• Title/Summary/Keyword: Network science

Search Result 13,058, Processing Time 0.036 seconds

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

Cell Virtualization with Network Partition for Initial User Association in Software Defined Small-cell Networks

  • Sun, Guolin;Lu, Li;Ayepah-Mensah, Daniel;Fang, Xiufen;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.4703-4723
    • /
    • 2018
  • In recent years, dense small cell network has been deployed to address the challenge that has resulted from the unprecendented growth of mobile data traffic and users. It has proven to be a cost efficeient solution to offload traffic from macro-cells. Software defined heterogeneous wireless network can decouple the control plane from the data plane. The control signal goes through the macro-cell while the data traffic can be offloaded by small cells. In this paper, we propose a framework for cell virtualization and user association in order to satisfy versatile requirements of multiple tenants. In the proposed framework, we propose an interference graph partioning based virtual-cell association and customized physical-cell association for multi-homed users in a software defined small cell network. The proposed user association scheme includes 3 steps: initialization, virtual-cell association and physical-cell association. Simulation results show that the proposed virtual-cell association outperforms the other schemes. For physical-cell association, the results on resource utilization and user fairness are examined for mobile users and infrastructure providers.

Early Science of KVN: 43GHz fringe survey

  • Lee, Sang-Sung;Petrov, Leonid;Kim, Jongsoo;Jung, Taehyun;Sohn, Bong Won;Byun, Do-Young
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.239.1-239.1
    • /
    • 2012
  • This paper presents the results of one of early sciences with Korean VLBI Network (KVN): a large fringe survey of compact radio sources at 43GHz. We established the catalog of correlated flux densities in three ranges of baseline projection lengths of 637 sources from a 43 GHz (Q-band) survey observed with the Korean VLBI Network. Of them, 623 sources have not been observed before at Q-band with VLBI. The goal of this work in the early science phase of the new VLBI array is twofold: to evaluate the performance of the new instrument that operates in a frequency range of 22--129 GHz and to build a list of objects that can be used as targets and as calibrators. We have observed the list of 799 target sources with declinations down to $-40{\circ}$. Among them, 724 were observed before with VLBI at 22 GHz and had correlated flux densities greater than 200 mJy. The overall detection rate is 78%. The detection limit, defined as the minimum flux density for a source to be detected with 90% probability in a single observation, was in a range of 115--180 mJy depending on declination. However, some sources as weak as 70 mJy have been detected. Of 623 detected sources, 33 objects are detected for the first time in VLBI mode. We determined their coordinates with the median formal uncertainty 20 mas. The results of this work set the basis for future efforts to build the complete flux-limited sample of extragalactic sources at frequencies 22 GHz and higher at 3/4 of the celestial sphere.

  • PDF

Concurrent Engineering Based Collaborative Design Under Network Environment

  • Jiang Gongliang;Huang Hong-Zhong;Fan Xianfeng;Miao Qiang;Ling Dan
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.10
    • /
    • pp.1534-1540
    • /
    • 2006
  • Concurrent Engineering (CE) is a popular method employed in product development. It treats the whole product design process by the consideration of product quality, cost, rate of progress, and demands of customers. The development of computer and network technologies provides a strong support to the realization of CE in practice. Aiming at the characteristics of CE and network collaborative design, this paper built network collaborative design system frame. Through the analysis of the network collaborative design modes based on CE, this paper provided a novel network collaborative design integration model. This model can integrate the product design information, design process, and knowledge. Intelligent collaboration was considered in the proposed model. The study showed that the proposed model considered main factors such as information, knowledge, and design process in collaborative design. It has potential application in CE fields.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

Parallel Paths in Honeycomb Network (Honeycomb 연결망에서의 병렬 경로)

  • Kim, Cheol;Lee, Hyeong-Ok;Lim, Hyeong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.297-300
    • /
    • 1998
  • A honeycomb network is considered as a multiprocessor interconnection network. The network cost defined as the product of degree and diameter is better for honeycomb networks than for other types of meshes. Parallel paths offer us bypasses when the networks have faulty nodes or edges. In this paper, we present a method to construct a parallel path in honeycomb network, and show that the fault diameter for the honeycomb network is d+8, where d is diameter of the honeycomb network.

  • PDF

Modified Passive Clustering Algorithm for Wireless Sensor Network

  • AI Eimon Akhtar Rahman;HONG Choong Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.427-429
    • /
    • 2005
  • Energy efficiency is the most challenging issue in wireless sensor network to prolong the life time of the network, as the sensors has to be unattended. Cluster based communication can reduce the traffic on the network and gives the opportunity to other sensors for periodic sleep and thus save energy. Passive clustering (PC) can perform a significant role to minimize the network load as it is less computational and light weight. First declaration wins method of PC without any priority generates severe collision in the network and forms the clusters very dense with large amount of overlapping region. We have proposed several modifications for the existing passive clustering algorithm to prolong the life time of the network with better cluster formation.

  • PDF

A many-objective optimization WSN energy balance model

  • Wu, Di;Geng, Shaojin;Cai, Xingjuan;Zhang, Guoyou;Xue, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.514-537
    • /
    • 2020
  • Wireless sensor network (WSN) is a distributed network composed of many sensory nodes. It is precisely due to the clustering unevenness and cluster head election randomness that the energy consumption of WSN is excessive. Therefore, a many-objective optimization WSN energy balance model is proposed for the first time in the clustering stage of LEACH protocol. The four objective is considered that the cluster distance, the sink node distance, the overall energy consumption of the network and the network energy consumption balance to select the cluster head, which to better balance the energy consumption of the WSN network and extend the network lifetime. A many-objective optimization algorithm to optimize the model (LEACH-ABF) is designed, which combines adaptive balanced function strategy with penalty-based boundary selection intersection strategy to optimize the clustering method of LEACH. The experimental results show that LEACH-ABF can balance network energy consumption effectively and extend the network lifetime when compared with other algorithms.

Industrial Engineering as a Multidisciplinary Field : Exploring the Structure of Academic Convergence in Industrial Engineering by Journal Citation Network Analysis (융합 학문으로서의 산업공학 : 학술지 인용 네트워크 분석을 활용한 산업공학의 학문적 융합 구조 탐색)

  • Jeong, Bokwon;Lee, Hakyeon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.3
    • /
    • pp.182-197
    • /
    • 2016
  • One of the distinctive characteristics of industrial engineering (IE) is its multidisciplinarity. This paper explores the multidisciplinary nature of IE using journal citation network analysis. Using the relatedness indexes of IE journals obtained from journal citation report (JCR), we firstly construct the IE network only composed of 26 IE journals. The resulting IE network is partitioned into three sub-networks: management engineering, manufacturing/quality, and ergonomics. We then propose the IE convergence network which includes 81 related journals in other disciplines as well as 26 IE journals. Scrutinizing the IE convergence network reveals that IE has a high degree of interactions with seven disciplines : Operations Research and Management Science, Statistics and Probability, Manufacturing Engineering, Computer Science, Engineering Design, Business Management, Human Factors and Ergonomics. We investigate the contributions of the related disciplines to IE as well as contributions of IE to the related disciplines. The role of IE journals in exchanging knowledge with related disciplines is also identified by brokerage analysis. It is shown that visualizing and analyzing the IE convergence network can provide an excellent overview of the multidisciplinary structure of IE, which can help IE researchers easily grasp the state-of-the art of IE research.