS defence mechanism that protects SIP servers from application-level DDoS attacks based on the two methodologies: IPtables and fail2ban detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns.  A popular software known as Wireshark which is a network protocol analyzer is used to capture the packets during DoS attack from the victim server Ethernet interface to detect the attacking host IP address and analysis the types of attack.  We evaluate the performance of the proposed scheme via experiment","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"24 1","pages":"344-352"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84507495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Downlink Channel Allocation Scheme deploying Cooperative Channel Monitoring for Cognitive Cellular-FemtocellNetworks 基于认知蜂窝-飞蜂窝网络协同信道监控的下行信道分配方案
Pub Date : 2015-06-29 DOI: 10.4304/jnw.10.6.338-343
Vandung Nguyen, D. Nguyen, H. Nguyen, K. Sripimanwat
Cognitive cellular-femtocell networks are considered as future mobile communication networks which can satisfy challenging requirements of current mobile communications including high user density, quality of service (QoS) provision and efficient spectrum utilization. In this paper, we present a novel downlink channel allocation scheme which allocates downlink channels to new connection requests of real-time connections in cognitive cellular-femtocell networks. In the scheme, a cognitive femtocell access point (CFAP) cooperates with other 2-hop neighbor CFAPs to establish a cooperative channel monitoring group for monitoring and exchanging information of channel occupancy among the CFAPs belonging to the group. Upon receiving a new connection request from a femtocell user (FU), the serving CFAP uses the information of channel occupancy updated from neighboring CFAPs and interference level of channels to allocate a channel, which is expected to cause the minimum interference to macro users (MUs) of the covering macro base station (MBS). Simulation results prove that the proposed scheme can provide better performance than the conventional downlink channel allocation scheme which does not exploit the cooperation of CFAPs in channel monitoring.
认知蜂窝-飞蜂窝网络被认为是未来的移动通信网络,能够满足当前移动通信对高用户密度、高服务质量(QoS)提供和高效频谱利用的挑战性要求。本文提出了一种新的下行信道分配方案,将下行信道分配给认知蜂窝-飞蜂窝网络中实时连接的新连接请求。在该方案中,认知飞蜂窝接入点(CFAP)与其他2跳相邻的CFAP合作,建立一个合作信道监测组,用于监测和交换该组CFAP之间的信道占用信息。当接收到femtocell用户(FU)的新连接请求时,服务CFAP使用从相邻CFAP更新的信道占用信息和信道干扰等级来分配信道,期望对覆盖宏基站(MBS)的宏用户(MUs)造成最小的干扰。仿真结果表明,该方案比传统的下行信道分配方案具有更好的性能,而传统的下行信道分配方案没有利用cfap之间的合作进行信道监控。
{"title":"Downlink Channel Allocation Scheme deploying Cooperative Channel Monitoring for Cognitive Cellular-FemtocellNetworks","authors":"Vandung Nguyen, D. Nguyen, H. Nguyen, K. Sripimanwat","doi":"10.4304/jnw.10.6.338-343","DOIUrl":"https://doi.org/10.4304/jnw.10.6.338-343","url":null,"abstract":"Cognitive cellular-femtocell networks are considered as future mobile communication networks which can satisfy challenging requirements of current mobile communications including high user density, quality of service (QoS) provision and efficient spectrum utilization. In this paper, we present a novel downlink channel allocation scheme which allocates downlink channels to new connection requests of real-time connections in cognitive cellular-femtocell networks. In the scheme, a cognitive femtocell access point (CFAP) cooperates with other 2-hop neighbor CFAPs to establish a cooperative channel monitoring group for monitoring and exchanging information of channel occupancy among the CFAPs belonging to the group. Upon receiving a new connection request from a femtocell user (FU), the serving CFAP uses the information of channel occupancy updated from neighboring CFAPs and interference level of channels to allocate a channel, which is expected to cause the minimum interference to macro users (MUs) of the covering macro base station (MBS). Simulation results prove that the proposed scheme can provide better performance than the conventional downlink channel allocation scheme which does not exploit the cooperation of CFAPs in channel monitoring.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"9 1","pages":"338-343"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77742937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performances of OpenFlow-Based Software-Defined Networks: An overview 基于openflow的软件定义网络性能综述
Pub Date : 2015-06-29 DOI: 10.4304/jnw.10.6.329-337
Fouad Benamrane, M. B. Mamoun, R. Benaini
Software Defined Networking (SDN) has gained significant attention from network researchers and industry in recent years. Indeed, the SDN concept provides many advantages such as programmability and easy management of the network. However, it generates new challenges as scalability and performances issues, understanding in-depth the performances and limitations of the SDN concept is a prerequisite to its implementation and deployment in real networks. In this paper, we aim to present in a comprehensive way, the most important works that focus on performances of SDN. As SDN separates the control plane from the data plane, we first present research efforts made to enhance the performances of data plane devices, then, we give an overview of different solutions proposed to improve controller performances. We provide also an overview on recent control plane architectures with multiple controllers that have been proposed to meet performances and scalability constraints. Finally, we present the different techniques and tools used in literature to evaluate the performances of software defined networks
软件定义网络(SDN)近年来受到网络研究者和业界的广泛关注。事实上,SDN概念提供了许多优点,如可编程性和易于管理的网络。然而,它也带来了新的挑战,如可扩展性和性能问题,深入了解SDN概念的性能和局限性是其在实际网络中实现和部署的先决条件。在本文中,我们旨在以全面的方式介绍关注SDN性能的最重要的工作。由于SDN将控制平面与数据平面分离,我们首先介绍了提高数据平面设备性能的研究工作,然后概述了为提高控制器性能而提出的不同解决方案。我们还概述了最近为满足性能和可扩展性限制而提出的具有多个控制器的控制平面架构。最后,我们介绍了文献中用于评估软件定义网络性能的不同技术和工具
{"title":"Performances of OpenFlow-Based Software-Defined Networks: An overview","authors":"Fouad Benamrane, M. B. Mamoun, R. Benaini","doi":"10.4304/jnw.10.6.329-337","DOIUrl":"https://doi.org/10.4304/jnw.10.6.329-337","url":null,"abstract":"Software Defined Networking (SDN) has gained significant attention from network researchers and industry in recent years. Indeed, the SDN concept provides many advantages such as programmability and easy management of the network. However, it generates new challenges as scalability and performances issues, understanding in-depth the performances and limitations of the SDN concept is a prerequisite to its implementation and deployment in real networks. In this paper, we aim to present in a comprehensive way, the most important works that focus on performances of SDN. As SDN separates the control plane from the data plane, we first present research efforts made to enhance the performances of data plane devices, then, we give an overview of different solutions proposed to improve controller performances. We provide also an overview on recent control plane architectures with multiple controllers that have been proposed to meet performances and scalability constraints. Finally, we present the different techniques and tools used in literature to evaluate the performances of software defined networks","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"329-337"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84645215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
J. Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1