• Title/Summary/Keyword: internet traffic data

Search Result 599, Processing Time 0.022 seconds

DiffServ-aware-MPLS Network Performance Analysis (DiffServ-aware-MPLS 네트워크 성능 분석)

  • Cho Hae-Seong
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.107-112
    • /
    • 2004
  • As the internet service evolves fast recently, guarantee request of QoS (Quality of Service) by characteristic of traffic source as well as high rate of data is going greatest. Accordingly intemet service technology also is changing rapidly, technology that guarantee QoS in existent network service technology is developed or network model that guarantee new QoS is presented. By DiffServ-aware-MPLS network that present in IETF (Internet Engineering Task Force) to guarantee QoS in this treatise does comparative analysis with existent network model, relative show that is superior, and present direction that compose next generation network wish to.

  • PDF

A Study on Development of Lottery Site to Maximize Network Advertisement Effect (네트워크 광고 효과 극대화를 위한 복권 사이트 개발에 관한 연구)

  • 이희남;이창호;이공섭
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2000.05a
    • /
    • pp.55-60
    • /
    • 2000
  • In recent dates, Internet advertising effects are expanded by the steep increment of the Internet users and the extension of the advertising market will be accelerated through Internet. This paper indicates the importance of Internet advertising and suggests the solution of a network advertising service. The system Is divided into an Advertise Server, an Advertiser and a Web Publisher. This study proposes both the collection and the analysis of traffic data in real time. Also, the banner advertising frames are smoothed for the impression using the solution for the banner exchange engine and are developed using various impression methods, that is, Fixed/variable Banner, Scheduling Banner, Multi-Impression Banner, and Frame Remote Control to increase the advertising effect. And then to increase the advertising effect web publisher, which is specialized in lottery site, is constructed using the network advertising service and various advertising technology.

  • PDF

A Study on Development of Site to Maximize Network Advertisement Effect (네트워크 광고 효과 극대화를 위한 사이트 개발에 관한 연구)

  • 이공섭
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.2
    • /
    • pp.177-185
    • /
    • 2000
  • In recent dates, Internet advertising effects are expanded by the steep increment of the Internet users and the extension of the advertising market will be accelerated through Internet. This paper indicates the importance of Internet advertising and suggests the solution of a network advertising service. The system is divided into an Advertise Server, an Advertiser and a Web Publisher. This study proposes both the collection and the analysis of traffic data in real time. Also, the banner advertising frames are smoothed for the impression using the solution for the banner exchange engine and are developed using various impression methods, that is, Fixed/variable Banner, Scheduling Banner, Multi-Impression Banner, and Frame Remote Control to increase the advertising effect. And then to increase the advertising effect web publisher, which is specialized in lottery site, is constructed using the network advertising service and various advertising technology.

  • PDF

Intrusion Detection System Modeling Based on Learning from Network Traffic Data

  • Midzic, Admir;Avdagic, Zikrija;Omanovic, Samir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5568-5587
    • /
    • 2018
  • This research uses artificial intelligence methods for computer network intrusion detection system modeling. Primary classification is done using self-organized maps (SOM) in two levels, while the secondary classification of ambiguous data is done using Sugeno type Fuzzy Inference System (FIS). FIS is created by using Adaptive Neuro-Fuzzy Inference System (ANFIS). The main challenge for this system was to successfully detect attacks that are either unknown or that are represented by very small percentage of samples in training dataset. Improved algorithm for SOMs in second layer and for the FIS creation is developed for this purpose. Number of clusters in the second SOM layer is optimized by using our improved algorithm to minimize amount of ambiguous data forwarded to FIS. FIS is created using ANFIS that was built on ambiguous training dataset clustered by another SOM (which size is determined dynamically). Proposed hybrid model is created and tested using NSL KDD dataset. For our research, NSL KDD is especially interesting in terms of class distribution (overlapping). Objectives of this research were: to successfully detect intrusions represented in data with small percentage of the total traffic during early detection stages, to successfully deal with overlapping data (separate ambiguous data), to maximize detection rate (DR) and minimize false alarm rate (FAR). Proposed hybrid model with test data achieved acceptable DR value 0.8883 and FAR value 0.2415. The objectives were successfully achieved as it is presented (compared with the similar researches on NSL KDD dataset). Proposed model can be used not only in further research related to this domain, but also in other research areas.

