Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over t...
详细信息
Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.
Mobile ad-hoc networks are flexible networks that support upcoming group applications like spontaneous joint activities and emergency operations. It consists of nodes which are mobile and without a wired infrastructur...
详细信息
Mobile ad-hoc networks are flexible networks that support upcoming group applications like spontaneous joint activities and emergency operations. It consists of nodes which are mobile and without a wired infrastructure. During mobility of nodes and band-width constraints, the multicast routing protocols faces difficulty in routing. There are different varieties of multicast protocols proposed for ad hoc networks. Here, a simulation of a set of wireless ad hoc multicast protocols is evaluated under various network scenarios. The relative pros, cons, and area of application of each multicast protocol to different situations are compared using parameters like throughput, packet delivery ratio and average end-to-end delay. The Multicast routing protocols like ODMRP (On-Demand Multicast Routing Protocol), MAODV (Multicast Ad-hoc On-Demand Distance Vector), PIM (Protocol Independent Multicast) and MOSPF (Multicast Open Shortest Path First) are considered for the evaluation and the simulation is performed using QUALNET.
Delay Tolerant Networks rely on intermittent contacts between mobile nodes to deliver packets using store-carry-and-forward technique. The key to improve performance in DTNs is to design a greater number of transfer o...
详细信息
Delay Tolerant Networks rely on intermittent contacts between mobile nodes to deliver packets using store-carry-and-forward technique. The key to improve performance in DTNs is to design a greater number of transfer opportunities. Earlier several different routing strategies for DTN environment, like the Epidemic Routing, Spray and Wait, Spray and Focus, to route information in such decentralized scenarios was proposed. Routing in such environment should be effective of achieving high receivable rate with minimalistic overhead. In this paper we aim to achieve a high receivable rate keeping the number of message duplication to a significant low. We propose an architecture following the post office scenario. A persistent node is centrally attached to all other nodes and acts as a receiver if a node is down. This two hop routing protocol improves packet delivery by reducing message duplication rate in the network. It provides a better way of message delivery in challenged environments and a suitable, efficient technique of solving certain prime issues of cost overhead, replication of messages and loss due to delays.
In the discussion about Future internet, Software-Defined Networking (SDN), enabled by OpenFlow, is currently seen as one of the most promising paradigm. While the availability and scalability concerns rises as a si...
详细信息
In the discussion about Future internet, Software-Defined Networking (SDN), enabled by OpenFlow, is currently seen as one of the most promising paradigm. While the availability and scalability concerns rises as a single controller could be alleviated by using replicate or distributed controllers, there lacks a flexible mechanism to allow controller load balancing. This paper proposes BalanceFlow, a controller load balancing architecture for OpenFlow networks. By utilizing CONTROLLER X action extension for OpenFlow switches and cross-controller communication, one of the controllers, called "super controller", can flexibly tune the flow-requests handled by each controller, without introducing unacceptable propagation latencies. Experiments based on real topology show that BalanceFlow can adjust the load of each controller dynamically.
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no central control in a MANET, a mobile node itself acts as a router. A MANET may fun...
详细信息
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no central control in a MANET, a mobile node itself acts as a router. A MANET may function in a stand-alone fashion or may be connected to the internet. Undoubtedly, MANETs play a critical role in situations where a wired infrastructure is neither available nor easy to install. MANETs are found in applications such as short-term events, battlefield communications and disaster relief activities etc. Due to node mobility and scarcity of resources such as energy of nodes and bandwidth of wireless links, it is much tougher to provide QoS guarantee in MANETs. Therefore, while designing such a network we need to look out for a good Quality of Service (QoS) of it. Many approaches have been proposed for MANET QoS but very few have addressed it from the message transmission point of view. In this paper, we discuss different factors that affect QoS and also the challenges of QoS in MANET. We then propose an algorithm to enhance the QoS in mobile adhoc network depending on its type of application it is proposed for.
Named Data Networking (ndN) featuring in-network caching capability is a large effort that exemplifies information-centric approach to networking by shifting emphasis from hosts to data so as to meet growing demand on...
详细信息
Named Data Networking (ndN) featuring in-network caching capability is a large effort that exemplifies information-centric approach to networking by shifting emphasis from hosts to data so as to meet growing demand on content. This work explores a scheme that enables a ndN domain to make full use of its in-network caches to enhance its performance, availability, and reliability. Currently, each ndN router independently determines what contents to cache and is unaware of content cached in nearby routers and thus their caches are not utilized in an efficient way. This paper proposes to have routers in a ndN domain share cached data and coordinate to make caching decisions (which is dubbed in-network cooperative caching) and formulates it into a constrained optimization problem. The Lagrangian relaxation and primal-dual decomposition method is applied to decompose the optimization problem into object placement subproblems and object locating subproblems, each of which can be solved in a distributed manner at each router, such that the in-network cooperative caching is addressed in a distributed way. Our simulation results, although preliminary, suggest that our scheme can benefit users, internet Service Providers (ISPs) as well as content servers, and the improvement can be as much as 88% compared to current ndN caching policy.
Websites on the internet of things are always encountering the critical security and performance problems. A new cloud based distributed web security system and cloud computing based data mining platform architecture ...
详细信息
Websites on the internet of things are always encountering the critical security and performance problems. A new cloud based distributed web security system and cloud computing based data mining platform architecture is introduced. This paper also introduces a new data mining algorithm, which could get more powerful cloud computing energy and cloud storage power. Using the network routing optimization and adaptive strategy for resource-aware distributedcomputing, the data process is speeded up. By combining the local data mining algorithm of different sites, the global data could be mined. Test data shows that this new algorithm could improve the data processing speed and the accuracy of data mining. Then it is of high value of application.
This paper introduces a Intelligent Household Control System based on GSM wireless platform andinternet network double *** system adopts Atmegal28 of ATMEL as the master chip, respectively through the SPI interface a...
详细信息
This paper introduces a grid-based computational platform for simulating structural systems using the Java CoG Kit (Java community Grid Kit), a Java wrapper for grid middleware library. Based on hierarchical modeling ...
详细信息
ISBN:
(纸本)9781905088423
This paper introduces a grid-based computational platform for simulating structural systems using the Java CoG Kit (Java community Grid Kit), a Java wrapper for grid middleware library. Based on hierarchical modeling and cluster-to-cluster computing, this proposed framework integrates simplified component and rigorous component into one single simulation over a grid-based computing environment. The hierarchical modeling describes the intricate relations between the rigorous component model and the rest of the system by the synchronization of two scales of the component models. The simulation works are then submitted to a grid computing environment established with cluster computing system.
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper present some advices about the evolution and basic propertie...
详细信息
暂无评论