• Title/Summary/Keyword: Network Data Mode

Search Result 385, Processing Time 0.03 seconds

A Visualization System for Multiple Heterogeneous Network Security Data and Fusion Analysis

  • Zhang, Sheng;Shi, Ronghua;Zhao, Jue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2801-2816
    • /
    • 2016
  • Owing to their low scalability, weak support on big data, insufficient data collaborative analysis and inadequate situational awareness, the traditional methods fail to meet the needs of the security data analysis. This paper proposes visualization methods to fuse the multi-source security data and grasp the network situation. Firstly, data sources are classified at their collection positions, with the objects of security data taken from three different layers. Secondly, the Heatmap is adopted to show host status; the Treemap is used to visualize Netflow logs; and the radial Node-link diagram is employed to express IPS logs. Finally, the Labeled Treemap is invented to make a fusion at data-level and the Time-series features are extracted to fuse data at feature-level. The comparative analyses with the prize-winning works prove this method enjoying substantial advantages for network analysts to facilitate data feature fusion, better understand network security situation with a unified, convenient and accurate mode.

Handoff Management for Mobile Devices in Hybrid Wireless Data Networks

  • Inayat Riaz;Aibara Reiji;Nishimura Kouji
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.76-86
    • /
    • 2005
  • Today's wireless access networks consist of several tiers that overlap each other. Provisioning of real time undisrupted communication to mobile users, anywhere and anytime through these heterogeneous overlay networks, is a challenging task. We extend the end-to-end approach for the handoff management in hybrid wireless data network by designing a fully mobile-controlled handoff for mobile devices equipped with dual mode interfaces. By handoff, we mean switching the communication between interfaces connected to different subnets. This mobile-controlled handoff scheme reduces the service disruption time during both horizontal and vertical handoffs and does not require any modification in the access networks. We exploit the IP diversity created by the dual interfaces in the overlapping area by simultaneously connecting to different subnets and networks. Power saving is achieved by activating both interfaces only during the handoff period. The performance evaluation of the handoff is carried out by a simple mathematical analysis. The analysis shows that with proper network engineering, exploiting the speed of mobile node and overlapping area between subnets can reduce service disruption and power consumption during handoff significantly. We believe that with more powerful network interfaces our proposal of dual interfaces can be realized.

Throughput Analysis of R-NAD in MIL-STD-188-220 (MIL-STD-188-220의 R-NAD 처리율 분석)

  • Kim, Sangsoo;Gu, Sungmo;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.561-568
    • /
    • 2014
  • The Republic of Korea Army is using R-NAD of MIL-STD-188-220 as a Media Access Control protocol. Under urgent situations, almost all stations transmit data frames and then the network will reach a saturation state. Several articles have been devoted to the study of R-NAD performance. However, most of them focus on comparing the performance of some NADs using network simulation tools. We propose an analytical model to compute the throughput of R-NAD under the assumption of a network traffic saturation. Analytical results were verified by Monte Carlo methods. We have shown that the performance of a success probability and an average idle time remains almost unchanged as the total number of stations increases. We have also shown that Type 1/2/4 operation mode outperforms Type 3 operation mode in throughput. The results showed that the system with a squelch detection achieved a better performance than the one without it. The longer DATA time had a higher throughput.

Development of Wireless Diagnostic System for Substation Equipments Using SMS Mode of Mobile Communication Network (이동통신망의 SMS방식을 이용한 변전기기 무선진단 시스템 개발)

  • Kim, Jin-Cheol;Kim, Ji-Ho;Yun, Man-Sik;Song, Ho-Jun;Lee, Hyang-Beom
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.259-261
    • /
    • 2003
  • This paper suggests wireless diagnosis and monitoring system using SMS mode of mobile communication network for distribution transformer which could prevent electrical accident in the near future. Data are acquired by measuring the temperature of insulator oil in the distribution transformer and load current. Data acquisition of sensor using mobile communication network carried out filtering of sensor's output to optimize the size of send data Merit of this inspection method is that management, control and monitoring some transformers can be carried out using only one server. This inspection method will be the way of inspection to be worth spotlight in the near future because it is able to solve easily with the minimum facility inspection about state of transformer which is operating, to wide coverage about machine's wrong operation in other field.

