• 제목/요약/키워드: Computer-Network

검색결과 12,667건 처리시간 0.035초

Performance Evaluation of SDN Controllers: RYU and POX for WBAN-based Healthcare Applications

  • Lama Alfaify;Nujud Alnajem;Haya Alanzi;Rawan Almutiri;Areej Alotaibi;Nourah Alhazri;Awatif Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.219-230
    • /
    • 2023
  • Wireless Body Area Networks (WBANs) have made it easier for healthcare workers and patients to monitor patients' status continuously in real time. WBANs have complex and diverse network structures; thus, management and control can be challenging. Therefore, considering emerging Software-defined networks (SDN) with WBANs is a promising technology since SDN implements a new network management and design approach. The SDN concept is used in this study to create more adaptable and dynamic network architectures for WBANs. The study focuses on comparing the performance of two SDN controllers, POX and Ryu, using Mininet, an open-source simulation tool, to construct network topologies. The performance of the controllers is evaluated based on bandwidth, throughput, and round-trip time metrics for networks using an OpenFlow switch with sixteen nodes and a controller for each topology. The study finds that the choice of network controller can significantly impact network performance and suggests that monitoring network performance indicators is crucial for optimizing network performance. The project provides valuable insights into the performance of SDN-based WBANs using POX and Ryu controllers and highlights the importance of selecting the appropriate network controller for a given network architecture.

Extraction of specific common genetic network of side effect pair, and prediction of side effects for a drug based on PPI network

  • Hwang, Youhyeon;Oh, Min;Yoon, Youngmi
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권1호
    • /
    • pp.115-123
    • /
    • 2016
  • In this study, we collect various side effect pairs which are appeared frequently at many drugs, and select side effect pairs that have higher severity. For every selected side effect pair, we extract common genetic networks which are shared by side effects' genes and drugs' target genes based on PPI(Protein-Protein Interaction) network. For this work, firstly, we gather drug related data, side effect data and PPI data. Secondly, for extracting common genetic network, we find shortest paths between drug target genes and side effect genes based on PPI network, and integrate these shortest paths. Thirdly, we develop a classification model which uses this common genetic network as a classifier. We calculate similarity score between the common genetic network and genetic network of a drug for classifying the drug. Lastly, we validate our classification model by means of AUC(Area Under the Curve) value.

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.

SDN 환경에서 Hopfield Network 알고리즘을 이용한 분산 컨트롤러 (Distributed controller using Hopfield Network algorithm in SDN environment)

  • 유승언;김동현;이병준;김경태;윤희용
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.43-44
    • /
    • 2019
  • 본 논문에서는 머신러닝 알고리즘 중 하나인 Hopfield Network 알고리즘을 이용하여 SDN 환경에서 분산된 컨트롤러를 선택하는 모델을 제안하였다. Hopfield Network 알고리즘은 신경망의 물리적 모델로써 최적화, 연상기억 등에 사용되는데 이를 통해 효율적인 컨트롤러 동기화를 기대한다.

  • PDF

IXP2400 네트워크 프로세서를 이용한 IPv6 멀티캐스트 포워딩 모듈의 설계 및 구현 (Design and Implementation of an IPv6 Multicast Forwarding Module on the IXP2400 Network Processor)

  • 송지수;박우진;김대희;안순신
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.625-627
    • /
    • 2005
  • 본 논문은 인텔사의 IXP2400 네트워크 프로세서를 이용하여 IPv6 multicast-enabled 라우터 개발의 예비단계로서 IPv6 멀티캐스트 모듈의 전체적인 설계 및 구현을 다룬다. 특히, 마이크로 엔진할당, IPv6 멀티캐스트 마이크로 블록 및 패킷 복사 마이크로 블록에 중점을 둔다. 우리의 IPv6 멀티캐스트 포워딩 모듈의 성능측정 결과는 이론적 한계치의 $86\%$였다.

  • PDF

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

Application of Percolation Model for Network Analysis

  • Kiuchi, Yasuhiko;Tanaka, Masaru;Mishima, Taketoshi
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.1101-1104
    • /
    • 2002
  • In order to send the information certainly via the network against the packet lost caused by hardware troubles or limitation of packet transferring, we must construct reliable network infrastructure. However, it is difficult to construct comfortable network early if we construct rely on the prediction or the experience through a lot of troubles. In this paper, we propose the method to construct reliable network infrastructure based on the computer network simulation. This simulation is based on the percolation model. Percolation model is known as the model that represents connections. We gave some simulations for the various network topologies: the square lattice network, the cubic lattice network, and the full connection type network.

  • PDF

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

In-Network 데이터 병합 기반 데이터 전처리 기법 연구 (Study on data preprocessing method based on In-Network data merge)

  • 임환희;김세준;이병준;김경태;윤희용
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.91-92
    • /
    • 2019
  • 본 논문에서는 IoT 기기의 각 센서로부터 획득된 데이터에 대한 수집 및 효율적 라우팅 기법을 기반으로 대용량 데이터 수집의 효율성 및 신뢰도 향상을 위해 In-network 데이터 병합 기반 데이터 전처리 기법을 제안한다. 기존의 Wireless Sensor Network에서는 모든 단말 노드가 스스로 라우팅 된 하위 센서 노드들의 데이터를 병합하는 In-network 병합기법을 사용한다. 이 기법은 이벤트가 발생하지 않거나 필요한 쿼리가 없어도 주기적으로 라우팅에 필요한 메시지를 전송하므로 불필요한 에너지 소모를 야기 시키며 데이터 전송 에러가 발생할 확률이 높다. 기존 In-Network 데이터 병합 기법의 효율성 및 정확성을 향상시키기 위해, 본 논문에서는 조건 병합 기반의 In-network 병합 기법을 제안한다.

  • PDF

차세대 증권전산망(STOCK-NET)의 연구와 설계 (A Study of the Next Generation STOCK-NETWORK and Design)

  • 하성용;박대우
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권5호
    • /
    • pp.95-102
    • /
    • 2008
  • '국가 주요 정보통신 기반시설과 목표시설'로 지정되어 있는 증권전산통신망의 차세대 네트워크화 준비는 국가경쟁력 강화와 국가경제력 향상을 위해 반드시 필요하다. 본 논문은 현재의 정부정책과 네트워크, 보안 및 증권전산망을 연구하고, 기존의 SONET/SDH기반의 증권전산망을 대체하여, 차세대 증권전산망은 국가간 GMG서비스를 위한 MPLS 기반의 ALL-IP서비스를 제공하도록 설계한다. 설계 시에 안정성, 표준화, 보안성 확장성의 기준을 설정하여, 현재와 차세대 증권전산망을 각 기준별로 비교한다. 또한 차세대 증권전산망 특징과 장점 및 대역폭과 QoS, 통신기술, 정보보호시스템 등에서 향상된 기대효과를 분석한다. 본 논문의 연구결과는 u-Korea를 이룩하는 국가경쟁력 강화와 국가경제력 향상에 기여할 것이다.

  • PDF