• Title/Summary/Keyword: packet classification

Search Result 101, Processing Time 0.026 seconds

A Novel Instruction Set for Packet Processing of Network ASIP (패킷 프로세싱을 위한 새로운 명령어 셋에 관한 연구)

  • Chung, Won-Young;Lee, Jung-Hee;Lee, Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.939-946
    • /
    • 2009
  • In this paper, we propose a new network ASIP(Application Specific Instruction-set Processor) which was designed for simulation models by a machine descriptions language LISA(Language for Instruction Set Architecture). This network ASIP is aimed for an exclusive engine undertaking packet processing in a router. To achieve the purpose, we added a new necessary instruction set for processing a general ASIP based on MIPS(Microprocessor without Interlock Pipeline Stages) architecture in high speed. The new instructions can be divided into two groups: a classification instruction group and a modification instruction group, and each group is to be processed by its own functional unit in an execution stage. The functional unit was optimized for area and speed through Verilog HDL, and the result after synthesis was compared with the area and operation delay time. Moreownr, it was allocated to the Macro function ana low-level standardized programming language C using CKF(Compiler Known Function). Consequently, we verified performance improvement achieved by analysis and comparison of execution cycles of application programs.

The Classification of Congestion and Wireless Losses for TCP Segments Using ROTT (상대전송지연시간을 이용한 TCP 세그먼트의 혼잡 손실과 무선 손실 구분 알고리즘)

  • Shin, Kwang-Sik;Lee, Bo-Ram;Kim, Ki-Won;Jang, Mun-Suck;Yoon, Wan-Oh;Choi, Sang-Bang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8A
    • /
    • pp.858-870
    • /
    • 2007
  • TCP is popular protocol for reliable data delivery in the Internet. In recent years, wireless environments with transmission errors are becoming more common. Therefore, there is significant interest in using TCP over wireless links. Previous works have shown that, unless the protocol is modified, TCP may perform poorly on paths that include a wireless link subject to transmission errors. The reason for this is the implicit assumption in TCP that all packet losses are due to congestion which causes unnecessary reduction of transmission rate when the cause of packet losses are wireless transmission errors. In this paper, we propose a new LDA that monitors the network congestion level using ROTT. And we evaluate the performance of our scheme and compare with TCP Veno, Spike scheme with NS2(Network Simulator 2). In the result of our experiment, our scheme reduces the packet loss misclassification to maximum 55% of other schemes. And the results of another simulation show that our scheme raise its transmission rate with the fairness preserved.

Theoretical and experimental study on damage detection for beam string structure

  • He, Haoxiang;Yan, Weiming;Zhang, Ailin
    • Smart Structures and Systems
    • /
    • v.12 no.3_4
    • /
    • pp.327-344
    • /
    • 2013
  • Beam string structure (BSS) is introduced as a new type of hybrid prestressed string structures. The composition and mechanics features of BSS are discussed. The main principles of wavelet packet transform (WPT), principal component analysis (PCA) and support vector machine (SVM) have been reviewed. WPT is applied to the structural response signals, and feature vectors are obtained by feature extraction and PCA. The feature vectors are used for training and classification as the inputs of the support vector machine. The method is used to a single one-way arched beam string structure for damage detection. The cable prestress loss and web members damage experiment for a beam string structure is carried through. Different prestressing forces are applied on the cable to simulate cable prestress loss, the prestressing forces are calculated by the frequencies which are solved by Fourier transform or wavelet transform under impulse excitation. Test results verify this method is accurate and convenient. The damage cases of web members on the beam are tested to validate the efficiency of the method presented in this study. Wavelet packet decomposition is applied to the structural response signals under ambient vibration, feature vectors are obtained by feature extraction method. The feature vectors are used for training and classification as the inputs of the support vector machine. The structural damage position and degree can be identified and classified, and the test result is highly accurate especially combined with principle component analysis.

Intrusion Detection System based on Packet Payload Analysis using Transformer

  • Woo-Seung Park;Gun-Nam Kim;Soo-Jin Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.81-87
    • /
    • 2023
  • Intrusion detection systems that learn metadata of network packets have been proposed recently. However these approaches require time to analyze packets to generate metadata for model learning, and time to pre-process metadata before learning. In addition, models that have learned specific metadata cannot detect intrusion by using original packets flowing into the network as they are. To address the problem, this paper propose a natural language processing-based intrusion detection system that detects intrusions by learning the packet payload as a single sentence without an additional conversion process. To verify the performance of our approach, we utilized the UNSW-NB15 and Transformer models. First, the PCAP files of the dataset were labeled, and then two Transformer (BERT, DistilBERT) models were trained directly in the form of sentences to analyze the detection performance. The experimental results showed that the binary classification accuracy was 99.03% and 99.05%, respectively, which is similar or superior to the detection performance of the techniques proposed in previous studies. Multi-class classification showed better performance with 86.63% and 86.36%, respectively.

