• Title/Summary/Keyword: network-based

Search Result 25,510, Processing Time 0.05 seconds

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Anomaly-Based Network Intrusion Detection: An Approach Using Ensemble-Based Machine Learning Algorithm

  • Kashif Gul Chachar;Syed Nadeem Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.107-118
    • /
    • 2024
  • With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.

Rule-based network fault self-recovery system (규칙 기반의 네트워크 장애 자기 복구 시스템)

  • Lee, Jae-Wook;Ahn, Seong-Jin;Chung, Jin-Wook
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.10 no.1
    • /
    • pp.83-93
    • /
    • 2006
  • This paper introduces rule-based reasoning (RBR) based self-recovery system for network fault in ubiquitous computing. This system is fault management system for fault recovery of rule-based for self-recovery in ubiquitous computing environment. We proposed rules of network fault recovery applied the system as a distinguished reason of network fault. And, in this paper, the network fault self-recovery system proved the rules that applied each situatpion through the simulation.

  • PDF

Recognition of Virtual Written Characters Based on Convolutional Neural Network

  • Leem, Seungmin;Kim, Sungyoung
    • Journal of Platform Technology
    • /
    • v.6 no.1
    • /
    • pp.3-8
    • /
    • 2018
  • This paper proposes a technique for recognizing online handwritten cursive data obtained by tracing a motion trajectory while a user is in the 3D space based on a convolution neural network (CNN) algorithm. There is a difficulty in recognizing the virtual character input by the user in the 3D space because it includes both the character stroke and the movement stroke. In this paper, we divide syllable into consonant and vowel units by using labeling technique in addition to the result of localizing letter stroke and movement stroke in the previous study. The coordinate information of the separated consonants and vowels are converted into image data, and Korean handwriting recognition was performed using a convolutional neural network. After learning the neural network using 1,680 syllables written by five hand writers, the accuracy is calculated by using the new hand writers who did not participate in the writing of training data. The accuracy of phoneme-based recognition is 98.9% based on convolutional neural network. The proposed method has the advantage of drastically reducing learning data compared to syllable-based learning.

Ticket-Based Authentication Protocol Using Attribute Information over Home Network (홈네트워크 상에서 속성정보를 이용한 티켓기반의 인증 프로토콜)

  • Lee, Won-Jin;Kim, Kee-Won;Kim, HyunSung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.1
    • /
    • pp.53-59
    • /
    • 2012
  • Recently, LEE et al. proposed an attribute-based authenticated key agreement protocol over home network, which aimed to support authentication and key agreement between user and home server. However, if the home server is attacked in the protocol, the effects are influenced to the overall home network components severly. Thereby, this paper proposes a new ticket-based authentication protocol using user attributes between user and home devices to solve the problem. The proposed protocol supports the various levels of security to user by diversifying the network accessibility depending on user attribute. Thereby, the protocol could support more secure home network services.

Modeling and Simulation of Policy-based Network Security

  • Lee, Won-young;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.155-162
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. In this paper we build a foundation of policy-based network modeling and simulation environment. The procedure and structure for the induction of policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are developed. The structure also transforms the policy rules into PCIM (Policy Core Information Model). The effect on a particular policy can be tested and analyzed through the simulation with the PCIMs and SVDB.

  • PDF

A Capacity Planning Framework for a QoS-Guaranteed Multi-Service IP network (멀티서비스를 제공하는 IP 네트워크에서의 링크용량 산출 기법)

  • Choi, Yong-Min
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.327-330
    • /
    • 2007
  • This article discusses a capacity planning method in QoS-guaranteed IP networks such as BcN (Broadband convergence Network). Since IP based networks have been developed to transport best-effort data traffic, the introduction of multi-service component in BcN requires fundamental modifications in capacity planning and network dimensioning. In this article, we present the key issues of the capacity planning in multi-service IP networks. To provide a foundation for network dimensioning procedure, we describe a systematic approach for classification and modeling of BcN traffic based on the QoS requirements of BcN services. We propose a capacity planning framework considering data traffic and real-time streaming traffic separately. The multi-service Erlang model, an extension of the conventional Erlang B loss model, is introduced to determine required link capacity for the call based real-time streaming traffic. The application of multi-service Erlang model can provide significant improvement in network planning due to sharing of network bandwidth among the different services.

  • PDF

Stability and a scheduling method for network-based control systems (네트워크를 이용한 제어 시스템의 안정도 및 스케줄링에 관한 연구)

  • 김용호;권욱현;박홍성
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1432-1435
    • /
    • 1996
  • This paper obtains maximum allowable delay bounds for stability of network-based control systems and presents a network scheduling method which makes the network-induced delay be less than the maximum allowable delay bound. The maximum allowable delay bounds are obtained using the Lyapunov theorem. Using the network scheduling method, the bandwidth of a network can be allocated to each node and the sampling period of each sensor and controller can be determined. The presented method can handle three kinds of data (periodic, real-time asynchronous, and non real-time asynchronous data) and guarantee real-time transmissions of real-time synchronous data and periodic data, and possible transmissions of non real-time asynchronous data. The proposed method is shown to be useful by examples in two types of network protocols such as the token control and the central control.

  • PDF

A study on intelligent robot based on home network (홈 네트워크 기반의 지능형 홈 로봇의 연구)

  • Jung, Byung-Chan;Park, Jin-Hyun;Choi, Dong-Suk;Kim, Hun-Mo
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.792-798
    • /
    • 2003
  • This paper is about implementation of intelligent robot based on home network. Existing robots are mainly stand alone type. Home network is spreading rapidly and can play an important role as a path for informations between appliances in home. Robot can be more intelligent and have versatile functions with a junction of home network. By distribution of tasks through home network, robot doesn't have to process every task. In addition, robot can access to appliances through network as appliances are added continuously. In the future, smart space in which robot behaves on various types of network is in expectation. In this research, home network based system which consists of home server, embedded robot, and intelligent robot is proposed and implemented.

  • PDF

Signaling and Control Procedures Using Generalized MPLS Protocol for IP over an Optical Network

  • Um, Tai-Won;Choi, Jun-Kyun;Kim, Young-Ae;Lee, Hyeong-Ho;Jung, Hae-Won;Jong, Sang-Gug
    • ETRI Journal
    • /
    • v.24 no.2
    • /
    • pp.69-81
    • /
    • 2002
  • This paper reviews the existing research activities on signaling and control procedures for IP over optical networks. We focus on the IP-centric signaling and control architecture based on the generalized multi-protocol label switching (GMPLS) protocol and analyze various scenarios and technical issues for deploying the IP over an optical network. We analyze the signaling and operations and administration and maintenance requirements for integrating an IP network and an optical network in order to cope with the high bandwidth and poor resource granularity of the optical network, including the optical cross-connect system. On the basis of network architecture and a reference configuration model, we investigate the GMPLS-based control architecture and interconnection model appropriate for controlling IP bandwidth and optical lambda resources. The signaling and control procedure based on GMPLS on optical user-network interface and network-network interface are comparatively investigated to provide the optical lightpath. We also study protection and restoration procedures to protect link failure when it applies to generalized MPLS signaling.

  • PDF