719 research outputs found

    Evaluation of machine learning techniques for intrusion detection in software defined networking

    Get PDF
    Abstract. The widespread growth of the Internet paved the way for the need of a new network architecture which was filled by Software Defined Networking (SDN). SDN separated the control and data planes to overcome the challenges that came along with the rapid growth and complexity of the network architecture. However, centralizing the new architecture also introduced new security challenges and created the demand for stronger security measures. The focus is on the Intrusion Detection System (IDS) for a Distributed Denial of Service (DDoS) attack which is a serious threat to the network system. There are several ways of detecting an attack and with the rapid growth of machine learning (ML) and artificial intelligence, the study evaluates several ML algorithms for detecting DDoS attacks on the system. Several factors have an effect on the performance of ML based IDS in SDN. Feature selection, training dataset, and implementation of the classifying models are some of the important factors. The balance between usage of resources and the performance of the implemented model is important. The model implemented in the thesis uses a dataset created from the traffic flow within the system and models being used are Support Vector Machine (SVM), Naive-Bayes, Decision Tree and Logistic Regression. The accuracy of the models has been over 95% apart from Logistic Regression which has 90% accuracy. The ML based algorithm has been more accurate than the non-ML based algorithm. It learns from different features of the traffic flow to differentiate between normal traffic and attack traffic. Most of the previously implemented ML based IDS are based on public datasets. Using a dataset created from the flow of the experimental environment allows training of the model from a real-time dataset. However, the experiment only detects the traffic and does not take any action. However, these promising results can be used for further development of the model

    SDN-Based Approach to Evaluate the Best Controller: Internal Controller NOX and External Controllers POX, ONOS, RYU

    Get PDF
    Software Defined Networking (SDN) is a rising technique to deal with replace patrimony network (coupled hardware and software program) control and administration by separating the control plane (software program) from the information plane (hardware). It gives adaptability to the engineers by influencing the focal control to plane straightforwardly programmable. Some new difficulties, for example, single purpose of disappointment, may be experienced because of the original control plane. SDN concentrated on flexibility where the security of the system was not essentially considered. It promises to give a potential method to present Quality of Service (QoS) ideas in the present correspondence networks. SDN automatically changes the behavior and functionality of system devices utilizing a single state program. Its immediate OpenFlow is planned by these properties. The affirmation of Quality of Service (QoS) thoughts winds up possible in a versatile and dynamic path with SDN. It gives a couple of favorable circumstances including, organization and framework versatility, improved exercises and tip-top performances. This research work will concentrate on the Quality of Service (QoS) like delay, response time, throughput, and other execution assessing parameters of our proposed arrange design using internal controller, e.g., Network Operating System (NOX) and external controller, e.g., Pythonic Network Operating System (POX), Open Network Operating System (ONOS) and RYU. Regardless of the way that thoughts of QoS, they did not comprehend the correspondence systems with high utilization, diverse quality and acknowledgment costs. It will focus on the outside controller and inner controller execution in the proposed architecture. These perceptions of switch diversity may give SDN application engineer's bits of knowledge while acknowledging QoS ideas in an SDN-based system

    Flowrider: Fast On-Demand Key Provisioning for Cloud Networks

    Get PDF
    Increasingly fine-grained cloud billing creates incentives to review the software execution footprint in virtual environments. For example, virtual execution environments move towards lower overhead: from virtual machines to containers, unikernels, and serverless cloud computing. However, the execution footprint of security components in virtualized environments has either remained the same or even increased. We present Flowrider, a novel key provisioning mechanism for cloud networks that unlocks scalable use of symmetric keys and significantly reduces the related computational load on network endpoints. We describe the application of Flowrider to common transport security protocols, the results of its formal verification, and its prototype implementation. Our evaluation shows that Florwider uses up to an order of magnitude less CPU to establish a TLS session while preventing by construction some known attacks

