• Title/Summary/Keyword: Computer Network

Search Result 12,663, Processing Time 0.029 seconds

Performance Evaluation of SDN Controllers: RYU and POX for WBAN-based Healthcare Applications

  • Lama Alfaify;Nujud Alnajem;Haya Alanzi;Rawan Almutiri;Areej Alotaibi;Nourah Alhazri;Awatif Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.219-230
    • /
    • 2023
  • Wireless Body Area Networks (WBANs) have made it easier for healthcare workers and patients to monitor patients' status continuously in real time. WBANs have complex and diverse network structures; thus, management and control can be challenging. Therefore, considering emerging Software-defined networks (SDN) with WBANs is a promising technology since SDN implements a new network management and design approach. The SDN concept is used in this study to create more adaptable and dynamic network architectures for WBANs. The study focuses on comparing the performance of two SDN controllers, POX and Ryu, using Mininet, an open-source simulation tool, to construct network topologies. The performance of the controllers is evaluated based on bandwidth, throughput, and round-trip time metrics for networks using an OpenFlow switch with sixteen nodes and a controller for each topology. The study finds that the choice of network controller can significantly impact network performance and suggests that monitoring network performance indicators is crucial for optimizing network performance. The project provides valuable insights into the performance of SDN-based WBANs using POX and Ryu controllers and highlights the importance of selecting the appropriate network controller for a given network architecture.

Extraction of specific common genetic network of side effect pair, and prediction of side effects for a drug based on PPI network

  • Hwang, Youhyeon;Oh, Min;Yoon, Youngmi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.115-123
    • /
    • 2016
  • In this study, we collect various side effect pairs which are appeared frequently at many drugs, and select side effect pairs that have higher severity. For every selected side effect pair, we extract common genetic networks which are shared by side effects' genes and drugs' target genes based on PPI(Protein-Protein Interaction) network. For this work, firstly, we gather drug related data, side effect data and PPI data. Secondly, for extracting common genetic network, we find shortest paths between drug target genes and side effect genes based on PPI network, and integrate these shortest paths. Thirdly, we develop a classification model which uses this common genetic network as a classifier. We calculate similarity score between the common genetic network and genetic network of a drug for classifying the drug. Lastly, we validate our classification model by means of AUC(Area Under the Curve) value.

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.

Distributed controller using Hopfield Network algorithm in SDN environment (SDN 환경에서 Hopfield Network 알고리즘을 이용한 분산 컨트롤러)

  • Yoo, Seung-Eon;Kim, Dong-Hyun;Lee, Byung-Jun;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.43-44
    • /
    • 2019
  • 본 논문에서는 머신러닝 알고리즘 중 하나인 Hopfield Network 알고리즘을 이용하여 SDN 환경에서 분산된 컨트롤러를 선택하는 모델을 제안하였다. Hopfield Network 알고리즘은 신경망의 물리적 모델로써 최적화, 연상기억 등에 사용되는데 이를 통해 효율적인 컨트롤러 동기화를 기대한다.

  • PDF

Design and Implementation of an IPv6 Multicast Forwarding Module on the IXP2400 Network Processor (IXP2400 네트워크 프로세서를 이용한 IPv6 멀티캐스트 포워딩 모듈의 설계 및 구현)

  • Song Jisoo;Park Woojin;Kim Daehee;An Sunshin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.625-627
    • /
    • 2005
  • 본 논문은 인텔사의 IXP2400 네트워크 프로세서를 이용하여 IPv6 multicast-enabled 라우터 개발의 예비단계로서 IPv6 멀티캐스트 모듈의 전체적인 설계 및 구현을 다룬다. 특히, 마이크로 엔진할당, IPv6 멀티캐스트 마이크로 블록 및 패킷 복사 마이크로 블록에 중점을 둔다. 우리의 IPv6 멀티캐스트 포워딩 모듈의 성능측정 결과는 이론적 한계치의 $86\%$였다.

  • PDF

Prevention of DDoS Attacks for Enterprise Network Based on Traceback and Network Traffic Analysis

  • Ma, Yun-Ji;Baek, Hyun-Chul;Kim, Chang-Geun;Kim, Sang-Bok
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2009
  • With the wide usage of internet in many fields, networks are being exposed to many security threats, such as DDoS attack and worm/virus. For enterprise network, prevention failure of network security causes the revealing of commercial information or interruption of network services. In this paper, we propose a method of prevention of DDoS attacks for enterprise network based on traceback and network traffic analysis. The model of traceback implements the detection of IP spoofing attacks by the cooperation of trusted adjacent host, and the method of network traffic analysis implements the detection of DDoS attacks by analyzing the traffic characteristic. Moreover, we present the result of the experiments, and compare the method with other methods. The result demonstrates that the method can effectively detect and block DDoS attacks and IP spoofing attacks.

Application of Percolation Model for Network Analysis

  • Kiuchi, Yasuhiko;Tanaka, Masaru;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1101-1104
    • /
    • 2002
  • In order to send the information certainly via the network against the packet lost caused by hardware troubles or limitation of packet transferring, we must construct reliable network infrastructure. However, it is difficult to construct comfortable network early if we construct rely on the prediction or the experience through a lot of troubles. In this paper, we propose the method to construct reliable network infrastructure based on the computer network simulation. This simulation is based on the percolation model. Percolation model is known as the model that represents connections. We gave some simulations for the various network topologies: the square lattice network, the cubic lattice network, and the full connection type network.

  • PDF

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.

Study on data preprocessing method based on In-Network data merge (In-Network 데이터 병합 기반 데이터 전처리 기법 연구)

  • Lim, Hwan-Hee;Kim, Se-Jun;Lee, Byung-Jun;Kim, Kyung-tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.91-92
    • /
    • 2019
  • 본 논문에서는 IoT 기기의 각 센서로부터 획득된 데이터에 대한 수집 및 효율적 라우팅 기법을 기반으로 대용량 데이터 수집의 효율성 및 신뢰도 향상을 위해 In-network 데이터 병합 기반 데이터 전처리 기법을 제안한다. 기존의 Wireless Sensor Network에서는 모든 단말 노드가 스스로 라우팅 된 하위 센서 노드들의 데이터를 병합하는 In-network 병합기법을 사용한다. 이 기법은 이벤트가 발생하지 않거나 필요한 쿼리가 없어도 주기적으로 라우팅에 필요한 메시지를 전송하므로 불필요한 에너지 소모를 야기 시키며 데이터 전송 에러가 발생할 확률이 높다. 기존 In-Network 데이터 병합 기법의 효율성 및 정확성을 향상시키기 위해, 본 논문에서는 조건 병합 기반의 In-network 병합 기법을 제안한다.

  • PDF

A Study of the Next Generation STOCK-NETWORK and Design (차세대 증권전산망(STOCK-NET)의 연구와 설계)

  • Ha, Sung-Yong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.95-102
    • /
    • 2008
  • The next generation network preparation of stock computer network designated to facilities and goal facilities-based national main information communication certainly necessary for 'national competitiveness enhancement and national economic strength elevations'. This paper studies current government policy and network, security and securities computer network, and substitute for securities computer network-based the existing SONET/SDH, and next generation securities computer network designs so as to provide ALL-IP service-based MPLS for international GMG service. Set up stability, standardization, security, a basis of and compare is current next generation securities computer network by each bases in case of designs. Analyze an expected effect to have been improved at next generation stock computer network characteristics and merits and substitution width and QoS, communication instrument liquor, an information protection system etc. too. Result of research of this paper will contribute to national competitiveness enhancement and a national economic strength elevation to accomplish u-Korea.

  • PDF