Abstract: Cataloging traffic keen on precise network applications is vital for application-aware network
organization and it turn into more taxing because modern applications incomprehensible their network
behaviors. Whereas port number-based classifiers work merely for a little renowned application and signaturebased
classifiers are not significant to encrypted packet payloads, researchers are inclined to classify network
traffic rooted in behaviors scrutinized in network applications. In this document, a session level Flood
Cataloging (SLFC) approach is proposed to organize network Floods as a session, which encompasses of
Floods in the equal discussion. SLFC initially classifies flood into the analogous applications by packet size
distribution (PSD) and subsequently faction Floods as sessions by port locality. With PSD, each Flood is
distorted into a set of points in a two-Dimension space and the remoteness among all Flood and the
representatives of preselected applications are calculated. The Flood is predicted as the application having a
least distance. Meanwhile, port locality is accustomed to cluster Floods as sessions since an application often
uses successive port statistics surrounded by a session. If flood of a session are categorized into diverse
applications, an arbitration algorithm is invoked to make the improvement.
Keywords: Flood Cataloging; session grouping; session Cataloging; packet size distribution
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Itcm a real time internet traffic classifier monitorijcsit
The continual growth of high speed networks is a challenge for real-time network analysis systems. The
real time traffic classification is an issue for corporations and ISPs (Internet Service Providers). This work
presents the design and implementation of a real time flow-based network traffic classification system. The
classifier monitor acts as a pipeline consisting of three modules: packet capture and pre-processing, flow
reassembly, and classification with Machine Learning (ML). The modules are built as concurrent processes
with well defined data interfaces between them so that any module can be improved and updated
independently. In this pipeline, the flow reassembly function becomes the bottleneck of the performance. In
this implementation, was used a efficient method of reassembly which results in a average delivery delay of
0.49 seconds, approximately. For the classification module, the performances of the K-Nearest Neighbor
(KNN), C4.5 Decision Tree, Naive Bayes (NB), Flexible Naive Bayes (FNB) and AdaBoost Ensemble
Learning Algorithm are compared in order to validate our approach.
Analysis of service-oriented traffic classification with imperfect traffic cl...IOSR Journals
This document proposes a new approach to network traffic classification called service-oriented traffic classification (SOTC). SOTC relies on identifying network services running on specific IP addresses and ports, and then classifying any traffic directed to that IP/port as belonging to that service. This reduces computational requirements compared to other methods. The accuracy of SOTC depends on correctly identifying the services in the initial stage. Evaluating SOTC on real traffic data confirmed it can improve classification accuracy while meeting scalability needs for large networks.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
This document summarizes an analytical model for localized peer-to-peer (P2P) streaming systems that considers the impact of network address translation (NAT). It introduces theoretical boundaries for the number of peers that may be expelled from the system due to NAT incompatibility. It also presents a mathematical model for startup delay in P2P streaming that accounts for peers' NAT types. The document proposes a new neighbor selection algorithm that considers both autonomous system numbers and NAT types to improve connectivity while reducing transit traffic and startup delays.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
A Distributed Approach to Solving Overlay Mismatching ProblemZhenyun Zhuang
This document proposes an algorithm called Adaptive Connection Establishment (ACE) to address the topology mismatch problem between the logical overlay network and physical underlying network in unstructured peer-to-peer systems. ACE builds a minimum spanning tree among each source node and its neighbors within a certain diameter, optimizes connections not on the tree to reduce redundant traffic, while retaining search scope. It evaluates tradeoffs between topology optimization and information exchange overhead by changing the diameter. Simulation results show ACE can significantly reduce unnecessary P2P traffic by efficiently matching the overlay and physical network topologies.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Itcm a real time internet traffic classifier monitorijcsit
The continual growth of high speed networks is a challenge for real-time network analysis systems. The
real time traffic classification is an issue for corporations and ISPs (Internet Service Providers). This work
presents the design and implementation of a real time flow-based network traffic classification system. The
classifier monitor acts as a pipeline consisting of three modules: packet capture and pre-processing, flow
reassembly, and classification with Machine Learning (ML). The modules are built as concurrent processes
with well defined data interfaces between them so that any module can be improved and updated
independently. In this pipeline, the flow reassembly function becomes the bottleneck of the performance. In
this implementation, was used a efficient method of reassembly which results in a average delivery delay of
0.49 seconds, approximately. For the classification module, the performances of the K-Nearest Neighbor
(KNN), C4.5 Decision Tree, Naive Bayes (NB), Flexible Naive Bayes (FNB) and AdaBoost Ensemble
Learning Algorithm are compared in order to validate our approach.
Analysis of service-oriented traffic classification with imperfect traffic cl...IOSR Journals
This document proposes a new approach to network traffic classification called service-oriented traffic classification (SOTC). SOTC relies on identifying network services running on specific IP addresses and ports, and then classifying any traffic directed to that IP/port as belonging to that service. This reduces computational requirements compared to other methods. The accuracy of SOTC depends on correctly identifying the services in the initial stage. Evaluating SOTC on real traffic data confirmed it can improve classification accuracy while meeting scalability needs for large networks.
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
With the wide spread of WiFi hotspots, concentrated traffic workload on Smart Web (SW) can slow down
the network performance. This paper presents a congestion management strategy considering real time
activities in today’s smart web. With the SW context, cooperative packet recovery using resource
reservation procedure for TCP flows was adapted for mitigating packet losses. This is to maintain data
consistency between various access points of smart web hotspot. Using a real world scenario, it was
confirmed that generic TCP cannot handle traffic congestion in a SW hotspot network. With TCP in
scalable workload environments, continuous packet drops at the event of congestion remains obvious. This
is unacceptable for mission critical domains. An enhanced Link State Resource Reservation Protocol (LSRSVP)
which serves as dynamic feedback mechanism in smart web hotspots is presented. The contextual
behaviour was contrasted with the generic TCP model. For the LS-RSVP, a simulation experiment for TCP
connection between servers at the remote core layer and the access layer was carried out while using
selected benchmark metrics. From the results, under realistic workloads, a steady-state throughput
response was achieved by TCP LS-RSVP to about 3650Bits/secs compared with generic TCP plots in a
previous study. Considering network service availability, this was found to be dependent on fault-tolerance
of the hotspot network. From study, a high peak threshold of 0.009 (i.e. 90%) was observed. This shows
fairly acceptable service availability behaviour compared with the existing TCP schemes. For packet drop
effects, an analysis on the network behaviour with respect to the LS-RSVP yielded a drop response of about
0.000106 bits/sec which is much lower compared with the case with generic TCP with over 0.38 bits/sec.
The latency profile of average FTP download response was found to be 0.030secs, but with that of FTP
upload response, this yielded about 0.028 sec. The results from the study demonstrate efficiency and
optimality for realistic loads in Smart web contexts.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
This document summarizes an analytical model for localized peer-to-peer (P2P) streaming systems that considers the impact of network address translation (NAT). It introduces theoretical boundaries for the number of peers that may be expelled from the system due to NAT incompatibility. It also presents a mathematical model for startup delay in P2P streaming that accounts for peers' NAT types. The document proposes a new neighbor selection algorithm that considers both autonomous system numbers and NAT types to improve connectivity while reducing transit traffic and startup delays.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
This summary provides the key details from the document in 3 sentences:
The document proposes an efficient IoT-based sensor data analysis system in wireless sensor networks using cloud computing. It utilizes the Greedy Perimeter Stateless Routing (GPSR) algorithm to route sensor data to cloud storage. The system is evaluated through simulations analyzing parameters like packet delivery ratio, energy consumption, and delay.
