SlideShare a Scribd company logo
1 of 15
Reduction of Monitoring Records
On Software Defined Network
Luz Angela Aristizábal Q
Nicolás Toro G
Universidad Nacional de Colombia
International Journal of Computer Science & Information
Technology (IJCSIT)
(INSPEC INDEXING)
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
Index
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
0. Contextualization (Why ? ): Software Define Network
1. Statistics on SDN.
2. Characterization
3. Anormaly Detection Method
4. Results
5. Conclusions
Why ?
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
https://es.123rf.com/imagenes-de-
archivo/datos_personales.html?sti=mbcmeau2h8mh1xg3ui|&mediapopup=28502403
Reducing
And
Intelligibility
Where was the origin?
What does we want achive ?
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Software Defined Networks
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Statistical Messages
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Statistics Request message
Statistics Reply message
• Received packets
• Received Bytes
• Duration
• Sended Packets
• Sended Bytes.
Characterization: Wavelet Transform
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Parameters
TWD
Anomaly
Detection
Contrast
Statistical Information
Phases
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Parameter (i)
2048 samples
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Anomaly Detection
Gaussian model
e
x
xp 




2
)(
2
1
),;( 2
2
2



 

m
j
i
ji xm 1
1
  

m
ji
i
i
jm x1
2
)(
21

Results
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
0 50 100 150 200 250
8
10
12
14
16
overlapping. Original Register (blue) .vs. Sythesized register (red)
TransmitedBytes(MB)
i
0 50 100 150 200 250
-5
0
5
10
15
Original Register .vs. Sythesized register
TransmitedBytes(MB)
i
Original Synthetized register
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Evaluation
Reduced register
Anomaly Detect
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Conclusions
• The algorithm of reduction has a compression factor of at least a
50%. It retains the atypical behaviour of statistics data
generated by the Openflow switch, which reduces the execution
time of an anomaly detector.
• The results of this work leave a door open for the analysis of the
effectiveness of other wavelet bases in the reduction of the
length of the statistical parameters in Software Defined
Networks. Since this work only used the "daubechies" wavelet,
evaluating other base wavelets could lead to a better reduction
rate.
References (1)
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
Ibidunmoye, Olumuyiwa, Hernandez R Francisco, Elmrot Erick .(2015) “Performance
Anomaly Detection and Bottleneck Identification”. ACM Computing Surveys, Vol. 48, No. 1,
Article 4.
M, Jammal, T. Singh, A. Shami, R.l Asal, Y. Li, (2014) "Software defined networking: State of
the art and research challenges", Computer Networks.
Dabbagh, B.Hamdaoui, M. Guizani, and A. Rayes,(2015) "Software-Defined Networking
Security: Pros and Cons", IEEE Communications Magazine
N, S. Bailey, Deepak Bansal, Linda Dunbar, Dave Hood, Zoltán Lajos Kis, (2012) "SDN
Architecture Overview”. Open Network Foundation. .
(https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical-
reports/SDN-architecture-overview-1.0.pdf)
References (2)
International Journal of Computer Science & Information Technology (IJCSIT). April 2019
K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris, (2014) "Combining
OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on
SDN environments”, Computer pag. 122–136
L. Jose, M. Yu, and J. Rexford, (2011) “Online measurement of large traffic aggregates on
commodity switches”, in Proc. of the USENIX workshop.
Stéphane. Mallat, (2008) “A wavelet tour of signal processing”. Academic Press, USA.
L. Kalinichemko, I. Shanin, I. Taraban,(2014) "Methods for Anormaly Detection: a Survey",
Advanced Methodos and Technologies, digital collections. Pag. 20-25.
M. Dabagh, B. Handaoul, M. Guizani, A. Rayes, (2015) "Software-Defined Networking Security:
Pro and Cons”, IEEE Communications Magazine. pags. 73-79.

More Related Content

What's hot

International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)  International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC) aciijournal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)  International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC) jackson130
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)ijfcst journal
 
4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...ijp2p
 
4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...ijdpsjournal
 

What's hot (19)

International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)  International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)  International Journal of Artificial Intelligence and Soft Computing (IJAISC)
International Journal of Artificial Intelligence and Soft Computing (IJAISC)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
Ijaisc
IjaiscIjaisc
Ijaisc
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...
 
4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...4th International Conference on Networks, Communications, Wireless and Mobile...
4th International Conference on Networks, Communications, Wireless and Mobile...
 