Analysis of Security Threats and Air Interface Traffic Performance for IMT-2000 Mobile Systems (IMT-2000 시스템의 보안 위협요소 분석 및 이의 적용에 따른 무선링크 트래픽 분석)

  • Kwon, Soo-Kun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.49-55
    • /
    • 2002
  • IMT-2000 mobile system will provide many application services such as mobile internet, wireless electronics commerce applications using air interface with high data rate. These applications require high data integrity, data confidentiality, user authentication, user identity confidentiality and non-repudiation. In this study, we analyze new security threats and air interface traffic performance for IMT-2000 mobile systems. Signal traffic for network access security services requires 0.2kbps~4.5kbps with the conditions of 246~768bits/massage, 0.2~1.0 basic services/sec and the security services of the rate 0.2~1.0 times compared with basic services.

Traffic Based Label Assign Technique For the MPLS (MPLS를 위한 트래픽 기반의 레이블 할당 기법)

  • 황하응;장성식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.1
    • /
    • pp.120-128
    • /
    • 2002
  • As mass data service like internet broadcasting and VOD is used widely, network traffic is increasing rapidly. In order to resolve this service delay caused by mass network traffic data, various techniques are tried. MPLS, as one of these techniques, supports network extensibility and high speed routing. But it generate delay while waiting to set the LSP from input node to output node. In order to resolve these delay Problems, this Paper Propose different label assign technic according to the hop count between input node and output node when data has to go through MPLS domain. The simulation results show that delay reduction was gained when the proposed technique is applied.

  • PDF

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

Performance Evaluation of Burst Scheduling Schemes for WDM Optical Burst Switching (WDM 광 버스트 스위칭을 위한 버스트 스케줄링 기법의 성능 평가)

  • 차윤호;소원호;노선식;김영천
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.177-180
    • /
    • 2000
  • Optical burst switching(OBS) is a new switching paradigm to supporting bursty traffic on the Internet efficiently. OBS separates burst level and control level. To handle data burst efficiently, the scheduling schemes in optical burst switching systems must keep track of future resource availability when assigning arriving data bursts to wavelength channels. In this paper, we evaluate the performance of three scheduling schemes which are called Horizon, Single-gap and Multiple-gap, as a basic study for the future research of Optical Internet. Thus, firstly, we analyze the trade-off between the performance and the processing overhead of each scheme. In addition, the performance of OBS system which uses Multiple-gap scheduling is evaluated in detail under various network size. We use simulation for performance evaluation in terms of burst loss rate(BLR), wavelength channel utilization and the number of management data.

  • PDF

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

CDASA-CSMA/CA: Contention Differentiated Adaptive Slot Allocation CSMA-CA for Heterogeneous Data in Wireless Body Area Networks

  • Ullah, Fasee;Abdullah, Abdul Hanan;Abdul-Salaam, Gaddafi;Arshad, Marina Md;Masud, Farhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5835-5854
    • /
    • 2017
  • The implementation of IEEE 802.15.6 in Wireless Body Area Network (WBAN) is contention based. Meanwhile, IEEE 802.15.4 MAC provides limited 16 channels in the Superframe structure, making it unfit for N heterogeneous nature of patient's data. Also, the Beacon-enabled Carrier-Sense Multiple Access/Collision-Avoidance (CSMA/CA) scheduling access scheme in WBAN, allocates Contention-free Period (CAP) channels to emergency and non-emergency Biomedical Sensors (BMSs) using contention mechanism, increasing repetition in rounds. This reduces performance of the MAC protocol causing higher data collisions and delay, low data reliability, BMSs packet retransmissions and increased energy consumption. Moreover, it has no traffic differentiation method. This paper proposes a Low-delay Traffic-Aware Medium Access Control (LTA-MAC) protocol to provide sufficient channels with a higher bandwidth, and allocates them individually to non-emergency and emergency data. Also, a Contention Differentiated Adaptive Slot Allocation CSMA-CA (CDASA-CSMA/CA) for scheduling access scheme is proposed to reduce repetition in rounds, and assists in channels allocation to BMSs. Furthermore, an On-demand (OD) slot in the LTA-MAC to resolve the patient's data drops in the CSMA/CA scheme due to exceeding of threshold values in contentions is introduced. Simulation results demonstrate advantages of the proposed schemes over the IEEE 802.15.4 MAC and CSMA/CA scheme in terms of success rate, packet delivery delay, and energy consumption.