Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new netwo...
详细信息
ISBN:
(纸本)9781665414517
Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new networking architecture. Paper aim to classify the traffic into normal and malicious classes based on features given in dataset by using various deep learning techniques. the classification of traffic into one of the classes after pre-processing of the dataset is dune. We got accuracy score of 99.75% by applying Stacked Auto-Encoder Multi-layer Perceptron (SAE-MLP) which is explained in the paper. thus, the purpose of network traffic classification using deep learning techniques was fulfilled.
Withthe development of new power system and computing and network convergence technology, the number of intelligent power communication devices is increasing exponentially. On the one hand, the upgrading of microproc...
详细信息
For some of the Internet-of-things (IoT) applications, there is a need for processing huge amounts of data stemming from the network edge in near real-time manner. To this end several in-network computation frameworks...
详细信息
ISBN:
(纸本)9781450385664
For some of the Internet-of-things (IoT) applications, there is a need for processing huge amounts of data stemming from the network edge in near real-time manner. To this end several in-network computation frameworks have been developed which deploy functions in the computing infrastructure from the edge to the cloud. Some of these frameworks take a centralized approach to the orchestration problem with a central entity making deployment decisions of the functions. Others decentralize such decisions. In this paper, we present HYdrO, which is a hybrid approach to orchestration of functions, i.e., a centralized instance gathers the state of the network and provides hints to the individual computing nodes for an efficient resolution of computation requests. We show with a concrete example of Named Function networking (NFN), a computing framework based on Information Centric networking, that HYdrO can improve completion times of requests and distribute the load of the infrastructure.
Attacks that aim to disrupt services, known as distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening the normal operation of the n...
详细信息
ISBN:
(数字)9798331595104
ISBN:
(纸本)9798331595111
Attacks that aim to disrupt services, known as distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening the normal operation of the network. this paper proposes a method for filtering DDoS attack traffic along routing paths within the Software Defined networking (SDN) domain. the method, based on the SDN framework, employs a consistency hashing algorithm to select nodes in the global routing platform, forming secure access paths. By utilizing the accuracy of edge node detection and inter-domain cooperation, the attack is effectively mitigated along the path close to its origin, which is referred to as path filtering. the paper also provides a design for the filtering framework and details the filtering steps.
Electronic gadgets now work closely together as a result of the growth of the Internet of things (IoT) and Mobile Edge computing (MEC). Strong dependability and integrity of the technologies are required. But the pres...
详细信息
the proceedings contain 41 papers. the topics discussed include: federated learning approach for auto-scaling of virtual network function resource allocation in 5G-and-beyond networks;a demand aware strategy for a mac...
ISBN:
(纸本)9781665486279
the proceedings contain 41 papers. the topics discussed include: federated learning approach for auto-scaling of virtual network function resource allocation in 5G-and-beyond networks;a demand aware strategy for a machine learning approach to VNF-PC problem;token-based authentication and access delegation for HW-accelerated telco cloud solution;robust multi-resource allocation against controller failures in network slice provisioning;deployment guidelines for cloud-ran in future mobile networks;adapting Kubernetes controllers to the edge: on-demand control planes using Wasm and WASI;Bifrost: a secure, scalable and efficient file sharing system based on dual deduplication;optimal network selection method using federated learning to achieve large-scale learning while preserving privacy;cloud orchestration for optimized computing efficiency: the case of wind resource modelling;on the deployment of blockchain in edge computing wireless networks;resource allocation in multiple backup modes under reliability guarantee with workload-dependent failure probability;and reconfiguring network slices at the best time with deep reinforcement learning.
Successful adoption of distributed clean energy resources requires the enhancement of system flexibility from boththe generation and the demand side. this paper presents a case study on the Punggol Digital District o...
详细信息
Withthe rapid development of smart grid, traditional cloud computing architectures struggle to meet the needs of new power applications with low latency and large connectivity in the context of big data. Hence, edge ...
详细信息
In this study, we present a middleware-based approach for detecting anomalies in distributed systems. Our method facilitates the dynamic collection of logs at various levels of detail and incorporates an a priori dict...
In this study, we present a middleware-based approach for detecting anomalies in distributed systems. Our method facilitates the dynamic collection of logs at various levels of detail and incorporates an a priori dictionary-based compression strategy to process and transmit logs, minimizing the performance impact on distributed systems. Additionally, we utilize a dual feature fusion technique to analyze the logs. We evaluate the effectiveness of our approach by performing anomaly detection in a publish/subscribe distributed system and comparing it with existing methods. the results illustrate that our method outperforms other approaches, demonstrating superior performance.
Proof of work (PoW) is a widely adopted distributed consensus protocol which enables cryptocurrency transaction processing without a trusted third party. the miners are financially incentivized to participate in the P...
详细信息
ISBN:
(纸本)9783031069758;9783031069741
Proof of work (PoW) is a widely adopted distributed consensus protocol which enables cryptocurrency transaction processing without a trusted third party. the miners are financially incentivized to participate in the PoW consensus protocol, and PoWrelies on the underlying peer-to-peer (P2P) networking for receiving and transmitting the transactions and the up-to-date blocks (which are the inputs for the PoW consensus protocol). We study the rational miner strategy but control an orthogonal parameter from those in the previous blockchain research, which has studied the control of the mining power or the timing of the block submissions (e.g., selfish mining or block withholding). More specifically, we study greedy networking, in which a miner node increases its connectivity beyond the default protocol to expedite the deliveries of blocks and transactions for an unfair mining advantage. While greedy networking has been actively studied in the general P2P networking, it has not been systematically studied in cryptocurrency and blockchain despite the alleged real-world instances by the Bitcoin community. We build an analytical framework for greedy networking and study how the networking control impacts the cryptocurrency application to quantify the benefits and costs of the networking control. To demonstrate the use of our framework, we implement a greedy networking prototype based on an active Bitcoin node connected to the Mainnet while simulating different miner capabilities by varying the computing backend of the miner. In contrast to the previous belief in blockchain and cryptocurrency, we discover that the optimal number of connections is bounded (limiting the greedy behavior) and depends on the hash computing capability of the miner.
暂无评论