    The impact of shale pressure diffusion on 4D seismic interpretation

    Get PDF
    Shale typically has a low but non-negligible permeability of the order of nanodarcys (recognized an appreciated in production of unconventional resources), which could affect the magnitude and pattern of the pressure in conventional reservoirs over the lifetime of a producing field. The implications of this phenomenon for reservoir monitoring by 4D seismic can be significant, but depend on the geology of the field, the time-lines for production and recovery, and the timing of the seismic surveys. In this PhD thesis I developed an integrated workflow to assess the process of shale pressure diffusion and its elastic implications in the 4D seismic interpretation of four conventional reservoirs (three North Sea case studies and one from West Africa), with different geological settings (shallow marine and turbidites) and production mechanisms. To accomplish that, first, a detailed petrophysical evaluation was performed to characterize the overburden, intra-reservoir and underburden shales. Next, the simulation models were adjusted to activate the shale-related contributions, and then, applying simulator to seismic workflows, 3D and 4D synthetic seismic modelling were performed, for comparison with the observed seismic data and to establish the impact of the shale pressure diffusion in the elastic dynamic behaviour of the reservoir. This work also includes a case study where evaluation of shale pressure diffusion was integrated with geomechanical simulations to assess the propagation of time shifts and time strain in the overburden of a high pressure/high temperature reservoir under compaction, improving the understanding of the distribution and polarity of the observed seismic time strain. Fluid flow simulation results of this work indicate that activation of the shale improves the overall reservoir connectivity, enhancing model prediction (production history matched data). The fit to observed 4D seismic data was improved in all the field applications with a noticeable reduction (up to 6%) in the mismatch (hardening and softening signal distribution) for the models with active shales. In reservoirs where the saturation was very sensitive to changes in pressure, shale activation proved to impact strongly on the breakout and distribution of gas liberated from solution. Overall, this work found that inclusion of shale in the 3D and 4D reservoir seismic modelling can provide valuable insights for the interpretation of the reservoir’s dynamic behaviour and that, under particular conditions such as strong reservoir compartmentalization, shale pressure diffusion could be a significant process in the interpretation of the 4D seismic signature

    Hydrolink 2020/2. Hydraulic Transients

    Get PDF
    Topic: Hydraulic Transient

    A paradox in action? A critical analysis of an appreciative inquiry

    Get PDF
    A journey comprised of three paths is the metaphor through which I i) reflect and report on my involvement with four New Zealand primary school Boards of Trustees (BOTs) investigating the emancipatory potential that applications of information and communication technologies (ICTs) may have on their governance processes, ii) analyse appreciative inquiry through application(s) of critical theory, with specific reference to the investigation above so as to deepen understanding of the research method, and iii) reflect on my personal development, as achieved through my engagement with participants and the research process. Stemming from an interest in improving school governance I was keen to identify current use of ICTs by BOTs and to work with them to identify potential applications. Appreciative inquiry with its focus on enhancing existing positive organisational attributes seemed to provide an appropriate structure for my investigation. At the back of my mind however, a concern was formulating: Does this method of research deliver the benefits the literature espouses? What influence would the positive orientation have on the research process and on the power dynamics within the research environment? Complementary streams of critical thinking and reflexivity were invoked to assist my analysis. Applications of ICTs which may appear 'helpful' to BOT governance processes are identified in this report. However, uncritical uptake of these applications may not necessarily be consistent with the emancipatory intentions I aspire to. Framed within Habermas' theory of communicative action, the potential colonisation of the BOT lifeworld by the system is considered. Domesticating influences may potentially constrain democratic processes at local school and societal levels. The participatory action research process undertaken facilitated a deepened understanding of governance for all involved. Identification of time and funding constraints indicates BOTs may be prevented from reaching their true potential. Attempts to enhance governance through additional applications of ICTs will be of minimal effect unless efforts are made to better understand and resource the governance efforts of Trustees. Purported empowerment of the community as mandated in the Education Act 1989 comes with a heavy cost, for schools and individuals. Care must be taken to ensure that 'efficiency' gains are not made at the expense of democratic processes. Critical analysis of appreciative inquiry as a research method highlights the influences of power and language use within the research process. Appreciative inquiry should be seen as a process for, rather than a master of change. The contribution of appreciative inquiry to organisational and personal transformation may be drawn from the ontological basis of the approach rather than from the technicalities of a specific form of implementation. I suggest the focus on what is 'good' be made more complex, to recognise that appreciation may also mean 'to know, to be conscious of, to take full and sufficient account of'. Application of an enhanced definition of appreciation has deepened my understanding of not only the situation under investigation but also the research process itself. Through my enhanced concept of 'appreciation' embedded and sometimes obscured influences were highlighted, better understood, and at times transformed to serve the emancipatory aspirations of participants. In keeping with the reflexivity mandated by my commitment to critical theory and action research, I applied this enhanced definition of appreciation to my personal development during my engagement with participants and the research process. My struggles to apply my chosen social constructionist and critical theory lenses to this work are evident in my attempts to work with the largely functionalist literature in this field and the influence of my undergraduate education. Recognising the theoretical and personal developments I gained as I travelled the three paths of my PhD journey, the scene is now set for me to challenge the predominance of functionalist, mechanistic metaphors which dominate organisational literature. In doing so, I seek an alternative approach to understanding organisational activity; and a new vocabulary through which I might extend my understanding, and negotiate new and emancipatory meaning(s) with others

