首页 > 最新文献

Journal of Computer Networks and Communications最新文献

英文 中文
Replacement Algorithm of Virtual Service Resources with Dynamic Resource Allocation Based on Traffic Change in Virtual Networks 基于流量变化的虚拟网络动态资源分配的虚拟业务资源替换算法
IF 2 Q1 Computer Science Pub Date : 2018-09-26 DOI: 10.12691/jcn-5-1-2
Sakie Horiuchi, T. Tachibana
Multiple virtual networks are constructed by using network virtualization technology on a substrate network with network resources. By using virtual service resources, a particular service can be provided with users over each virtual network. Moreover, network virtualization for mobile users has been expected in the future network service. In mobile virtual networks, mobile user moves from a node to other nodes and connects to other access points frequently. Therefore, the traffic on each link and each node in the virtual network changes. Because the quality of the service depends on the amount of traffic on links and nodes, the quality of services changes according to the user’s movement. This paper proposes replacement algorithm of virtual service resources with dynamic resource allocation based on traffic change for mobile applications in virtual networks. In our proposed method, the amount of resources for each node and that for each link are changed based on the traffic change. Moreover, the virtual service resource moves to the adjacent node from a node, and this replacement is repeated until the quality of service satisfies the requested quality. With our proposed method, it is expected that the quality of service can be maintained for mobile users even if the amount of traffic changes. We evaluate the performance of our proposed method with simulation. In numerical examples, it is shown that our proposed method is effective when a larger number users move and the amount of traffic changes.
利用网络虚拟化技术,在具有网络资源的底层网络上构建多个虚拟网络。通过使用虚拟业务资源,可以在每个虚拟网络上为用户提供特定的业务。此外,在未来的网络服务中,对移动用户的网络虚拟化已经被期待。在移动虚拟网络中,移动用户频繁地从一个节点移动到另一个节点,并连接到其他接入点。因此,虚拟网络中每条链路和每个节点的流量都会发生变化。由于服务质量取决于链路和节点上的流量,因此服务质量会根据用户的移动而变化。针对虚拟网络中的移动应用,提出了一种基于流量变化的动态资源分配的虚拟业务资源替换算法。在我们提出的方法中,每个节点的资源量和每个链路的资源量都根据流量的变化而变化。此外,虚拟服务资源从一个节点移动到相邻节点,并重复这种替换,直到服务质量满足所要求的质量。使用我们提出的方法,即使流量发生变化,也有望保持移动用户的服务质量。通过仿真对所提方法的性能进行了评价。数值算例表明,该方法在较大的用户移动数量和流量变化情况下是有效的。
{"title":"Replacement Algorithm of Virtual Service Resources with Dynamic Resource Allocation Based on Traffic Change in Virtual Networks","authors":"Sakie Horiuchi, T. Tachibana","doi":"10.12691/jcn-5-1-2","DOIUrl":"https://doi.org/10.12691/jcn-5-1-2","url":null,"abstract":"Multiple virtual networks are constructed by using network virtualization technology on a substrate network with network resources. By using virtual service resources, a particular service can be provided with users over each virtual network. Moreover, network virtualization for mobile users has been expected in the future network service. In mobile virtual networks, mobile user moves from a node to other nodes and connects to other access points frequently. Therefore, the traffic on each link and each node in the virtual network changes. Because the quality of the service depends on the amount of traffic on links and nodes, the quality of services changes according to the user’s movement. This paper proposes replacement algorithm of virtual service resources with dynamic resource allocation based on traffic change for mobile applications in virtual networks. In our proposed method, the amount of resources for each node and that for each link are changed based on the traffic change. Moreover, the virtual service resource moves to the adjacent node from a node, and this replacement is repeated until the quality of service satisfies the requested quality. With our proposed method, it is expected that the quality of service can be maintained for mobile users even if the amount of traffic changes. We evaluate the performance of our proposed method with simulation. In numerical examples, it is shown that our proposed method is effective when a larger number users move and the amount of traffic changes.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77672586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System 利用模糊推理系统检测Web应用程序中的跨站脚本
IF 2 Q1 Computer Science Pub Date : 2018-08-01 DOI: 10.1155/2018/8159548
Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss, and denial of data access in the course of information transmission. Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. Interestingly, recent research studies on the web application security centre focus on attack prevention and mechanisms for secure coding; recent methods for those attacks do not only generate high false positives but also have little considerations for the users who oftentimes are the victims of malicious attacks. Motivated by this problem, this paper describes an “intelligent” tool for detecting cross-site scripting flaws in web applications. This paper describes the method implemented based on fuzzy logic to detect classic XSS weaknesses and to provide some results on experimentations. Our detection framework recorded 15% improvement in accuracy and 0.01% reduction in the false-positive rate which is considerably lower than that found in the existing work by Koli et al. Our approach also serves as a decision-making tool for the users.
