14,377 research outputs found

    New intelligent network approach for monitoring physiological parameters : the case of Benin

    Get PDF
    Benin health system is facing many challenges as: (i) affordable high-quality health care to a growing population providing need, (ii) patients’ hospitalization time reduction, (iii) and presence time of the nursing staff optimization. Such challenges can be solved by remote monitoring of patients. To achieve this, five steps were followed. 1) Identification of the Wireless Body Area Network (WBAN) systems’ characteristics and the patient physiological parameters’ monitoring. 2) The national Integrated Patient Monitoring Network (RIMP) architecture modeling in a cloud of Technocenters. 3) Cross-analysis between the characteristics and the functional requirements identified. 4) Each Technocenter’s functionality simulation through: a) the design approach choice inspired by the life cycle of V systems; b) functional modeling through SysML Language; c) the communication technology and different architectures of sensor networks choice studying. 5) An estimate of the material resources of the national RIMP according to physiological parameters. A National Integrated Network for Patient Monitoring (RNIMP) remotely, ambulatory or not, was designed for Beninese health system. The implementation of the RNIMP will contribute to improve patients’ care in Benin. The proposed network is supported by a repository that can be used for its implementation, monitoring and evaluation. It is a table of 36 characteristic elements each of which must satisfy 5 requirements relating to: medical application, design factors, safety, performance indicators and materiovigilance

    Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis

    Get PDF
    Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to increase the operators' visibility of ATM communication networks. We raise the question of how to determine the optimal level of automation in this safety-critical context, and we present a novel passive network monitoring system that can reveal network utilisation trends and traffic patterns in diverse timescales. Using network measurements, we derive resilience metrics and visualisations to enhance the operators' knowledge of the network and traffic behaviour, and allow for network planning and provisioning based on informed what-if analysis

    D-STREAMON: from middlebox to distributed NFV framework for network monitoring

    Full text link
    Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Considering the current trend of the net- working and the requirements to counteract to the evolution of cyber-threats, it is expected that also network monitoring will move towards NFV based solutions. In this paper, we present D- StreaMon an NFV-capable distributed framework for network monitoring realized to face the above described challenges. It relies on the StreaMon platform, a solution for network monitoring originally designed for traditional middleboxes. An evolution path which migrates StreaMon from middleboxes to Virtual Network Functions (VNFs) has been realized.Comment: Short paper at IEEE LANMAN 2017. arXiv admin note: text overlap with arXiv:1608.0137

    Network monitoring in multicast networks using network coding

    Get PDF
    In this paper we show how information contained in robust network codes can be used for passive inference of possible locations of link failures or losses in a network. For distributed randomized network coding, we bound the probability of being able to distinguish among a given set of failure events, and give some experimental results for one and two link failures in randomly generated networks. We also bound the required field size and complexity for designing a robust network code that distinguishes among a given set of failure events

    Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks

    Get PDF
    In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active network scans and passive network monitoring to enumerate software resources and their version present in the network. Further, we used the data from third-party sources, such as Internet-wide scanner Shodan. We correlated the measurements with the list of recent vulnerabilities obtained from NVD using the CPE as a common identifier used in both domains. Subsequently, we compared the approaches in terms of network coverage and precision of system identification. Finally, we present a sample list of vulnerabilities observed in our campus network. Our work helps in approximating the number of vulnerabilities and vulnerable hosts in large networks, where it is often impractical or costly to perform vulnerability scans using specialized tools, and in situations, where a quick estimate is more important than thorough analysis.In this paper, we present an empirical study on vulnerability enumeration in computer networks using common network probing and monitoring tools. We conducted active network scans and passive network monitoring to enumerate software resources and their version present in the network. Further, we used the data from third-party sources, such as Internet-wide scanner Shodan. We correlated the measurements with the list of recent vulnerabilities obtained from NVD using the CPE as a common identifier used in both domains. Subsequently, we compared the approaches in terms of network coverage and precision of system identification. Finally, we present a sample list of vulnerabilities observed in our campus network. Our work helps in approximating the number of vulnerabilities and vulnerable hosts in large networks, where it is often impractical or costly to perform vulnerability scans using specialized tools, and in situations, where a quick estimate is more important than thorough analysis
    • 

    corecore