    Mother\u27s experience of social media: Its impact on children and the home

    Get PDF
    With the prevalence and accessibility of social media within the last 15 years it has become possible for children to have constant access to their friends and social networks. It is relatively unknown what impact adopting social media has on children and how mothers interpret this. There are gaps in the literature investigating the pervasive effects of modern technology and what meaning mothers ascribe to their children using social media as a method of connecting with the world. The present research aims to explore this phenomenon by investigating the experiences of mothers who have children that have recently adopted social media. It also examines how mothers are interpreting the impact of this phenomenon on themselves and their family. Semi-structured interviews were conducted with eight mothers who had a child between the age of nine and fourteen who were participating in any form social media communication. Using an interpretative phenomenological approach, three main themes were identified: (1) Identity construction and ecological transitions, (2) pressure, resistance and conformity and (3) lack of self-efficacy. The study indicates that mothers ascribe social media adoption to be a significant event in their child’s psychosocial development, and requires a concerted effort from them in order to protect their children from potential risks. Additionally, the findings suggest that mothers experienced pressure to conform to the technology, despite being aware that their child may not be balancing their social media use with other important commitments. The study adds to a growing body of literature on social media’s qualitative impact. It guides future research to investigate parenting strategies and specific aspects of this phenomenon such as identity construction and the impact on academic potentia

    3D Recording and Interpretation for Maritime Archaeology

    Get PDF
    This open access peer-reviewed volume was inspired by the UNESCO UNITWIN Network for Underwater Archaeology International Workshop held at Flinders University, Adelaide, Australia in November 2016. Content is based on, but not limited to, the work presented at the workshop which was dedicated to 3D recording and interpretation for maritime archaeology. The volume consists of contributions from leading international experts as well as up-and-coming early career researchers from around the globe. The content of the book includes recording and analysis of maritime archaeology through emerging technologies, including both practical and theoretical contributions. Topics include photogrammetric recording, laser scanning, marine geophysical 3D survey techniques, virtual reality, 3D modelling and reconstruction, data integration and Geographic Information Systems. The principal incentive for this publication is the ongoing rapid shift in the methodologies of maritime archaeology within recent years and a marked increase in the use of 3D and digital approaches. This convergence of digital technologies such as underwater photography and photogrammetry, 3D sonar, 3D virtual reality, and 3D printing has highlighted a pressing need for these new methodologies to be considered together, both in terms of defining the state-of-the-art and for consideration of future directions. As a scholarly publication, the audience for the book includes students and researchers, as well as professionals working in various aspects of archaeology, heritage management, education, museums, and public policy. It will be of special interest to those working in the field of coastal cultural resource management and underwater archaeology but will also be of broader interest to anyone interested in archaeology and to those in other disciplines who are now engaging with 3D recording and visualization
    corecore