While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloa...
详细信息
ISBN:
(纸本)1581136730
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to determine how to generate realistic workloads for nIDS performance evaluation. We develop a workload model that appears to provide reasonably accurate estimates compared to real workloads. The model attempts to emulate a traffic mix of different applications, reflecting characteristics of each application and the way these interact with the system. We have implemented this model as part of a traffic generator that can be extended and tuned to reflect the needs of different scenarios. We also present an approach to measuring the capacity of a nIDS that does not require the setup of a full network testbed. security, intrusion detection, workload characterization and generation.
This paper proposes a novel real-time adaptive admission control (AAC) scheme with a desired quality of service (QoS) guarantee and high network utilization in high-speed networks. The QoS is given in terms of service...
详细信息
This paper proposes a novel real-time adaptive admission control (AAC) scheme with a desired quality of service (QoS) guarantee and high network utilization in high-speed networks. The QoS is given in terms of service delay, which is defined as the time it takes for a source to get admitted into the network after it initiates its intended request, packet/cell losses, and transmission delay (time taken to complete transmission from its initiation). AAC uses the following information- the availab.e capacity from a novel adaptive bandwidth estimation scheme, a congestion indicator derived from a congestion controller, Peak Cell Rate (PCR) estimate from new sources, along with the desired QoS metrics, and outputs an 'admit' or 'reject' decision signal to the new sources while guaranteeing QoS and network utilization. Simulation results are presented by streaming ON/OFF and video data into the network. Results show that the proposed AAC admits significantly more traffic compared to other availab.e admission control schemes thereby guaranteeing high network utilization while maintaining the desired QoS.
Research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environments. Among the various strategies necessary for mobile computin...
详细信息
The widespread acceptance of multimedia application has stimulated the development of multimedia server and its file system to guarantee the real-time requirement of continuous media streams. We designed and prototype...
详细信息
In order to generate local addresses for an array section A(l:h:s) with block-cyclic distribution, an efficient compiling method is required. In this paper, two local address generation methods for the block-cyclic di...
详细信息
作者:
Hoshiai, TMemberNTT Network Service Systems Laboratories
Musashino Japan 180 Takashige Hoshai:received his B.S. and M.S. degrees in 1984 and 1986
respectively from Toyohashi Univ. of Tech. where he received his Ph.D. degree. In 1986 he joined NIT Communication Switching Laboratories and is Senior Researcher at IIT Network Service Systems Laboratories. At present he is engaged in research on distributed systems at Bell Communication Lab. (USA). His main interests are real time operating systems computer architecture and distributed systems.
In multiprocessor systems with a common bus arbiter, contention for access to the common bus and shared memory is a major cause of performance degradation. The first-order moment match approximation is an effective te...
详细信息
In multiprocessor systems with a common bus arbiter, contention for access to the common bus and shared memory is a major cause of performance degradation. The first-order moment match approximation is an effective technique of performance evaluation in such systems. Comparison with simulation results demonstrates that the first-order moment match technique gives good accuracy. The performance of completely coupled multiprocessor systems is compared with that of bus-arbitrated multiprocessor systems in order to determine the applications for which the latter is best suited.
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing systems and Dependability and Fault Tolerance, MMB & DFT 2012, held i...
详细信息
ISBN:
(数字)9783642285400
ISBN:
(纸本)9783642285394
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012.;The 16 revised full papers presented together with 5 tool papers and 5 selected workshop papers were carefully reviewed and selected from 54 submissions. MMB & DFT 2012 covers diverse aspects of performance and dependability evaluation of systems including networks, computer architectures, distributedsystems, software, fault-tolerant and secure systems.
暂无评论