A Distributed Approach to Solving Overlay Mismatching ProblemZhenyun Zhuang
This document proposes an algorithm called Adaptive Connection Establishment (ACE) to address the topology mismatch problem between the logical overlay network and physical underlying network in unstructured peer-to-peer systems. ACE builds a minimum spanning tree among each source node and its neighbors within a certain diameter, optimizes connections not on the tree to reduce redundant traffic, while retaining search scope. It evaluates tradeoffs between topology optimization and information exchange overhead by changing the diameter. Simulation results show ACE can significantly reduce unnecessary P2P traffic by efficiently matching the overlay and physical network topologies.
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksZhenyun Zhuang
This document proposes a new search mechanism called Hybrid Periodical Flooding (HPF) for unstructured peer-to-peer networks. HPF aims to reduce unnecessary traffic like blind flooding while also addressing the "partial coverage problem" of some statistics-based search mechanisms. It introduces the concept of Periodical Flooding (PF), which controls the number of neighbors a query is forwarded to based on the time-to-live value. This allows the forwarding behavior to change periodically over the query's lifetime. HPF then combines PF with weighted selection of neighbors based on multiple metrics to guide queries towards potentially relevant results while exploring more of the network.
This document summarizes a research paper that proposes a semi-supervised machine learning approach for network traffic classification using the DBSCAN clustering algorithm. The approach uses labeled and unlabeled network flow data to first cluster the data and then assign class labels to the clusters based on the labeled data. It aims to overcome limitations of traditional port-based and payload-based traffic classification techniques by using only flow statistics for classification. The researchers tested their approach on the NSL-KDD dataset and found that DBSCAN achieved better effectiveness and efficiency than other methods.
This document summarizes a research paper that proposes CafRep, an adaptive congestion control protocol for delay-tolerant networks (DTNs). CafRep uses implicit heuristics based on contact and resource congestion to offload traffic from congested parts of the network to less congested areas. It also adaptively replicates messages at lower rates in different parts of the network with non-uniform congestion levels. The paper evaluates CafRep across three real mobility traces and shows it outperforms state-of-the-art DTN forwarding algorithms in maintaining high delivery rates while keeping low delays and packet loss, especially in congested networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
This document summarizes a study on developing methods and algorithms for classifying data flows of cloud applications in the network of a virtual data center. The researchers developed a hybrid approach using data mining and machine learning methods to classify traffic flows in real-time. They created an algorithm for classifying and adaptively routing cloud application traffic flows, which was implemented as a module in the software-defined network controller. This solution aims to improve the efficiency of handling user requests to cloud applications and reduce response times.
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
Peer-to-Peer systems form logical overlay networks on top of the Internet. Essentially, peers randomly
choose logical neighbours without any knowledge about underlying physical topology. This may cause
inefficient communications among peers. This topology mismatch problem may result in poor
performance and scalability for Peer-to-Peer systems. A possible way to improve the performance of
Peer-to-Peer systems is the overlay network construction based on the knowledge of the physical network
topology. In this paper, we will propose the use of the “Record Route” and “Timestamp” options
supported in the IP protocol to explore the paths between peers. By the topology-aware peer selection,
our approach outperforms traditional P2P systems using random peer selection. Our approach only
incurs a low overhead and can be deployed easily in various P2P systems.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
This document discusses detecting and preventing IP spoofing attacks using software-defined networking (SDN). It begins with an abstract that outlines using SDN architecture to implement controls for IP spoofing through an algorithm to manage flows of unused IP addresses via the shortest path. It then discusses how IP spoofing works by creating packets with fake source IP addresses. The proposed approach uses SDN destination networking to associate source networks with cryptographic keys added to packets for authentication by routers. This provides incentives for internet service providers to implement spoofing prevention. Evaluation shows the proposed approach improves performance metrics like IP address usage, intrusion detection, secure data transmission, and synchronization compared to existing methods.
This paper targets at a comparative study on the through-puts in bits/ seconds, packet through-puts, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected in this paper is “DUAL STACK where you can and TUNNEL where you have to”.
This document discusses the need for network simulation tools to test telecom network components before they are deployed. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses the need to generate realistic traffic patterns and loads, model protocols and interfaces, and consider physical layer factors like RF path loss and power control mechanisms. The document provides details on using semi-Markovian models to generate traffic according to different states and distributions. It also outlines the overall architecture of a packet load generator tool to simulate network elements and evaluate their performance under different traffic scenarios.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniIOSR Journals
The present study was carried out to investigate the patterns of esterase isozymes extracted from the silk gland, haemolymph and mid gut of Eri silkworm (Samia Cynthia ricini). The qualitative analysis of esterases was carried out by 7.5% of native Polyacrylamide Gel Electrophoresis (PAGE). The inhibitor sensitivity of the enzymes towards paraxon, eserine and pCMB was used to classify the individual zones of esterases. Three zones of esterases were observed in different tissues of Eri silkworm. Silk gland esterases were classified as CHsp (Cholinesterase like enzymes) esterases. The haemolymph and mid gut esterases were classified into Esdp (Enzyme inhibited by paraxon and pCMB).
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...IOSR Journals
A quick and convenient method has been developed for the micro estimation of antihistamine drugs. 1-5 mg of sample is allowed to react with 10 ml of 0.02 M, N-bromosaccharin solution. Unconsumed reagent can be accurately titrated with 5 ml of 15% KI and 0.02N sodium thiosulphate solution using starch as indica-tor. SD and CV was calculated for reproducible and accurate result. The accuracy of the method is within + 1 % and possible course of reaction was suggested on the basis of stoichiometry as well as find reaction product.
The influence of Rolling process on the porosity and wear behavior of Spray-f...IOSR Journals
Spray forming, also called spray casting or spray deposition, is the inert gas atomization of a liquid metal stream into variously sized droplets. These droplets are interrupted by a substrate which collects and solidifies the droplets into coherent, near fully dense perform. The present work concerns with this techniques. This technology was applied to produce Al-6%Si-20%Pb alloys. The spray droplets were deposited over a copper substrate to achieve a disc shape perform. After spray deposition samples were rolled at room temperature on two high rolling mills and total porosity and wear characteristic of spray deposits were studies. The total porosity decreases with the increase in the percentage of reduction in thickness of the samples. Thickness of the samples in both middle and peripheral region. Wear testing of spray formed and rolled Al-Si-Pb alloy were investigated on a pin on disc type wear machine. Wear rate behavior with applied load and increase in percentage of reduction in thickness of samples was observed. Wear rate increased with increasing the load and decreased with increase in percentage of reduction in thickness of the sample.
Asif’s Equation of Charge Variation and Special RelativityIOSR Journals
The theory of special relativity plays an important role in the modern theory of classical electromagnetism. Considering deeply the effect of Special relativity in Electromagnetism, when a charge particle moves with high speed as comparable to the speed of light in vacuum tube or in space under influence of electromagnetic field, its mass varies under Lorentz transformation [1].The question arises that does its charge vary under Lorentz transformation? In this paper, Asif's equation of charge variation demonstrates the variation of electric charge under Lorentz transformation. The more sophisticated view of electromagnetism expressed by electromagnetic fields in moving inertial frame can be achieved by considering some relativistic effect including charge as well. One can easily achieve the mass-energy relation from Asif’s equation of charge variation as proved in this paper.
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical ContinuumIOSR Journals
This document summarizes a study on the relationship between effective leadership, employee work-life balance, and employee retention. It discusses how leadership styles can help balance employees' work and personal lives, leading to improved employee retention. The study presents different leadership theories and styles, and analyzes how they may impact work-life balance and retention. Specifically, it suggests that participative leadership approaches that balance task and employee orientation can foster understanding and job satisfaction, while autocratic styles focused solely on tasks may increase productivity but not retention. The document concludes that synchronized leadership considering employees' capabilities can help identify and retain talented staff.