Kriging Regressive Deep Belief WSN-Assisted IoT for Stable Routing and Energy Conserved Data Transmission

  • Muthulakshmi, L.;Banumathi, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.91-102
    • /
    • 2022
  • With the evolution of wireless sensor network (WSN) technology, the routing policy has foremost importance in the Internet of Things (IoT). A systematic routing policy is one of the primary mechanics to make certain the precise and robust transmission of wireless sensor networks in an energy-efficient manner. In an IoT environment, WSN is utilized for controlling services concerning data like, data gathering, sensing and transmission. With the advantages of IoT potentialities, the traditional routing in a WSN are augmented with decision-making in an energy efficient manner to concur finer optimization. In this paper, we study how to combine IoT-based deep learning classifier with routing called, Kriging Regressive Deep Belief Neural Learning (KR-DBNL) to propose an efficient data packet routing to cope with scalability issues and therefore ensure robust data packet transmission. The KR-DBNL method includes four layers, namely input layer, two hidden layers and one output layer for performing data transmission between source and destination sensor node. Initially, the KR-DBNL method acquires the patient data from different location. Followed by which, the input layer transmits sensor nodes to first hidden layer where analysis of energy consumption, bandwidth consumption and light intensity are made using kriging regression function to perform classification. According to classified results, sensor nodes are classified into higher performance and lower performance sensor nodes. The higher performance sensor nodes are then transmitted to second hidden layer. Here high performance sensor nodes neighbouring sensor with higher signal strength and frequency are selected and sent to the output layer where the actual data packet transmission is performed. Experimental evaluation is carried out on factors such as energy consumption, packet delivery ratio, packet loss rate and end-to-end delay with respect to number of patient data packets and sensor nodes.

Power Quality Disturbance Classification using Decision Fusion (결정결합 방법을 이용한 전력외란 신호의 식별)

  • 김기표;김병철;남상원
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.915-918
    • /
    • 2000
  • In this paper, we propose an efficient feature vector extraction and decision fusion methods for the automatic classification of power system disturbances. Here, FFT and WPT(wavelet packet transform) are und to extract an appropriate feature for classifying power quality disturbances with variable properties. In particular, the WPT can be utilized to develop an adaptable feature extraction algorithm using best basis selection. Furthermore. the extracted feature vectors are applied as input to the decision fusion system which combines the decisions of several classifiers having complementary performances, leading to improvement of the classification performance. Finally, the applicability of the proposed approach is demonstrated using some simulations results obtained by analyzing power quality disturbances data generated by using Matlab.

  • PDF

Lung Sound Classification Using Hjorth Descriptor Measurement on Wavelet Sub-bands

  • Rizal, Achmad;Hidayat, Risanuri;Nugroho, Hanung Adi
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1068-1081
    • /
    • 2019
  • Signal complexity is one point of view to analyze the biological signal. It arises as a result of the physiological signal produced by biological systems. Signal complexity can be used as a method in extracting the feature for a biological signal to differentiate a pathological signal from a normal signal. In this research, Hjorth descriptors, one of the signal complexity measurement techniques, were measured on signal sub-band as the features for lung sounds classification. Lung sound signal was decomposed using two wavelet analyses: discrete wavelet transform (DWT) and wavelet packet decomposition (WPD). Meanwhile, multi-layer perceptron and N-fold cross-validation were used in the classification stage. Using DWT, the highest accuracy was obtained at 97.98%, while using WPD, the highest one was found at 98.99%. This result was found better than the multi-scale Hjorth descriptor as in previous studies.

Condition Monitoring of an LCD Glass Transfer Robot Based on Wavelet Packet Transform and Artificial Neural Network for Abnormal Sound (LCD 라인의 음향 특성신호에 웨이브렛 변환과 인경신경망회로를 적용한 공정로봇의 건정성 감시 연구)

  • Kim, Eui-Youl;Lee, Sang-Kwon;Jang, Ji-Uk
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.7
    • /
    • pp.813-822
    • /
    • 2012
  • Abnormal operating sounds radiated from a moving transfer robot in LCD (liquid crystal display) product lines have been used for the fault detection line of a robot instead of other source signals such as vibrations, acoustic emissions, and electrical signals. Its advantage as a source signal makes it possible to monitor the status of multiple faults by using only a microphone, despite a relatively low sensitivity. The wavelet packet transform for feature extraction and the artificial neural network for fault classification are employed. It can be observed that the abnormal operating sound is sufficiently useful as a source signal for the fault diagnosis of mechanical components as well as other source signals.

A Multiple Instance Learning Problem Approach Model to Anomaly Network Intrusion Detection

  • Weon, Ill-Young;Song, Doo-Heon;Ko, Sung-Bum;Lee, Chang-Hoon
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.14-21
    • /
    • 2005
  • Even though mainly statistical methods have been used in anomaly network intrusion detection, to detect various attack types, machine learning based anomaly detection was introduced. Machine learning based anomaly detection started from research applying traditional learning algorithms of artificial intelligence to intrusion detection. However, detection rates of these methods are not satisfactory. Especially, high false positive and repeated alarms about the same attack are problems. The main reason for this is that one packet is used as a basic learning unit. Most attacks consist of more than one packet. In addition, an attack does not lead to a consecutive packet stream. Therefore, with grouping of related packets, a new approach of group-based learning and detection is needed. This type of approach is similar to that of multiple-instance problems in the artificial intelligence community, which cannot clearly classify one instance, but classification of a group is possible. We suggest group generation algorithm grouping related packets, and a learning algorithm based on a unit of such group. To verify the usefulness of the suggested algorithm, 1998 DARPA data was used and the results show that our approach is quite useful.

Prioritized Data Transmission Mechanism for IoT

  • Jung, Changsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2333-2353
    • /
    • 2020
  • This paper proposes a novel data prioritization and transmission mechanism to minimize the number of packets transmitted and reduce network overload using the constrained application protocol (CoAP) in resource-constrained networks. The proposed scheme adopts four classification parameters to classify and prioritize data from a sensor. With the packet prioritization scheme, the sensed data having the lowest priority is only delivered using the proposed keep-alive message notification to decrease the number of packets transmitted. The performance evaluation demonstrates that the proposed scheme shows the improvement of resource utilization in energy consumption, and bandwidth usage compared with the existing CoAP methods. Furthermore, the proposed scheme supports quality-of-service (QoS) per packet by differentiating transmission delays regarding priorities.