随着计算和技术的进步,基于web的应用程序现在在互联网上无处不在。然而,这些web应用程序在信息传输过程中容易出现漏洞,导致机密信息被盗、数据丢失、数据访问被拒绝。跨站点脚本(XSS)是一种网络安全攻击形式,它涉及从不受信任的来源向web应用程序注入恶意代码。有趣的是,最近对web应用程序安全中心的研究主要集中在攻击预防和安全编码机制上;这些攻击的最新方法不仅产生高误报,而且很少考虑经常成为恶意攻击受害者的用户。受此问题的启发,本文描述了一种用于检测web应用程序中的跨站点脚本缺陷的“智能”工具。本文介绍了一种基于模糊逻辑的跨站攻击弱点检测方法,并给出了一些实验结果。我们的检测框架的准确性提高了15%,假阳性率降低了0.01%,这大大低于Koli等人在现有工作中发现的结果。我们的方法也可以作为用户的决策工具。
{"title":"Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System","authors":"Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju","doi":"10.1155/2018/8159548","DOIUrl":"https://doi.org/10.1155/2018/8159548","url":null,"abstract":"With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss, and denial of data access in the course of information transmission. Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. Interestingly, recent research studies on the web application security centre focus on attack prevention and mechanisms for secure coding; recent methods for those attacks do not only generate high false positives but also have little considerations for the users who oftentimes are the victims of malicious attacks. Motivated by this problem, this paper describes an “intelligent” tool for detecting cross-site scripting flaws in web applications. This paper describes the method implemented based on fuzzy logic to detect classic XSS weaknesses and to provide some results on experimentations. Our detection framework recorded 15% improvement in accuracy and 0.01% reduction in the false-positive rate which is considerably lower than that found in the existing work by Koli et al. Our approach also serves as a decision-making tool for the users.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1155/2018/8159548","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64737545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of routing protocol on AODV and DSR under wormhole attack 虫洞攻击下AODV和DSR路由协议性能评价
IF 2 Q1 Computer Science Pub Date : 2013-01-01 DOI: 10.47277/ijcncs/1(1)1
M. G. Sanaei, I. Isnin, M. Bakhtiari
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks [1]. One of these attacks called Wormhole Attack that two adversary node collaborate together to transmit the packets in out of band channel. In this paper, performance of Ad hoc on-Demand Distance Vector (AODV) Protocol and Dynamic Source Routing (DSR) protocol are evaluated in presence of wormhole attack and without wormhole attack with Constant Bit Rate (CBR) traffic under dissimilar scalable network mobility. Also we evaluate effect and compare it with standard protocol in term of Packet Delivery Ratio, throughput and End to End Delay via simulation, using Network Simulation2 (NS2) for our research.
如今,移动自组网(manet)成为科学家们关注的热门问题,人们已经进行了各种各样的研究来提高自组网的性能。在MANET中,节点之间相互妥协以转发超出其传输范围的数据包。移动节点无需任何基础设施即可相互通信。由于无线自组织网络缺乏基础设施,因此容易受到大量攻击。其中一种攻击称为虫洞攻击,即两个敌对节点协同在带外信道中传输数据包。在不同的可扩展网络移动特性下,对存在虫洞攻击和不存在虫洞攻击时的AODV协议和动态源路由协议的性能进行了评估。并利用网络仿真软件NS2对其与标准协议在分组传送率、吞吐量和端到端延迟等方面进行了仿真比较。
{"title":"Performance evaluation of routing protocol on AODV and DSR under wormhole attack","authors":"M. G. Sanaei, I. Isnin, M. Bakhtiari","doi":"10.47277/ijcncs/1(1)1","DOIUrl":"https://doi.org/10.47277/ijcncs/1(1)1","url":null,"abstract":"Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks [1]. One of these attacks called Wormhole Attack that two adversary node collaborate together to transmit the packets in out of band channel. In this paper, performance of Ad hoc on-Demand Distance Vector (AODV) Protocol and Dynamic Source Routing (DSR) protocol are evaluated in presence of wormhole attack and without wormhole attack with Constant Bit Rate (CBR) traffic under dissimilar scalable network mobility. Also we evaluate effect and compare it with standard protocol in term of Packet Delivery Ratio, throughput and End to End Delay via simulation, using Network Simulation2 (NS2) for our research.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70809534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance testing of twisted pair cables 双绞线性能测试
IF 2 Q1 Computer Science Pub Date : 2008-01-01 DOI: 10.1155/2008/586427
Ahmed F. Mahmoud, M. Abd-Allah
This work introduces characteristics of twisted pair cables which play an important role in transferring data. In this paper, category 5 enhanced as a type of unshielded twisted pair cables was selected to verify all tests on it according to ISO/IEC 11801 as one of international standard specifications. Random samples were selected from cables market. All tests were done on these samples to make sure of using validity and complying with the international standard. After testing the selected samples, it is found that 4% are not satisfying the international standard specification while as 96% are satisfying the international standard specification.