The document describes a method for de-noising electrocardiogram (ECG) signals using empirical mode decomposition (EMD) combined with higher order statistics (HOS). EMD is used to decompose ECG signals into intrinsic mode functions (IMFs). Then, HOS measures including kurtosis and bispectrum are applied to the IMFs to identify and remove Gaussian noise components. The algorithm is tested on ECG signals with different levels of signal-to-noise ratio, and signal improvement is measured using SNR improvement and percent root mean square difference. Results show the method effectively de-noises ECG signals.
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksZhenyun Zhuang
This document proposes a new search mechanism called Hybrid Periodical Flooding (HPF) for unstructured peer-to-peer networks. HPF aims to reduce unnecessary traffic like blind flooding while also addressing the "partial coverage problem" of some statistics-based search mechanisms. It introduces the concept of Periodical Flooding (PF), which controls the number of neighbors a query is forwarded to based on the time-to-live value. This allows the forwarding behavior to change periodically over the query's lifetime. HPF then combines PF with weighted selection of neighbors based on multiple metrics to guide queries towards potentially relevant results while exploring more of the network.
This document summarizes a research paper that proposes a semi-supervised machine learning approach for network traffic classification using the DBSCAN clustering algorithm. The approach uses labeled and unlabeled network flow data to first cluster the data and then assign class labels to the clusters based on the labeled data. It aims to overcome limitations of traditional port-based and payload-based traffic classification techniques by using only flow statistics for classification. The researchers tested their approach on the NSL-KDD dataset and found that DBSCAN achieved better effectiveness and efficiency than other methods.
This document summarizes a research paper that proposes CafRep, an adaptive congestion control protocol for delay-tolerant networks (DTNs). CafRep uses implicit heuristics based on contact and resource congestion to offload traffic from congested parts of the network to less congested areas. It also adaptively replicates messages at lower rates in different parts of the network with non-uniform congestion levels. The paper evaluates CafRep across three real mobility traces and shows it outperforms state-of-the-art DTN forwarding algorithms in maintaining high delivery rates while keeping low delays and packet loss, especially in congested networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
This document summarizes a study on developing methods and algorithms for classifying data flows of cloud applications in the network of a virtual data center. The researchers developed a hybrid approach using data mining and machine learning methods to classify traffic flows in real-time. They created an algorithm for classifying and adaptively routing cloud application traffic flows, which was implemented as a module in the software-defined network controller. This solution aims to improve the efficiency of handling user requests to cloud applications and reduce response times.
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
Peer-to-Peer systems form logical overlay networks on top of the Internet. Essentially, peers randomly
choose logical neighbours without any knowledge about underlying physical topology. This may cause
inefficient communications among peers. This topology mismatch problem may result in poor
performance and scalability for Peer-to-Peer systems. A possible way to improve the performance of
Peer-to-Peer systems is the overlay network construction based on the knowledge of the physical network
topology. In this paper, we will propose the use of the “Record Route” and “Timestamp” options
supported in the IP protocol to explore the paths between peers. By the topology-aware peer selection,
our approach outperforms traditional P2P systems using random peer selection. Our approach only
incurs a low overhead and can be deployed easily in various P2P systems.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
This document discusses detecting and preventing IP spoofing attacks using software-defined networking (SDN). It begins with an abstract that outlines using SDN architecture to implement controls for IP spoofing through an algorithm to manage flows of unused IP addresses via the shortest path. It then discusses how IP spoofing works by creating packets with fake source IP addresses. The proposed approach uses SDN destination networking to associate source networks with cryptographic keys added to packets for authentication by routers. This provides incentives for internet service providers to implement spoofing prevention. Evaluation shows the proposed approach improves performance metrics like IP address usage, intrusion detection, secure data transmission, and synchronization compared to existing methods.
This paper targets at a comparative study on the through-puts in bits/ seconds, packet through-puts, delay in networks, response time in seconds of both IPv4 and IPv6. Hence, since the system proposes for co-existence of both IPv4 and IPv6, the solution projected in this paper is “DUAL STACK where you can and TUNNEL where you have to”.
This document discusses the need for network simulation tools to test telecom network components before they are deployed. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses the need to generate realistic traffic patterns and loads, model protocols and interfaces, and consider physical layer factors like RF path loss and power control mechanisms. The document provides details on using semi-Markovian models to generate traffic according to different states and distributions. It also outlines the overall architecture of a packet load generator tool to simulate network elements and evaluate their performance under different traffic scenarios.
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is
important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position,
attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniIOSR Journals
The present study was carried out to investigate the patterns of esterase isozymes extracted from the silk gland, haemolymph and mid gut of Eri silkworm (Samia Cynthia ricini). The qualitative analysis of esterases was carried out by 7.5% of native Polyacrylamide Gel Electrophoresis (PAGE). The inhibitor sensitivity of the enzymes towards paraxon, eserine and pCMB was used to classify the individual zones of esterases. Three zones of esterases were observed in different tissues of Eri silkworm. Silk gland esterases were classified as CHsp (Cholinesterase like enzymes) esterases. The haemolymph and mid gut esterases were classified into Esdp (Enzyme inhibited by paraxon and pCMB).
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...IOSR Journals
A quick and convenient method has been developed for the micro estimation of antihistamine drugs. 1-5 mg of sample is allowed to react with 10 ml of 0.02 M, N-bromosaccharin solution. Unconsumed reagent can be accurately titrated with 5 ml of 15% KI and 0.02N sodium thiosulphate solution using starch as indica-tor. SD and CV was calculated for reproducible and accurate result. The accuracy of the method is within + 1 % and possible course of reaction was suggested on the basis of stoichiometry as well as find reaction product.
The influence of Rolling process on the porosity and wear behavior of Spray-f...IOSR Journals
Spray forming, also called spray casting or spray deposition, is the inert gas atomization of a liquid metal stream into variously sized droplets. These droplets are interrupted by a substrate which collects and solidifies the droplets into coherent, near fully dense perform. The present work concerns with this techniques. This technology was applied to produce Al-6%Si-20%Pb alloys. The spray droplets were deposited over a copper substrate to achieve a disc shape perform. After spray deposition samples were rolled at room temperature on two high rolling mills and total porosity and wear characteristic of spray deposits were studies. The total porosity decreases with the increase in the percentage of reduction in thickness of the samples. Thickness of the samples in both middle and peripheral region. Wear testing of spray formed and rolled Al-Si-Pb alloy were investigated on a pin on disc type wear machine. Wear rate behavior with applied load and increase in percentage of reduction in thickness of samples was observed. Wear rate increased with increasing the load and decreased with increase in percentage of reduction in thickness of the sample.
Asif’s Equation of Charge Variation and Special RelativityIOSR Journals
The theory of special relativity plays an important role in the modern theory of classical electromagnetism. Considering deeply the effect of Special relativity in Electromagnetism, when a charge particle moves with high speed as comparable to the speed of light in vacuum tube or in space under influence of electromagnetic field, its mass varies under Lorentz transformation [1].The question arises that does its charge vary under Lorentz transformation? In this paper, Asif's equation of charge variation demonstrates the variation of electric charge under Lorentz transformation. The more sophisticated view of electromagnetism expressed by electromagnetic fields in moving inertial frame can be achieved by considering some relativistic effect including charge as well. One can easily achieve the mass-energy relation from Asif’s equation of charge variation as proved in this paper.
