• Title/Summary/Keyword: network-centric

Search Result 443, Processing Time 0.035 seconds

A Data-centric Analysis to Evaluate Suitable Machine-Learning-based Network-Attack Classification Schemes

  • Huong, Truong Thu;Bac, Ta Phuong;Thang, Bui Doan;Long, Dao Minh;Quang, Le Anh;Dan, Nguyen Minh;Hoang, Nguyen Viet
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.169-180
    • /
    • 2021
  • Since machine learning was invented, there have been many different machine learning-based algorithms, from shallow learning to deep learning models, that provide solutions to the classification tasks. But then it poses a problem in choosing a suitable classification algorithm that can improve the classification/detection efficiency for a certain network context. With that comes whether an algorithm provides good performance, why it works in some problems and not in others. In this paper, we present a data-centric analysis to provide a way for selecting a suitable classification algorithm. This data-centric approach is a new viewpoint in exploring relationships between classification performance and facts and figures of data sets.

A Study on the direction of implementing the Defence Logistics Supproting System for Network Centric Warfare (미래 네트워크중심전쟁에 부합하는 네트워크화 군수지원시스템 구축 방향)

  • Choi, S.Y.;Kang, S.J.;Park, K.W.
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.2
    • /
    • pp.165-187
    • /
    • 2006
  • The aim of this study is to suggest the direction of implementing the new defense logistics systems for the network centric warfare in the future. For this purpose, we reviewed SARL(Sense and Response Logistics) which receives great attention from the U.S. Department of Defence as the future logistic concept of network centric warfare, coupled with recent development in information technologies which give technical revolution in the future logistics information system. Also, we analyzed problems underlying logistics information system currently used in the Korean Armed Forces. Finally, we suggested the direction of implementing the new logistics information system for the network centric warfare, expecting to reduce total logistics cost, speed up logistics velocity, and enhance the efficiency of the combat support.

QuLa: Queue and Latency-Aware Service Selection and Routing in Service-Centric Networking

  • Smet, Piet;Simoens, Pieter;Dhoedt, Bart
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.306-320
    • /
    • 2015
  • Due to an explosive growth in services running in different datacenters, there is need for service selection and routing to deliver user requests to the best service instance. In current solutions, it is generally the client that must first select a datacenter to forward the request to before an internal load-balancer of the selected datacenter can select the optimal instance. An optimal selection requires knowledge of both network and server characteristics, making clients less suitable to make this decision. Information-Centric Networking (ICN) research solved a similar selection problem for static data retrieval by integrating content delivery as a native network feature. We address the selection problem for services by extending the ICN-principles for services. In this paper we present Queue and Latency, a network-driven service selection algorithm which maps user demand to service instances, taking into account both network and server metrics. To reduce the size of service router forwarding tables, we present a statistical method to approximate an optimal load distribution with minimized router state required. Simulation results show that our statistical routing approach approximates the average system response time of source-based routing with minimized state in forwarding tables.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network

  • Han, Longzhe;Maksymyuk, Taras;Bao, Xuecai;Zhao, Jia;Liu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4572-4586
    • /
    • 2019
  • Mobile Edge Computing (MEC) and Information-Centric Networking (ICN) are essential network architectures for the future Internet. The advantages of MEC and ICN such as computation and storage capabilities at the edge of the network, in-network caching and named-data communication paradigm can greatly improve the quality of video streaming applications. However, the packet loss in wireless network environments still affects the video streaming performance and the existing loss recovery approaches in ICN does not exploit the capabilities of MEC. This paper proposes a Deep Learning based Loss Recovery Mechanism (DL-LRM) for video streaming over MEC based ICN. Different with existing approaches, the Forward Error Correction (FEC) packets are generated at the edge of the network, which dramatically reduces the workload of core network and backhaul. By monitoring network states, our proposed DL-LRM controls the FEC request rate by deep reinforcement learning algorithm. Considering the characteristics of video streaming and MEC, in this paper we develop content caching detection and fast retransmission algorithm to effectively utilize resources of MEC. Experimental results demonstrate that the DL-LRM is able to adaptively adjust and control the FEC request rate and achieve better video quality than the existing approaches.

Content searching scheme using overlay network based interesting group in the Content Centric Network (컨텐츠 중심 네트워크에서 오버레이 네트워크를 이용한 관심 그룹 컨텐츠 검색 기법)

  • Haw, Rim;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.698-700
    • /
    • 2011
  • 현재 인터넷에서 발생하는 송수신자 사이의 중복 데이터 전송을 피하기 위해, 컨텐츠를 이용하여, 데이터를 전달하는 컨텐츠 중심의 네트워크(Contet-Centric Network)에 대한 연구가 활발하게 진행 중이다. 하지만, 현재 CCN 연구는 초기 단계로, 여러 가지 문제점에 직면해 있다. 본 논문에서는 CCN이 가지는 문제점 중 하나인, 컨텐츠 검색 시 발생하는 오버헤드를 줄이기 위한 컨텐츠 중심 네트워크에서 오버레이 네트워크를 이용한 컨텐츠 검색 기법을 제안한다.

Combining Ego-centric Network Analysis and Dynamic Citation Network Analysis to Topic Modeling for Characterizing Research Trends (자아 중심 네트워크 분석과 동적 인용 네트워크를 활용한 토픽모델링 기반 연구동향 분석에 관한 연구)

  • Yu, So-Young
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.1
    • /
    • pp.153-169
    • /
    • 2015
  • The combined approach of using ego-centric network analysis and dynamic citation network analysis for refining the result of LDA-based topic modeling was suggested and examined in this study. Tow datasets were constructed by collecting Web of Science bibliographic records of White LED and topic modeling was performed by setting a different number of topics on each dataset. The multi-assigned top keywords of each topic were re-assigned to one specific topic by applying an ego-centric network analysis algorithm. It was found that the topical cohesion of the result of topic modeling with the number of topic corresponding to the lowest value of perplexity to the dataset extracted by SPLC network analysis was the strongest with the best values of internal clustering evaluation indices. Furthermore, it demonstrates the possibility of developing the suggested approach as a method of multi-faceted research trend detection.

A Study on the Defense Information System Security Guideline for Network Centric Warfare (네트워크 중심전(NCW)하의 국방정보체계 제대별/기능별 정보보호지침 연구)

  • Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Information security is a critical issue for network centric warfare(NCW). This paper provides defense information system security guidelines for NCW, which is a result of the research through a group decision making process. The purpose of the research is to intended to help military officers establish information system security measures within their organization.

  • PDF

A Chunghae Unit Study on the NCO Effectiveness of Anti-piracy Operation (청해부대 대해적작전의 네트워크작전(NCO) 효과 사례연구)

  • Jung, Wan-Hee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.744-750
    • /
    • 2014
  • In this paper, I have measured NCO(Network Centric Operation) Effectiveness of Anti-piracy Operation at the Chunghae Unit. For quantitative analysis, Network Centric Operations Conceptual Framework(U.S Office of Force Transformation) is applied. In accordance with the framework, the Chunghae unit anti-piracy operation scenario is analysed. The scenario is devided with two case(only voice communication and networking). The element of analysis be composed of the organic information, networking, share-ability, and individual information. As a result of analysis, the individual information of first case(only voice) gets 0.59 points. The other side, second case (networking) gets 1 points. This means that NCO has effect on the Chunghae Unit's mission. In addition, I stated the tactics advantage of NCO related a fighting power.