介绍了在数据传输中起重要作用的双绞线电缆的特点。本文选择5类增强型非屏蔽双绞线电缆,根据ISO/IEC 11801国际标准规范对其进行所有试验验证。在电缆市场随机抽取样本。为确保样品的使用有效性和符合国际标准,对样品进行了所有测试。经检测,所选样品不符合国际标准规范的占4%,符合国际标准规范的占96%。
{"title":"Performance testing of twisted pair cables","authors":"Ahmed F. Mahmoud, M. Abd-Allah","doi":"10.1155/2008/586427","DOIUrl":"https://doi.org/10.1155/2008/586427","url":null,"abstract":"This work introduces characteristics of twisted pair cables which play an important role in transferring data. In this paper, category 5 enhanced as a type of unshielded twisted pair cables was selected to verify all tests on it according to ISO/IEC 11801 as one of international standard specifications. Random samples were selected from cables market. All tests were done on these samples to make sure of using validity and complying with the international standard. After testing the selected samples, it is found that 4% are not satisfying the international standard specification while as 96% are satisfying the international standard specification.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1155/2008/586427","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64175214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic retransmission limit scheme in MAC layer for routing in multihop ad hoc networks 多跳自组织网络中路由的MAC层动态重传限制方案
IF 2 Q1 Computer Science Pub Date : 2008-01-01 DOI: 10.1155/2008/414073
Ralph El-Khoury, R. El-Azouzi
We consider a wireless ad hoc network with random access channel. We present a model that takes into account topology, routing, random access in MAC layer, and forwarding probability. In this paper, we focus on drawing benefit from the interaction of the MAC (governed by IEEE 802.11 or slotted Aloha) and routing by defining a new cross-layer scheme for routing based on the limit number of retransmission. By adjusting dynamically and judiciously this parameter in a saturated network, we have realized that both stability of forwarding queues and average throughput are significantly improved in linear networks with symmetric traffic: a gain of 100% can be reached. While in asymmetric topology network with asymmetric traffic, we achieve a better average delay (resp., throughput) for each connection without changing the average throughput (resp., delay). In addition, we show the efficiency of our new scheme in case of multimedia applications with delay constraint. A detailed performance study is presented using analytical and simulation evaluation.
我们考虑了一个具有随机接入信道的无线自组织网络。我们提出了一个考虑拓扑、路由、MAC层随机访问和转发概率的模型。在本文中,我们重点从MAC(由IEEE 802.11或槽Aloha管理)和路由的交互中获益,通过定义一个新的基于重传数量限制的路由跨层方案。通过在饱和网络中动态且明智地调整该参数,我们已经意识到在具有对称流量的线性网络中,转发队列的稳定性和平均吞吐量都得到了显著提高:增益可以达到100%。在具有非对称流量的非对称拓扑网络中,我们获得了更好的平均时延(resp)。在不改变平均吞吐量的情况下,为每个连接设置一个(例如,吞吐量)。延迟)。此外,我们还在具有延迟约束的多媒体应用中证明了新方案的有效性。通过分析和仿真评估,给出了详细的性能研究。
{"title":"Dynamic retransmission limit scheme in MAC layer for routing in multihop ad hoc networks","authors":"Ralph El-Khoury, R. El-Azouzi","doi":"10.1155/2008/414073","DOIUrl":"https://doi.org/10.1155/2008/414073","url":null,"abstract":"We consider a wireless ad hoc network with random access channel. We present a model that takes into account topology, routing, random access in MAC layer, and forwarding probability. In this paper, we focus on drawing benefit from the interaction of the MAC (governed by IEEE 802.11 or slotted Aloha) and routing by defining a new cross-layer scheme for routing based on the limit number of retransmission. By adjusting dynamically and judiciously this parameter in a saturated network, we have realized that both stability of forwarding queues and average throughput are significantly improved in linear networks with symmetric traffic: a gain of 100% can be reached. While in asymmetric topology network with asymmetric traffic, we achieve a better average delay (resp., throughput) for each connection without changing the average throughput (resp., delay). In addition, we show the efficiency of our new scheme in case of multimedia applications with delay constraint. A detailed performance study is presented using analytical and simulation evaluation.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2008-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1155/2008/414073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64170383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Networks and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1