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical ContinuumIOSR Journals
This document summarizes a study on the relationship between effective leadership, employee work-life balance, and employee retention. It discusses how leadership styles can help balance employees' work and personal lives, leading to improved employee retention. The study presents different leadership theories and styles, and analyzes how they may impact work-life balance and retention. Specifically, it suggests that participative leadership approaches that balance task and employee orientation can foster understanding and job satisfaction, while autocratic styles focused solely on tasks may increase productivity but not retention. The document concludes that synchronized leadership considering employees' capabilities can help identify and retain talented staff.
The document describes a method for de-noising electrocardiogram (ECG) signals using empirical mode decomposition (EMD) combined with higher order statistics (HOS). EMD is used to decompose ECG signals into intrinsic mode functions (IMFs). Then, HOS measures including kurtosis and bispectrum are applied to the IMFs to identify and remove Gaussian noise components. The algorithm is tested on ECG signals with different levels of signal-to-noise ratio, and signal improvement is measured using SNR improvement and percent root mean square difference. Results show the method effectively de-noises ECG signals.
This document proposes a modified Newton's method for solving nonlinear equations that uses harmonic mean. It begins by reviewing Newton's method and some existing variants that use arithmetic mean or other integration rules to modify Newton's method and achieve cubic convergence without using second derivatives. It then presents the new Harmonic-Simpson-Newton method, which replaces the arithmetic mean in an existing Simpson Newton's method with harmonic mean. The method is proven to have cubic convergence. Numerical examples are provided to compare the efficiency of the new method to other cubic convergent methods.
Transient Three-dimensional Numerical Analysis of Forced Convection Flow and ...IOSR Journals
A three-dimensional transient numerical study of a constant property Newtonian fluid in curved pipe under laminar flow conditions is presented for a uniform wall temperature boundary condition. Numerical solutions were obtained using the control volume method described by Patankar for the range of. The working fluid was water. The transient flow pattern and the temperature distribution on the tube section were derived for different values of the Reynolds number. Graphical results for velocity and temperature are presented and analyzed. Results have shown that the maximum velocity in center of velocity profile increase with increasing of Reynolds number. In curved pipes, time averaged results exhibited Dean circulation and a strong velocity and temperature stratification in the radial direction. Flow and heat transfer were strongly asymmetric, with higher values near the outer pipe bend.
An Experimental Study on Strength Properties of Concrete When Cement Is Parti...IOSR Journals
This study investigated the strength properties of concrete when cement is partially replaced with two types of sugarcane bagasse ash (SBA): raw SBA (B.A.1) and SBA heated to 8500C (B.A.2). Cubes, cylinders and beams were tested after 28 days of curing. For B.A.1, maximum strengths were achieved at 5% replacement, while for B.A.2 maximum compressive strength was at 15% replacement, tensile at 20%, and flexural at 30% replacement. Results showed that concrete with B.A.2 generally had higher strengths than with B.A.1, indicating that heating SBA improves its pozzolanic
Efficacy Studies of Hepatoprotective Drug Isolated from Eclipta prostrata. L.IOSR Journals
In the commercial market, medicinal herbs are used as raw drugs, extracts or tinctures. Isolated
active constituents are used for applied research. Medicinal herbs are significant source of hepatoprotective
drugs, Eclipta prostrata. L. with active principle Wedelolactone is the prime focus. In the present study to derive
hepatoprotective drug, the herb E. prostrata was grown in the Periyar Maniammai College Campus, Vallam
and 1kg of the plant leaves were collected and shade dried. Dried and powdered maetria l of E. prostrata was
extracted with 80% ethanol. The active principle was isolated and identified by chromatographic technique. The
protective effect of E. prostrata on Carbon tetrachloride induced acute liver damage was also studied with male
wistar albino rats (180-230g). The protective effect was also undergone for histological studies.
Effect of Antioxidant status on liver following Atrazine exposure and its pro...IOSR Journals
The efficacy of Andrographis paniculata (AP) extract was studied on atrazine induced hepatic damage in rats. Ethanolic extract of AP (150mg/kg body weight) was found to protect the male wistar rats from hepato toxic action of atrazine as evidence by significant reduction in the level of lipid peroxidation and increased the antioxidant defense system activity in the atrazine intoxicated rats. However, AP treatment ameliorated the effects of atrazine suggesting it as potential antioxidant against atrazine induced oxidative stress.
Preliminary Phytochemical Screening and Antibacterial Activity on Stem Bark E...IOSR Journals
This document summarizes a study on the preliminary phytochemical screening and antibacterial activity of stem bark extracts of Ceiba pentandra. The stem bark was extracted using n-hexane, acetone, and ethanol. Phytochemical analysis found flavonoids, steroids, saponins, and triterpenes in the acetone extract. The extracts were tested for antibacterial activity against three bacteria. The acetone extract showed the highest activity, inhibiting all three bacteria at 300mg/ml. The phytochemicals identified, like flavonoids, saponins, and triterpenes have been shown to have antibacterial properties and may be responsible for the antibacterial activity observed.
The document analyzes soil samples collected around painted buildings in four local governments in Benue and Taraba States, Nigeria to determine heavy metal contamination levels. Testing found high levels of lead, cadmium, zinc and chromium contamination in the soils, with lead contamination being the highest. The order of contamination differed between locations but consistently included lead as the primary contaminant. The heavy metal levels pose health risks, especially to children, who are more vulnerable to negative impacts of heavy metal exposure through soil ingestion and dust inhalation near the painted buildings. Blood monitoring for heavy metals is recommended for individuals living near the painted structures.
Improving Sales in SME Using Internet MarketingIOSR Journals
Abstract : In Indonesia, SMEs are the backbone of the Indonesian economy. Number of SMEs until 2011 to
reach around 52 million. SMEs in Indonesia is very important for the economy because it accounts for 60% of
GDP and 97% of the workforce holds. But access is limited to financial institutions only 25% or 13 million
SMEs who have access to financial institutions. Indonesian government, SMEs, through the Department of
Cooperatives and SMEs, in each province or regency / city.
Although Small and Medium Enterprises (SMEs) is driving the nation's economy, but in reality many of
the problems SMEs are still entangled. The main thing to note is the ability of SMEs to access a wider market.
Because of the ability to change and adapt to a changing environment will determine the existence of small
businesses in the nation's economy. In the end, the existence of small businesses that have high competitiveness
will strengthen the nation's economy as a whole. Thus, in this study will use an appropriate technology tools
that can provide assistance in introducing products through internet and increase sales in each SME
This study uses a sample of students at the State University of Malang that can make a significant
contribution in the small and medium businesses that are being initiated by students.