  • PDF

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

Analysis of Flow and Congestion control in USN (USN의 전송 계층 프로토콜에서 에러 및 흐름제어의 성능 평가)

  • Cha, Hyun-Soo;Kang, Chul-Kun;Yoo, Seung-Wha;Kim, Ki-Hyung
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.45-50
    • /
    • 2008
  • Many applications of sensor network require connection to the Internet. The transmission protocol of traditional sensor network was designed within the sensor network itself. However, based on 6LoWPAN which can be accessed using IPv6, direct connection is possible between the sensor network and the TCP/IP network outside. Transmission of data in applications of sensor network falls into two main categories. One is a small packet that is periodically produced such as packet related to temperature and humidity. The other is a relatively large packet that brings about network overheads such as images. We investigated the conformance test and pros and cons of application data over the transmission protocol of Zigbee and 6LoWPAN. As a result, both Zigbee and 6LoWPAN have shown low rate of loss for periodic data and have in creased reliability of data transfer. When transmitting streaming image data, both ACK, non ACK mode of Zigbee and UDP of 6LoWPAN minimized transmission time but suffered the consequences of high packet loss. Even though TCP of 6LoWPAN required a long transmission time, we were able to confirm that no loss has occurred.

  • PDF

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.

Performance study for collision in non-beacon mode and beacon mode of IEEE 802.15.4 wireless network (IEEE 802..15.4 무선 네트워크의 non-beacon 모드와 beacon 모드에서의 collision에 관한 성능 연구)

  • Lee, Yoo-Jin;Nam, Heung-Woo;An, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.616-620
    • /
    • 2006
  • IEEE 802.15.4 is designed for low-rate wireless personal area networks (LR_WPAN) and it attempts to provide a low data rate, low power, low cost wireless networking on the device-level communication. In this paper, I have established a realistic environment for the effect of collision in nonbeacon-enabled mode and beacon enabled mode. The data throughput and delivery ratio are investigated as the performance metrics.

  • PDF

A Clustering Protocol with Mode Selection for Wireless Sensor Network

  • Kusdaryono, Aries;Lee, Kyung-Oh
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.29-42
    • /
    • 2011
  • Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way, since their energy is limited. The clustering algorithm is a technique used to reduce energy consumption. It can improve the scalability and lifetime of wireless sensor networks. In this paper, we introduce a clustering protocol with mode selection (CPMS) for wireless sensor networks. Our scheme improves the performance of BCDCP (Base Station Controlled Dynamic Clustering Protocol) and BIDRP (Base Station Initiated Dynamic Routing Protocol) routing protocol. In CPMS, the base station constructs clusters and makes the head node with the highest residual energy send data to the base station. Furthermore, we can save the energy of head nodes by using the modes selection method. The simulation results show that CPMS achieves longer lifetime and more data message transmissions than current important clustering protocols in wireless sensor networks.

Estimation of track irregularity using NARX neural network (NARX 신경망을 이용한 철도 궤도틀림 추정)

  • Kim, Man-Cheol;Choi, Bai-Sung;Kim, Yu-Hee;Shin, Soob-Ong
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.275-280
    • /
    • 2011
  • Due to high-speed of trains, the track deformation increases rapidly and may lead to track irregularities causing the track stability problem. To secure the track stability, the continual inspection on track irregularities is required. The paper presents a methodology for identifying track irregularity using the NARX neural network considering non-linearity in the train structural system. A simulation study has been carried out to examine the proposed method. Acceleration time history data measured at a bogie were re-sampled to every 0.25m track irregularity. In the simulation study, two sets of measured data were simulated. The second data set was obtained by a train with 10% more mass than the one for the first data set. The first set of simulated data was used to train the series-parallel mode of NARX neural network. Then, the track irregularities at the second time period are identified by using the measured acceleration data. The closeness of the identified track irregularity to the actual one is evaluated by PSD and RMSE.

  • PDF