• Title/Summary/Keyword: Network science

Search Result 13,058, Processing Time 0.037 seconds

In-band Network Telemetry based Network Anomaly Detection Scheme (INT 기반 네트워크 이상 상태 탐지 기술 연구)

  • Lim, Jiyoon;Nam, Sukhyun;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • Network anomaly detection is a technology that collects information about flows on a network and detects malicious attacks occurring in a network in real time. In-band Network Telemetry (INT) technology provides more detailed information in real time, that is not provided by existing networks, such as hop latency and queue occupancy. In this paper, we propose the method to implement an anomaly detection system with higher performance by using INT as an input feature of machine learning and verify it through experiments.

Simulator Output Knowledge Analysis Using Neural network Approach : A Broadand Network Desing Example

  • Kim, Gil-Jo;Park, Sung-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.12-12
    • /
    • 1994
  • Simulation output knowledge analysis is one of problem-solving and/or knowledge adquistion process by investgating the system behavior under study through simulation . This paper describes an approach to simulation outputknowldege analysis using fuzzy neural network model. A fuzzy neral network model is designed with fuzzy setsand membership functions for variables of simulation model. The relationship between input parameters and output performances of simulation model is captured as system behavior knowlege in a fuzzy neural networkmodel by training examples form simulation exepreiments. Backpropagation learning algorithms is used to encode the knowledge. The knowledge is utilized to solve problem through simulation such as system performance prodiction and goal-directed analysis. For explicit knowledge acquisition, production rules are extracted from the implicit neural network knowledge. These rules may assit in explaining the simulation results and providing knowledge base for an expert system. This approach thus enablesboth symbolic and numeric reasoning to solve problem througth simulation . We applied this approach to the design problem of broadband communication network.

  • PDF

A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

  • Alattas, Khalid A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.132-140
    • /
    • 2021
  • Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

Method on DTN Performance Acceleration and Packet Loss Minimization for Transfer Efficiency Maximizing (전송효율성 극대화를 위한 DTN 성능 가속 및 병목구간 패킷손실 최소화 방안)

  • Park, Jong-Seon;Noh, Min-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.37-43
    • /
    • 2018
  • Science DMZ is a network architecture that considers complicated network components such as dedicated network, DTN, and minimum security policy to maximize transfer efficiency. And DTN tuning is an essential component to take full advantage of Science DMZ's available bandwidth. In addition, tuning of network system should be performed concurrently to minimize packet loss due to network bottleneck. In this paper, we propose a tuning method of data transfer node and network system for maximizing transfer efficiency in Science DMZ network architecture. As a result of the performance measurement using the KREONET, the network performance after the DTN tuning shows 180% improvement than that of existing method without DTN tuning. In addition, performance of 9.4Gb/s was shown without loss of performance measurement after tuning network system applying shaping policy.

S&T Policy Trend Using Language Network Analysis: Focusing on Science and Technology Basic Plan

  • Kim, Yun Jong;Jeong, Dae-hyun;Oh, Hyunchul
    • Asian Journal of Innovation and Policy
    • /
    • v.6 no.2
    • /
    • pp.111-137
    • /
    • 2017
  • This study analyzes a language network of Science and Technology Basic Plan, which is the basis for science and technology policy in Korea, for the next Science and Technology Basic Plan. Language network analysis was adopted for a quantitative approach measuring the trend of policies. Several techniques such as keyword analysis, language network map analysis, quantitative characteristics analysis and keyword-related major-word analysis have been performed. Results show that there are common policies emphasized by all Science and Technology Basic Plans in the past, and there are also specific policies emphasized in each period of the Science and Technology Basic Plan. These specific policies come from a 'change of times' when the Science and Technology Basic Plans were established, as well as the philosophy of the national government.

SYN Flood DoS Detection System Using Time Dependent Finite Automata

  • Noura AlDossary;Sarah AlQahtani;Reem Alzaher;Atta-ur-Rahman
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.147-154
    • /
    • 2023
  • Network intrusion refers to any unauthorized penetration or activity on a computer network. This upsets the confidentiality, integrity, and availability of the network system. One of the major threats to any system's availability is a Denial-of-Service (DoS) attack, which is intended to deny a legitimate user access to resources. Therefore, due to the complexity of DoS attacks, it is increasingly important to abstract and describe these attacks in a way that will be effectively detected. The automaton theory is used in this paper to implement a SYN Flood detection system based on Time-Dependent Finite Automata (TDFA).

KVN 단일경을 이용한 22/43GHz에서의 시험관측

  • O, Chung-Sik;Lee, Sang-Seong;Byeon, Do-Yeong;Je, Do-Heung;Han, Seok-Tae;Kim, Gi-Tae
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.42.2-42.2
    • /
    • 2010
  • 2009년부터 2010년에 걸쳐 22 및 43GHz 대역에서의 KVN 단일경 시험관측이 이루어졌다. KVN 관측소는 연세대학교, 울산대학교, 탐라대학교에 위치하고 있으며, 시험관측의 주된 내용은 안테나 지향모델 구축, 22/43 GHz 빔 정렬, 이득곡선 측정 및 안테나 효율측정 등이다. 구축된 지향오차의 정밀도는 세 곳의 관측소 모두 rms가 5초 이내였으며, 두 빔도 5초 이내로 정렬되어 있음이 확인되었다. 안테나 효율은 22 및 43GHz에서 모두 60%를 넘는 값을 얻을 수 있었다.

  • PDF

Breast Cancer Classification Using Convolutional Neural Network

  • Alshanbari, Eman;Alamri, Hanaa;Alzahrani, Walaa;Alghamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.101-106
    • /
    • 2021
  • Breast cancer is the number one cause of deaths from cancer in women, knowing the type of breast cancer in the early stages can help us to prevent the dangers of the next stage. The performance of the deep learning depends on large number of labeled data, this paper presented convolutional neural network for classification breast cancer from images to benign or malignant. our network contains 11 layers and ends with softmax for the output, the experiments result using public BreakHis dataset, and the proposed methods outperformed the state-of-the-art methods.

Network Coding for Energy-Efficient Distributed Storage System in Wireless Sensor Networks

  • Wang, Lei;Yang, Yuwang;Zhao, Wei;Lu, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2134-2153
    • /
    • 2013
  • A network-coding-based scheme is proposed to improve the energy efficiency of distributed storage systems in WSNs (Wireless Sensor Networks). We mainly focus on two problems: firstly, consideration is given to effective distributed storage technology; secondly, we address how to effectively repair the data in failed storage nodes. For the first problem, we propose a method to obtain a sparse generator matrix to construct network codes, and this sparse generator matrix is proven to be the sparsest. Benefiting from this matrix, the energy consumption required to implement distributed storage is reduced. For the second problem, we designed a network-coding-based iterative repair method, which adequately utilizes the idea of re-encoding at intermediate nodes from network coding theory. Benefiting from the re-encoding, the energy consumption required by data repair is significantly reduced. Moreover, we provide an explicit lower bound of field size required by this scheme, which implies that it can work over a small field and the required computation overhead is very low. The simulation result verifies that the proposed scheme not only reduces the total energy consumption required to implement distributed storage system in WSNs, but also balances energy consumption of the networks.