Keywords: Small Medium Enterprise, Internet Marketing, Sales Improvement
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...IOSR Journals
During the history,different elements have been determined as influential factors affecting the
architecture in different areas. The historical events and political alterations as well as religious and
economical changes can directly lead to the architecture style. One of the historical countries with rich
architectural history that can be increasingly exposed to more alterations is Iran. In general the architecture
styles in Iran can be categorised in six groups. These groups can be divided in two periods before and after
Islam’s emergence in Iran. The “Parsi” and “Parti” architecture styles belong to the former period and
“Razi”, “Khorasani”, “Isfahani” and “Azari” were common in the latter period, after Islam. Such alterations
brought in a variety of architecture styles, in this country, due to theoretical alterations. Furthermore, some
novel architectural styles were resulted from a number of physical conditions which had also effects on the
theoretical architecture. The current research intends to put an emphasize on the alterations in materials used
in two historical periods of Iran, “Achaemenid” Empire (550–330 BCE) and The “Sassanid” Empire (224 CE
to 651 CE) resulting in the changes in Iranian architecture. It also aims to explore the differences and the
reasons of changes in the materials used for constructions and the influence that these changes had on the
architectural style in the above mentioned periods
Prevalence of Iron Deficiency Anaemia among Pregnant Women in Calabar, Cross ...IOSR Journals
Iron is a component of a number of proteins including haemoglobin, myoglobin, cytochromes and enzymes involved in redox reactions. Inadequate iron intake can lead to varying degrees of deficiency, from low iron stores to early iron deficiency and iron-deficiency anaemia and this is dangerous to both baby and mother. The objective of this study is to assess the prevalence of iron deficiency and iron deficiency anaemia among pregnant women in Calabar, Cross River State Nigeria. Seventy pregnant women within the age range of 15-45 years from University of Calabar Teaching Hospital were recruited as subjects in this study. The control consisted of fifty age-matched apparently healthy non-pregnant women . The tests that were carried out using standard method include include full blood count (packed cell volume, haemoglobin, mean cell haemoglobin, mean cell haemoglobin concentration and red cell count), serum iron, total iron binding capacity, transferrin saturation,serum ferritin and soluble transferrin recptor. The prevalence of anaemia and iron deficiency anaemia were found to be significantly higher (p<0.05)><0.01)><0.01) increased in pregnant than non-pregnant. It was also shown that pregnant women in their third trimesters and multigravidae had the highest prevalence of iron deficiency and iron deficiency anaemia while pregnant women in their second trimester had the highest prevalence of anaemia. In conclusion the study has shown that the prevalence of anaemia, iron deficiency and iron deficiency anaemia among pregnant women in the studied area were still high and can be considered public health problem.
Post Endodontic Restoration: Are You Serious?IOSR Journals
After root canal obturation of sound posterior teeth, dentists are always in hurry of giving full
crown. They are not serious in giving proper post endodontic restoration which results in fracture of tooth or
restoration, if patient delays the full crown treatment. The inherent causes of failures are rarely evaluated.
Thus, it was the purpose of this study to analyze the opinion of practicing dentist and after 24 months of clinical
observation to present a logical approach to this subject as the final success of endodontic treatment is depend
on the proper and timely coronal restoration.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Sensitivity Analysis of Process Parameters for Polyurethane Based Panel Air F...IOSR Journals
This document summarizes research conducted on the sensitivity of process parameters for polyurethane-based panel air filters. Experiments varied parameters like nucleation, mixing speed, mold temperature, mixing ratio, and analyzed their effects on density, hardness, and rise time. Increasing nucleation and mold temperature decreased density and hardness. Higher mixing speeds had little effect with nucleation but decreased density without. Density decreased and hardness was stable at standard mixing ratios but varied above and below. The goal is to define optimized parameter settings to minimize defects for high productivity and yield.
Automated Traffic Classification And Application Identification Using Machine...Jennifer Daniel
This document proposes a novel method for classifying network traffic flows using unsupervised machine learning. Statistical flow characteristics are used to automatically classify flows without relying on port numbers or protocol decoding. The method is evaluated using real network traffic traces, with the goal of optimizing classification accuracy while minimizing computational resources. Feature selection is used to determine an optimal set of statistical flow attributes for classification. The method provides benefits for network management, security, and traffic engineering.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...IOSR Journals
This document discusses reducing false positives and false negatives in intrusion detection for zigbee wireless networks. It proposes a new approach called service-oriented traffic classification (SOTC) that uses information about previously discovered network services to classify traffic flows. The key advantages of SOTC are robustness, accuracy, and low computational requirements compared to traditional port-based and payload-based classification methods. The document provides background on related work, describes how SOTC works, and discusses some implementation considerations to make it effective in practice.
This paper presents a new approach called service-oriented traffic classification (SOTC) to reduce false positives and false negatives from network traffic classification. SOTC exploits information about previously discovered services in the network to classify traffic flows. The key advantages of SOTC are improved accuracy, limited computational requirements, reduced memory needs, and the ability to use any classifier in the initial service identification stage. Currently, most network classification algorithms fall into payload-based or behavioral categories, both of which have limitations like sensitivity to packet loss, difficulty in signature creation, inability to handle encryption, and high computational demands. This paper aims to address some of these limitations with the proposed SOTC approach.
This document discusses the need for network simulation tools to test telecom network components before deployment. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses modeling internet traffic and using semi-Markovian models to generate traffic. It also covers the importance of considering physical layer factors like RF path loss and mechanisms like power control when simulating UMTS networks. The document provides details on the algorithms and architecture needed for a simulation tool to generate traffic according to specified models and evaluate network performance and capacity.
Talhunt is a leader in assisting and executing IEEE Engineering projects to Engineering students - run by young and dynamic IT entrepreneurs. Our primary motto is to help Engineering graduates in IT and Computer science department to implement their final year project with first-class technical and academic assistance.
Project assistance is provided by 15+ years experienced IT Professionals. Over 100+ IEEE 2015 and 200+ yester year IEEE project titles are available with us. Projects are based on Software Development Life-Cycle (SDLC) model.
This document provides summaries of 15 networking projects from TTA including the project code, title, description, and reference. The projects cover topics like delay analysis of opportunistic spectrum access MAC protocols, load balancing for network traffic measurement, key exchange protocols for parallel network file systems, anomaly detection in intrusion detection systems, and energy efficient group key agreement for wireless networks. The document provides contact information at the end for obtaining full project papers.
Database techniques for resilient network monitoring and inspectionTELKOMNIKA JOURNAL
Network connection logs have long been recognized as integral to proper network security, maintenance, and performance management. This paper provides a development of distributed systems and write optimized databases: However, even a somewhat sizable network will generate large amounts of logs at very high rates. This paper explains why many storage methods are insufficient for providing real-time analysis on sizable datasets and examines database techniques attempt to address this challenge. We argue that sufficient methods include distributing storage, computation, and write optimized datastructures (WOD). Diventi, a project developed by Sandia National Laboratories, is here used to evaluate the potential of WODs to manage large datasets of network connection logs. It can ingest billions of connection logs at rates over 100,000 events per second while allowing most queries to complete in under one second. Storage and computation distribution are then evaluated using Elastic-search, an open-source distributed search and analytics engine. Then, to provide an example application of these databases, we develop a simple analytic which collects statistical information and classifies IP addresses based upon behavior. Finally, we examine the results of running the proposed analytic in real-time upon broconn (now Zeek) flow data collected by Diventi at IEEE/ACM Supercomputing 2019.
Comparison of Open-Source Data Stream Processing Engines: Spark Streaming, Fl...Darshan Gorasiya
This document compares three open-source data stream processing engines: Apache Spark Streaming, Apache Flink, and Apache Storm. It discusses their processing models, characteristics such as fault tolerance and state management, and performance in terms of latency and throughput. Previous benchmarking studies are also summarized that have evaluated these engines, though the document notes more work is needed for cross-industry benchmarking.
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET Journal
This document presents a comparative study on embedded feature selection techniques for internet traffic classification. It discusses using machine learning and deep learning algorithms like Naive Bayes, Random Forest, Support Vector Machine (SVM), and Multilayer Perceptron (MLP) on network traffic datasets to classify traffic. The performance of these techniques is analyzed in terms of error metrics, with the results showing that the proposed deep learning approach using MLP outperforms existing machine learning techniques. The document also provides background on internet traffic classification and related work applying techniques like K-means clustering, C5.0 decision trees, and SVM to classify network application traffic based on flow features.
