8 research outputs found
QoS Design Consideration for Enterprise and Provider’s Network at Ingress and Egress Router for VoIP protocols
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-to-end service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation
A four-state Markov model for modelling bursty traffic and benchmarking of random early detection
Active Queue Management (AQM) techniques are crucial for managing packet transmission efficiently, maintaining network performance, and preventing congestion in routers. However, achieving these objectives demands precise traffic modeling and simulations in extreme and unstable conditions. The internet traffic has distinct characteristics, such as aggregation, burstiness, and correlation. This paper presents an innovative approach for modeling internet traffic, addressing the limitations of conventional modeling and conventional AQM methods' development, which are primarily designed to stabilize the network traffic. The proposed model leverages the power of multiple Markov Modulated Bernoulli Processes (MMBPs) to tackle the challenges of traffic modeling and AQM development. Multiple states with varying probabilities are used to model packet arrivals, thus capturing the burstiness inherent in internet traffic. Yet, the overall probability is maintained identical, irrespective of the number of states (one, two, or four), by solving linear equations with multiple variables. Random Early Detection (RED) was used as a case study method with different packet arrival probabilities based on MMBPs with one, two, and four states. The results showed that the proposed model influences the outcomes of AQM methods. Furthermore, it was found that RED might not effectively address network burstiness due to its relatively slow reaction time. As a result, it can be concluded that RED performs optimally only with a single-state model
An innovative approach for enhancing capacity utilization in point-to-point voice over internet protocol calls
Voice over internet protocol (VoIP) calls are increasingly transported over computer-based networking due to several factors, such as low call rates. However, point-to-point (P-P) calls, as a division of VoIP, are encountering a capacity utilization issue. The main reason for that is the giant packet header, especially when compared to the runt P-P calls packet payload. Therefore, this research article introduced a method to solve the liability of the giant packet header of the P-P calls. The introduced method is named voice segment compaction (VSC). The VSC method employs the unneeded P-P calls packet header elements to carry the voice packet payload. This, in turn, reduces the size of the voice payload and improves network capacity utilization. The preliminary results demonstrated the importance of the introduced VSC method, while network capacity improved by up to 38.33%
An innovative network intrusion detection system (NIDS): Hierarchical deep learning model based on Unsw-Nb15 dataset
With the increasing prevalence of network intrusions, the development of effective network intrusion detection systems (NIDS) has become crucial. In this study, we propose a novel NIDS approach that combines the power of long short-term memory (LSTM) and attention mechanisms to analyze the spatial and temporal features of network traffic data. We utilize the benchmark UNSW-NB15 dataset, which exhibits a diverse distribution of patterns, including a significant disparity in the size of the training and testing sets. Unlike traditional machine learning techniques like support vector machines (SVM) and k-nearest neighbors (KNN) that often struggle with limited feature sets and lower accuracy, our proposed model overcomes these limitations. Notably, existing models applied to this dataset typically require manual feature selection and extraction, which can be time-consuming and less precise. In contrast, our model achieves superior results in binary classification by leveraging the advantages of LSTM and attention mechanisms. Through extensive experiments and evaluations with state-of-the-art ML/DL models, we demonstrate the effectiveness and superiority of our proposed approach. Our findings highlight the potential of combining LSTM and attention mechanisms for enhanced network intrusion detection
A fine-tuning of decision tree classifier for ransomware detection based on memory data
Ransomware has evolved into a pervasive and extremely disruptive cybersecurity threat, causing substantial operational and financial damage to individuals and businesses. This article explores the critical domain of Ransomware detection and employs Machine Learning (ML) classifiers, particularly Decision Tree (DT), for Ransomware detection. The article also delves into the usefulness of DT in identifying Ransomware attacks, leveraging the innate ability of DT to recognize complex patterns within datasets. Instead of merely introducing DT as a detection method, we adopt a comprehensive approach, emphasizing the importance of fine-tuning DT hyperparameters. The optimization of these parameters is essential for maximizing the DT capability to identify Ransomware threats accurately. The obfuscated-MalMem2022 dataset, which is well-known for its extensive and challenging Ransomware-related data, was utilized to evaluate the effectiveness of DT in detecting Ransomware. The implementation uses the versatile Python programming language, renowned for its efficiency and adaptability in data analysis and ML tasks. Notably, the DT classifier consistently outperforms other classifiers in Ransomware detection, including K-Nearest Neighbors, Gradient Boosting Tree, Naive Bayes, and Linear Support Vector Classifier. For instance, the DT demonstrated exceptional effectiveness in distinguishing between Ransomware and benign data, as evidenced by its remarkable accuracy of 99.97%
A Trust-Based Recommender System for Personalized Restaurants Recommendation
Several online restaurant applications, such as TripAdvisor and Yelp, provide potential consumers with reviews and ratings based on previous customers’ experiences. These reviews and ratings are considered the most important factors that determine the customer’s choice of restaurants. However, the selection of a restaurant among many unknown choices is still an arduous and time- consuming task, particularly for tourists and travellers. Recommender systems utilize the ratings provided by users to assist them in selecting the best option from many options based on their preferences. In this paper, we propose a trust-based recommendation model for helping consumers select suitable restaurants in accordance with their preferences. The proposed model utilizes multi- criteria ratings of restaurants and implicit trust relationships among consumers to produce personalized restaurant recommendations. The experimental results based on a real-world restaurant dataset demonstrated the superiority of the proposed model, in terms of prediction accuracy and coverage, in overcoming the sparsity and new user problems when compared to other baseline CF-based recommendation algorithms
A Three Layered Decentralized IoT Biometric Architecture for City Lockdown During COVID-19 Outbreak
In this article, we have built a prototype of a decentralized IoT based biometric face detection framework for cities that are under lockdown during COVID-19 outbreaks. To impose restrictions on public movements, we have utilized face detection using three-layered edge computing architecture. We have built a deep learning framework of multi-task cascading to recognize the face. For the face detection proposal we have compared with the state of the art methods on various benchmarking dataset such as FDDB and WIDER FACE. Furthermore, we have also conducted various experiments on latency and face detection load on three-layer and cloud computing architectures. It shows that our proposal has an edge over cloud computing architecture
MVF: A Novel Technique to Reduce the Voip Packet Payload Length
The adoption of the Voice over Internet Protocol (VoIP) system is growing due to several factors, including its meagre rate and the numerous contours that can be joined with VoIP systems. However, the wasteful utilisation of the computer network is an inevitable problem that limits the rapid growth of VoIP systems. The essential explanation behind this wasteful utilisation of the computer network bandwidth (BW) is the considerable preamble length of the VoIP packet. In this study, we invent a technique that addresses the considerable preamble length of the VoIP packet. The designed technique is known as the manikin voice frame (MVF). The primary idea of the MVF technique is to utilise the VoIP packet preamble tuples that are not essential to the voice calls, particularly client-to-client calls (voice calls between only two users). Specifically, these tuples will be utilised for reserving the data of the VoIP packet. In certain instances, this will make the VoIP packet data manikin or even make it empty. The performance assessment of the introduced MVF technique demonstrated that the utilisation of the computer network BW has enhanced by 33%. Along these lines, the MVF technique indicates potential progress in resolving the inefficient usage of the computer network BW