Similar to REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKS

IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET Journal
 
Precaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensorPrecaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensorIRJET Journal
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciIJCI JOURNAL
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 

Similar to REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKS (20)

IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
 
Precaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensorPrecaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensor
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
IRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT ApplicationsIRJET - Development of Cloud System for IoT Applications
IRJET - Development of Cloud System for IoT Applications
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
Top 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijciTop 5 most_viewed_articles ijci
Top 5 most_viewed_articles ijci
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

REDUCTION OF MONITORING REGISTERS ON SOFTWARE DEFINED NETWORKS

  • 1. Reduction of Monitoring Records On Software Defined Network Luz Angela Aristizábal Q Nicolás Toro G Universidad Nacional de Colombia International Journal of Computer Science & Information Technology (IJCSIT) (INSPEC INDEXING) ISSN: 0975-3826(online); 0975-4660 (Print) http://airccse.org/journal/ijcsit.html
  • 2. Index International Journal of Computer Science & Information Technology (IJCSIT). April 2019 0. Contextualization (Why ? ): Software Define Network 1. Statistics on SDN. 2. Characterization 3. Anormaly Detection Method 4. Results 5. Conclusions
  • 3. Why ? International Journal of Computer Science & Information Technology (IJCSIT). April 2019 https://es.123rf.com/imagenes-de- archivo/datos_personales.html?sti=mbcmeau2h8mh1xg3ui|&mediapopup=28502403 Reducing And Intelligibility Where was the origin?
  • 4. What does we want achive ? International Journal of Computer Science & Information Technology (IJCSIT). April 2019
  • 5. Software Defined Networks International Journal of Computer Science & Information Technology (IJCSIT). April 2019
  • 6. Statistical Messages International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Statistics Request message Statistics Reply message • Received packets • Received Bytes • Duration • Sended Packets • Sended Bytes.
  • 7. Characterization: Wavelet Transform International Journal of Computer Science & Information Technology (IJCSIT). April 2019
  • 8. International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Parameters TWD Anomaly Detection Contrast Statistical Information Phases
  • 9. International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Parameter (i) 2048 samples
  • 10. International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Anomaly Detection Gaussian model e x xp      2 )( 2 1 ),;( 2 2 2       m j i ji xm 1 1     m ji i i jm x1 2 )( 21 
  • 11. Results International Journal of Computer Science & Information Technology (IJCSIT). April 2019 0 50 100 150 200 250 8 10 12 14 16 overlapping. Original Register (blue) .vs. Sythesized register (red) TransmitedBytes(MB) i 0 50 100 150 200 250 -5 0 5 10 15 Original Register .vs. Sythesized register TransmitedBytes(MB) i Original Synthetized register
  • 12. International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Evaluation Reduced register Anomaly Detect
  • 13. International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Conclusions • The algorithm of reduction has a compression factor of at least a 50%. It retains the atypical behaviour of statistics data generated by the Openflow switch, which reduces the execution time of an anomaly detector. • The results of this work leave a door open for the analysis of the effectiveness of other wavelet bases in the reduction of the length of the statistical parameters in Software Defined Networks. Since this work only used the "daubechies" wavelet, evaluating other base wavelets could lead to a better reduction rate.
  • 14. References (1) International Journal of Computer Science & Information Technology (IJCSIT). April 2019 Ibidunmoye, Olumuyiwa, Hernandez R Francisco, Elmrot Erick .(2015) “Performance Anomaly Detection and Bottleneck Identification”. ACM Computing Surveys, Vol. 48, No. 1, Article 4. M, Jammal, T. Singh, A. Shami, R.l Asal, Y. Li, (2014) "Software defined networking: State of the art and research challenges", Computer Networks. Dabbagh, B.Hamdaoui, M. Guizani, and A. Rayes,(2015) "Software-Defined Networking Security: Pros and Cons", IEEE Communications Magazine N, S. Bailey, Deepak Bansal, Linda Dunbar, Dave Hood, Zoltán Lajos Kis, (2012) "SDN Architecture Overview”. Open Network Foundation. . (https://www.opennetworking.org/images/stories/downloads/sdn-resources/technical- reports/SDN-architecture-overview-1.0.pdf)
  • 15. References (2) International Journal of Computer Science & Information Technology (IJCSIT). April 2019 K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, V. Maglaris, (2014) "Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments”, Computer pag. 122–136 L. Jose, M. Yu, and J. Rexford, (2011) “Online measurement of large traffic aggregates on commodity switches”, in Proc. of the USENIX workshop. Stéphane. Mallat, (2008) “A wavelet tour of signal processing”. Academic Press, USA. L. Kalinichemko, I. Shanin, I. Taraban,(2014) "Methods for Anormaly Detection: a Survey", Advanced Methodos and Technologies, digital collections. Pag. 20-25. M. Dabagh, B. Handaoul, M. Guizani, A. Rayes, (2015) "Software-Defined Networking Security: Pro and Cons”, IEEE Communications Magazine. pags. 73-79.