In protocol tunnelling, one application protocol is encapsulated within another carrier protocol possibly to circumvent firewall policy. Application-layer tunnels are a significant security and resource abuse threat for networks. The existing techniques for identification of applications running across the network, for example packet data analysis techniques are not always successful, especially for applications which use encrypted tunnels. This work describes a statistical approach to detect applications which are running using application layer tunnels. A fast machine learning algorithm, k-Nearest Neighbours is demonstrated to be able to perform the detection of tunnelled applications based on statistical features obtained from the network applications running inside protocol tunnels. The scalability of the mechanism is also investigated.
This paper presents a technique for end hosts to detect if intermediaries like routers are applying compression to traffic flows without the end hosts' knowledge. The technique is non-intrusive and only uses packet inter-arrival times for detection, requiring no changes to or cooperation from intermediaries. Simulations and internet experiments show the approach can accurately detect compression applied by intermediaries. The technique could help end hosts optimize their own use of compression resources by avoiding redundant compression when intermediaries are already compressing traffic.
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We
call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an
infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network.
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
The document proposes a solution to address network performance issues when cloud traffic increases exponentially in the future. The key aspects of the solution are:
1) Using the DS field in the IP header to identify and classify cloud traffic separately from other internet traffic.
2) Employing QoS protocols like RSVP to reserve network resources and MPLS to label and prioritize cloud traffic.
3) Implementing MPLS/IP header compression to efficiently transmit cloud traffic over existing networks.
4) Deploying high-speed edge routers to improve network conditions for cloud traffic.
5) Monitoring cloud traffic flows using meters to aid better network management for cloud services.
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We
call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an
infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network.
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
Cloud computing is generally believed to the most gifted technological revolution in computing and it will soon become an industry standard. It is believed that cloud will replace the traditional office setup. However a big question mark exists over the network performance when the cloud traffic explodes. We call it “explosion” as in future we know that various cloud services replacing desktop computing will be accessed via cloud and the traffic increases exponentially. This journal aims at addressing some of these doubts better called “dangers” about the network performance, when cloud becomes a standard globally and providing a comprehensive solution to those problems. Our study concentrates on, that despite of offering better round-trip times and throughputs, cloud appears to consistently lose large amounts of the data that it is required to send to the clients. In this journal, we give a concise survey on the research efforts in this area. Our survey findings show that the networking research community has converged to the common understanding that a measurement infrastructure is insufficient for the optimal operation and future growth of the cloud. Despite many proposals on building an network measurement infrastructure from the research community, we believe that it will not be in the near future for such an infrastructure to be fully deployed and operational, due to both the scale and the complexity of the network. We also suggest a set of technologies to identify and manage cloud traffic using IP header DS field, QoS protocols, MPLS/IP Header Compression, Use of high speed edge routers and cloud traffic flow measurement. In the solution DS Field of IP header will be used to recognize the cloud traffic separately, QOS protocols provide the cloud traffic, the type of QOS it requires by allocating resources and marking cloud traffic identification. Further the MPLS/IP Header Compression is performed so that the traffic can pass through the existing network efficiently and speedily. The solution also suggests deployment of high speed edge routers to improve network conditions and finally it suggest to measure the traffic flow using meters for better cloud network management. Our solutions assume that cloud is being assessed via basic public network.
Reactive Stream Processing for Data-centric Publish/SubscribeSumant Tambe
The document discusses the Industrial Internet of Things (IIoT) and key challenges in developing a dataflow programming model and middleware for IIoT systems. It notes that IIoT systems involve large-scale distributed data publishing and processing streams in a parallel manner. Existing pub-sub middleware like DDS can handle data distribution but lack support for composable local data processing. The document proposes combining DDS with reactive programming using Rx.NET to provide a unified dataflow model for both local processing and distribution.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators cannot manage the large number of alerts occurring per second, in particular since most alerts are false positives. Hence, an emerging track of security research has focused on alert correlation to better identify true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis (MONA). This method builds on data correlation to derive network dependencies and manage security events by linking incoming alerts to network dependencies.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Similar to Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Session Grouping (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Session Grouping
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 5 (Nov. - Dec. 2013), PP 45-49
www.iosrjournals.org
www.iosrjournals.org 45 | Page
Cataloging Of Sessions in Genuine Traffic by Packet Size
Distribution and Session Grouping
Ms.Prajakta Suhasrao Kale, Prof. Sonali M.Tidke
Department Of Computer Science, SYCET, Aurangabad,India
HOD Department Of Computer Science, SYCET, Aurangabad, India
Abstract: Cataloging traffic keen on precise network applications is vital for application-aware network
organization and it turn into more taxing because modern applications incomprehensible their network
behaviors. Whereas port number-based classifiers work merely for a little renowned application and signature-
based classifiers are not significant to encrypted packet payloads, researchers are inclined to classify network
traffic rooted in behaviors scrutinized in network applications. In this document, a session level Flood
Cataloging (SLFC) approach is proposed to organize network Floods as a session, which encompasses of
Floods in the equal discussion. SLFC initially classifies flood into the analogous applications by packet size
distribution (PSD) and subsequently faction Floods as sessions by port locality. With PSD, each Flood is
distorted into a set of points in a two-Dimension space and the remoteness among all Flood and the
representatives of preselected applications are calculated. The Flood is predicted as the application having a
least distance. Meanwhile, port locality is accustomed to cluster Floods as sessions since an application often
uses successive port statistics surrounded by a session. If flood of a session are categorized into diverse
applications, an arbitration algorithm is invoked to make the improvement.
Keywords: Flood Cataloging; session grouping; session Cataloging; packet size distribution
I. Introduction
Cataloging traffic into precise network applications is necessary for application-aware network
administration. Consistent with the Cataloging results, a venture or service provider can relate a variety of
policies to defend network resources or impose association strategies. Correct traffic Cataloging is therefore the
foundation in application aware network management. Nevertheless, it is not inconsequential to properly
categorize the traffic hooked on the applications according to their varied characteristics and behaviors because
traffic can be encrypted, relayed by supplementary protocols, or disassembled .A number of approaches have
been proposed to recognize and to organize the traffic into the applications .on the other hand, traditional
Cataloging techniques may not work well for up-and-coming application because they typically depends on
either port numbers [1] or payload signatures [3]. To sidestep policies imposed by network administrators,
contemporary applications employ numerous diverse techniques to make their network traffic imperceptible to
network monitors. Widespread communication protocols, akin to HTTP, are often used as secret channels to
relay other types of traffic. Cataloging traffic into applications becomes more demanding because of more
complicated application behaviors. The connection behavior of one application perhaps similar to that of another
application. For example, the behavior of an HTTP file transfer may look similar to that of an FTP one. In
addition, not all Floods generated in one session do the similar thing. For example, a Bit Torrent client may
simultaneously establish several Floods to recover the list of servers, look up resources, check peer status, and
transfer files. Therefore, to have a better Cataloging result, we propose a loom, namely session level Flood
Cataloging (SLFC), to organize network floods as sessions and hence obtain a absolute depiction of application
behaviors. SLFC contains two parts, i.e., Flood Cataloging and Flood grouping. The former classifies Floods
into applications via packet size distribution (PSD) and the concluding groups connected Floods as sessions by
port locality. A Flood is recognized by the five-tuples information, which includes source IP, destination IP,
source port, destination port, and protocol. While the PSD of one Flood is resolute, it is evaluated with each
representative of all pre-selected applications to make a decision which application it should be .Since the
information of packet payloads is not required, this process works even if the packet payloads are encrypted. In
adding up, Floods will be assembly as sessions by examination port locality because operating systems
frequently assign consecutive port numbers for an application to setup connections with remote hosts. If the
source and destination IP addresses of two Floods are the same and their port numbers are successive, the two
Floods may belong to the same session of an application. If Floods of a session are classified as diverse
applications, an arbitration algorithm based on majority votes is raised to make the alteration. Evaluations and
online yardsticks show that SLFC is able to acquire exact outcome and make decision.
This paper is a that provides more detailed discussion about false-positive and false-negative analysis.
False Positive: An event signaling an IDS to produce an alarm when no attack has taken place
2. Cataloging Of Sessions In Genuine Traffic By Packet Size Distribution And Session Grouping
www.iosrjournals.org 46 | Page
False Negative: A failure of IDS to detect an actual attack.
II. Related Work
Cataloging network Floods by means of statistical properties of network traffic is not new. Such
methods suppose that the statistical properties of traffic are sole for dissimilar applications and can be used to
differentiate applications from every other. The statistical features frequently used, for example, contain Flood
duration, packet inter-arrival time, separate packet size, bytes transferred, number of packets, and etc.
Nevertheless, previous job only focused on the peculiarities of network traffic classes or applications [7, 8].
Henceforth, supplementary works [9-13] endeavored to organize completely network traffic based on statistical
features. They generally consist of two parts: model building and Cataloging. A replica is primary built via
statistical attributes of Floods by erudition the intrinsic structural patterns of datasets and the mock-up is then
used to categories other novel hidden network traffic. BLINC, projected by Karagiannis et al. [14], introduces
another type of cataloging loom based on the analysis of host behavior. It acquaintances Internet host behavior
patterns with one or more applications, and refines the association by heuristics and behavior stratification.
Several substitute proposals [15] exploit machine learning (ML) techniques to network traffic, which are known
as anthology of influential techniques for knowledge discovery and data mining domains. Initially they employ
alike statistical features, akin to abovementioned mechanism, to build models however then pertain meticulous
ML techniques, contradictory with aforementioned works, to pigeonhole network traffic.
III. Features Utilized By SLFC
In this segment, the two major features utilized by SLFC, i.e., packet size distribution (PSD) and port
locality are introduced. Our annotations demonstrate that application behaviors can be discriminated with their
PSDs, undertone that Floods of the equal application have analogous PSDs, but Floods of unlike applications
have sundry PSDs. Our observations also give you an idea about that the port numbers used by Floods
belonging to the corresponding application session are frequently adjoining. In this document, a session is
defined as a set of Floods that are engendering in the matching banter. For client-server applications, a session is
defined as a solitary Flood documented between a client and a server. For peer-to peer applications, a session is
definite since plentiful Floods produced deliberately in a peer-to-peer commerce treaty.
Packet Size Distribution (PSD)
Originating every its Floods the PSD of a network application can be acquired. The traces of entity
application behavior are imprisoned in an outlawed upbringing. The key advantage of this system is that each
and every one unruffled traffic can be palpably perceptible to be in the correct place to its parent application.
Each pre-selected application is put into practice in turn, and the traffic frogspawn is recorded when it passes
through the network crossing point. The names of the preselected applications and interconnected
application/protocol category applications and allied application/protocol category used in this work are Bit
Torrent (P2P), eMule (P2P), Skype (P2P), HTTP (HTTP), POP3 (POP3), SMTP (SMTP), FTP(FTP), Shout cast
(Streaming) and PPLive (P2P streaming). Dissimilar applications formulate excessive persistent packet sizes
gratitude to distinct outfitted supplies.
Port Locality
We observed that port facts used by network Floods of the indistinguishable session habitually have the
chattels of spatial region, i.e., the port numbers are unremitting or terribly close to each other. Even though port
numbers perhaps chaotically designated, operating systems often allocate succeeding port numbers when an
application has to setup numerous connections with isolated hosts. This occurrence is productive since when a
flood is classified as one exact session, the port numbers can be used to correlate Floods the same session.
Although port locality is useful, various operating systems do not pursue the prevalent ruling and thus it is not
for perpetuity able to correlate Floods as a session by means of port locality. In this crate, an introverted Flood is
treated as a session.
IV. THE SLFC Algorithm
SLFC sprints in two segments: an offline application representatives training phase and an online
session Cataloging phase. Fig. 1 shows the overview of the projected loom. The left side block symbolizes the
stepladder of the training stage and the right side block shows the online classifier, which includes three
modules, Flood Cataloging, session grouping, and application arbitration. The target of the offline training
phase is to settle on out application legislative body, which should be unique to or dissimilar from
supplementary applications, to be the basis of comparison. This training phase first accumulate a set of traffic
traces and tries to take out the legislature from the traces. There are two traditions that can be used to pull
together application traffic: (1) capture all traffic generated while some application is executing and manually
3. Cataloging Of Sessions In Genuine Traffic By Packet Size Distribution And Session Grouping
www.iosrjournals.org 47 | Page
filter out the part of traffic unrelated to the application; (2) only capture the part of traffic related to the
application. The more antiseptic application traffic is collected, the supplementary just right the arrangement
results can be predictable to obtain because more long-winded application profiles can be reserved. For the
second method, a traffic filter can be used to carry this traffic collection succession, which can routinely outlaw
or brainteaser out immaterial application traffic. In provisos of fresh applications, the configurations of the first
prevalence can be saved and a traffic filter can use them to lug out and treat the application traffic after filtering
out transfer patterns of other iniquitous applications. The goal of these two methods is both to evidently blotch
the allied traffic. In array to stay behind admirable cataloging, the application legislature should be also kept
particular and up-to-date. The price tag of representative promote process is acceptable because an habitual
loom like the second technique as talk about above can be appeal to figure other novel council of strange
applications or applications that are amended recurrently. The online session cataloging stage primary extracts
the five-tuple header information (source IP, source port, destination IP, destination port, protocol) and the
packet size distribution from all incoming Floods. The packet size distribution of a Flood is distorted to a two-
dimension space point. Subsequently, the Flood Cataloging module judge against the Floods with application
representatives and classifies it into the application having a minimum distance. For the moment, the session
grouping module attempts to cluster Floods as a session based on port locality. Until now, each Flood is
classified as a convinced application and port-adjacent Floods are grouped into the identical session. If two or
more Floods of a session are classified as different applications, the application arbitration module is
summoned to solve the conflict and make the rectification.
Each unit of SLFC as talk about above is convoluted in ensuing subsections. Subsection A and B explain the
details of the offline training segment and the online session Cataloging phase is construed through subsection C
to E.
A. Flood representation – dominating sizes (DS) and dominating sizes’ proportion (DSP)
Whilst contribution into SLFC, succeeding IP packets having the same five-tuple are composed as a Flood.
However, exhaustively remembering all packets’ sizes of a Flood not only consumes a lot of memory spaces but
also is impracticable. To conquer this impenetrability, only the dominating packets’ sizes of a Flood are kept as
the trait of a Flood. DS vector. The application parliament training phase aims to find out the representatives of
pre-selected applications. For this purpose, plenty of traces for an explicit application are composed and the
PSD features of Floods of an application are then extracted. Below there are four dissimilar methods to compute
the representatives for an application. The application representatives working out phase aims to find out the
council of pre-selected applications. For this purpose, lots of traces for an unambiguous application Floods of an
application are then extorted. Below there are four diverse techniques to calculate the representatives for an
application.
1. Method1 (M1) – Direct Average Processing: All Floods belong to single application are used to work
out the representative by using the RA algorithm. The result of this method is a single representative for the
application.
2. Method2 (M2) – Manual Traffic Correction: an application may have manifold diverse variety of
performances. To precisely seize the actions contour of an application, this method employs a handbook pre-
Accumulate traffic traces
of some Application
Flood
Concluding recurring
Of App.
Flood
Calculate depiction of
Application
Application
Application Arbitration
Surpass real World Traffic
Application Application
Flood cataloging Session Grouping
FloodFlood
Phase I: Offline Training Phase II: Online Session Cataloging
4. Cataloging Of Sessions In Genuine Traffic By Packet Size Distribution And Session Grouping
www.iosrjournals.org 48 | Page
processing stage to classify Floods by behaviors. For example, all eMule Floods can be classified physically into
three behaviors, i.e., linking to pre-configured servers to obtain server and file lists, communicating with peers,
and exchanging files.In this case, the representative of the eMule application is self-possessed of three
representatives; each is obtained by applying RA algorithms for Floods belong to an individual group.
Therefore, with M2, an application representative may be composed of multiple.
3. Method3 (M3) – Ignoring Common Packets: The process is essentially the same as M1. Yet, to put off
the vagueness brought by packet size similarities, a preprocessing step is done to riddle out common packet
sizes of dissimilar network applications. There exists a tradeoff between the numbers of ordinary packet sizes
desirable to sieve out and the last Cataloging accurateness rates. The supplementary frequent packet sizes are
detached, the higher the separate organization accuracy rate for each application may be achieved. However, the
common packet sizes filtered out eventually can not be recognized. For example, eMule and Skype both use
some common size of packets, such as 46 bytes UDP packets, to converse with peers. The representative finally
generated by M3 is also a single one for each application.
4. Method4 (M4) – Automatic Clustering: This method is alike to M2, i.e., produce behavior-based
application representatives. Rather than federating Floods of comparable behaviors by hand, it tries to group
Floods mechanically. We observed that Floods of the same performance should have comparable PSD features.
Hence, a tolerant Threshold (TT) is defined to tell whether or not two Floods should be grouped collectively. If
the PSD space flanked by two Floods is less than TT, they are grouped jointly. Otherwise, they are classified
into two different groups. Afterward, the RA algorithm is applied to apiece group and obtain the equivalent
group-representatives. The final delegate for the application is unruffled of all group-representatives. Using
diverse application representatives likely cause completely different application inferences. Readers should also
note that the projected method may engender countless representatives for an application since an application
can have various implementations and run on different workstations also they can choose the most suitable
representatives against those inferences.
B. Application representatives
In tidy to gauge the grade of resemblance for two dissimilar Floods, a distance metric is defined.
Nevertheless, cautious treatment must be in use when the lengths of DS vectors are not the same. Here the
values of the entries in DS vectors are not additional normalized since each entry in DSP vector is paired with
the equivalent one entry in group-representatives depending on the number of the application behaviors.
C. Flood Cataloging
Every incoming Flood computes the entity similarity distance between it and all sets of the application
representatives found by the offline training phase according to the metric Equation If an application has added
than one representative, the final distance between the Flood and the application is the add together of all
resemblance distances between the Flood and each representative. After all similarity distances are obtained, the
incoming Flood decides the application having the minimum likeness distance to be the one it should belong to.
D. Session grouping
To help and speed up session identification, a data structure, namely port association table (PAT), is
used to stock up the port locality information. Once a Flood is recognized as a session of a specific application,
its five-tuple header information is extracted and disjointedly recorded in the PAT as (source IP, source port,
session ID) and (destination IP, destination port, session ID), where session ID is a counter starting from zero.
For a given Flood, if its source IP address srcIP is already stored in the PAT and the source port number Q is
adjacent to the port number P of an existing entry (srcIP, P, SID) in the PAT, the Flood is also treated as a Flood
of session SID and added into the PAT as (srcIP, Q, SID). The same rule can be applied to destination IP
addresses. Although port locality is measured, it is not first and foremost used for application Cataloging; it
should be regarded as finding partnership among marvelous Floods. The leading part used to categorize
applications is to evaluate the traffic uniqueness of unknown Floods with those of application representatives
Flood by Flood.
V. Conclusion
This document put forward SLFC, which jogs in two phases: an offline application representatives
training phase and an online session Cataloging phase. The offline training phase employs a set of traffic traces
to discover application representatives, which are erects from PSDs of pre-selected applications. The online
session Cataloging phase is done in three steps: (1) Take out the PSD feature of a give Flood and evaluate it
with those PSD features of application representatives to make the Cataloging; (2) Run the session grouping
algorithm to set port-adjacent network Floods into the identical session; and (3) Apply the application arbitration
algorithm to accurate Flood Cataloging if two or more Floods of a session are classified as dissimilar
5. Cataloging Of Sessions In Genuine Traffic By Packet Size Distribution And Session Grouping
www.iosrjournals.org 49 | Page
applications. SLFC are able to make traffic Cataloging without investigative packet payloads. With a
subservient application representatives’ database, the classifier can successfully recognize the application that a
Flood belongs to. The projected solution achieves elevated accurateness rates and low error rates. When the
proposed solution is used as an online classifier, decisions can be made by checking at most 300 packets for
long-lasting Floods and running at a throughput exceeding 400 Mbps on commodity hardware.
References
[1] C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, C. Diot, “Packet-level traffic measurements
from the sprint IP backbone” in IEEE Network, November 2003.
[2] T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, M. Faloutsos, “Is P2P dying or just hiding?” in IEEE GLOBECOM ,
November 2004
[3] T. Karagiannis, A. Broido, M. Faloutsos, K.C. Claffy, K.C.” Transport layer Identification of P2P traffic” in Internet Measurement
Conference (IMC), October 2004.
[4] S. Sen, O. Spatscheck, and D. Wang, “Accurate, scalable in network identification of P2P traffic using application signatures,” in
WWW2004, May 2004.
[5] M. Roesch. “SNORT: Lightweight intrusion detection for networks” in LISA ’99: Proceedings of the 13th
USENIX Conference on
Systems Administration, Nov. 1999.
[6] C.N. Lu, C.Y. Huang, Y.D. Lin, Y.C. Lai, “Session Level Flood Cataloging by Packet Size Distribution and Session Grouping,”
Computer Networks, In Press, 2011.
[7] V. Paxson. “Empirically derived analytic models of wide-area TCP connections.” in IEEE/ACM Transactions on Networking, Aug
1994.
[8] V. Paxson and S. Floyd. “Wide area traffic: the failure of Poisson modeling.” in IEEE/ACM Transactions on Networking, June
1995.
[9] C. Dewes, A. Wichmann, and A. Feldmann, “An analysis of internet chat systems,” in IMC 2003.
[10] M. Roughan, S. Sen, O. Spatscheck, and N. Duffield. “Class-of-service mapping for Quos: A Statistical signature-based approach to
IP traffic Cataloging”, in IMC 2004.
[11] D. M. Divakaran, H. A. Murthy, T. A. Gonsalves, “Traffic Modeling and Cataloging Using Packet Train Length and Packet Train
Size”, in IPOM 2006.
[12] L. Bernaille, R. Teixeira, I. Akodjenou, A. Soule, K. Salamatian, “Traffic Cataloging on the fly”, in ACM SIGCOMM Computer
Communication Review2006.
[13] Y.D. Lin, C.N. Lu, Y.C. Lai, W.H. Peng, P.C. Lin, “Application Cataloging using packet size distribution and port association,” in
Journal of Network and Computer Applications, March 2009.
[14] Karagiannis T, Papagiannaki K, Faloutsos M., “BLINC: multilevel traffic Cataloging in the dark,” in ACM SIGCOMM CCR, Oct.
2005
[15] T.T. Nguyen, G. Armitage, “A survey of techniques for Internet traffic Cataloging using machine learning”, in IEEE
Communications Surveys and Tutorials, 2008
[16] J. Frank, “Machine learning and intrusion detection: current and future directions,” in Proceedings of the National 17th
Computer
Security Conference, 1994.