6 research outputs found

    WEB PROXY LOG TO DEVELOP A REQUIREMENT BASED RESOURCE ALLOCATION FOR WEB TRAFFIC

    Get PDF
    Network packets are busy exchanging information like data from human activities, machine (M2M communication), cellular network, Internet of Things (IoT), business and in many other forms. Network infrastructure plays the role of backbone in the whole communication system. Therefore, it is an integral point of interest not only to analyze network traffic but also to expose security incident or business critical event. The goal of this research is to discover unknown network parameters and event from the network logs, specifically from web proxy log, to explore the relationship between different parameters. This work highlights unique findings and relations among log parameters. For example, how server action varies with SC-byte or CS-byte or RS and relations between the time taken and RS (Content-Type). Furthermore, visualizing the busiest period in terms of bandwidth consumption and available number of live IP addresses, and so on

    Digital Forensics Framework on IoT Devices and Analysis of Web Proxy Logs to Establish Resource Allocation Plans

    No full text
    The rapid growth of internet data makes the digital forensics investigation process challenging. Along with the growth rate, the heterogeneity of data from a variety of devices and components of computer networking make the digital forensics process more complicated. In order to minimize the complexity of this process, a three-layered IoT forensics framework is proposed which includes top, middle, and bottom layers. All the components and devices of different layers of the IoT forensics framework are essential to have valuable information for an investigation. Open source tools are suggested to conduct the digital forensics investigation because of their versatility and ingenuity. The analysis of web proxy log has been conducted. The web proxy log serves as a source of user activity information as well as the resource utilization of the system. This analysis is imperative as a way of knowing the resource usage of a specific network, which establishes a resource allocation plan for the network administrator. A workflow process is proposed to assign the priority to the content type and to allocate bandwidth according to bandwidth consumption ratio to establish a resource allocation plan

    Dynamic Resource Allocation Techniques Using Smart Load Balancer Algorithm

    No full text
    The complexity of network systems has and continues to rapidly transformation as high data usage continues to increase. The average person consumes large amounts of data, either by video, digital news and weather updates or social media blogs. In recent years, collaborative research between information technology and engineering is quickly expanding. Cloud computing offers many benefits in productivity and efficiently; however, there are major security issues to consider. Research in this field has become a primary concern in academia and the corporate world. There are several key factors which are responsible for the performance of the cloud system; one of which is load balancing. A load balancer is responsible for handling data request made by users and accessing the correct path to direct the request. Load balancing can be done in various aspects like: memory allocation, Bandwidth management, storage management etc. in one-word resource utilization. As this new generation of devices and data continues to grow, the currently restricted amount of bandwidth will see more problems. It is possible through a smart load balancer to more efficiently allocate resources, providing better availability; without this load balancer, new devices cannot access the network at the same time. In this paper, a brief overview of load balancing techniques is explored with the goal of generating a new method to dynamically allocated resource within a network. This smart load balancer algorithm should provide emphasis on fairness and quick request response. It is expected that this research will generate a new method of allocating very large data centers handling complex data. The algorithm presented is expected to be used in multiple disciplines including information technology and electrical engineering. This research aims to launch a private cloud computing cluster to be hosted at a University level, providing better, more secure service for the populous

    Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User

    No full text
    Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. A new call admission scheme (CAS) is proposed based on both thinning scheme and fading condition. The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls

    Improving the Efficiency of Big Forensic Data Analysis Using NoSQL

    No full text
    The rapid growth of Internet of Things (IoT) makes the task for digital forensic more difficult. At the same time, the data analyzing technology is also developing in a feasible pace. Where traditional Structured Query Language (SQL) is not adequate to analyze the data in an unstructured and semi-structured format, Not only Standard Query Language (NoSQL) unfastens the access to analyzing the data of all format. The large volume of data of IoTs turns into Big Data which just do not enhance the probability of attaining of evidence of an incident but make the investigation process more complex. This paper aims to analyze Big Data for Digital Forensic (DF) investigation using NoSQL. MongoDB has been used to analyze Big Forensic Data in the form of document-oriented database. The proposed solution is capable of analyzing Big Forensic Data in the form of NoSQL more specifically document oriented data in a cost-effective, efficient way as all the tools is being used are open source

    A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing

    No full text
    The use of mobile devices has exponentially expanded in recent years. A device which was made with the sole purpose of making mobile audio phone calls is now the leading basis for functionality in the social world. The types of applications widely vary from audio and video calls, internet browsing, healthcare applications, to mobile games with online connectivity, among many others. These applications have expanded the original idea of what a mobile device could be, however there have been constant drawbacks to these devices, namely short battery life and limited available storage memory. Another current issue that exists with mobile devices is the higher data consumption when on mobile network data. To solve this problem, it is possible to use cloud computing to mitigate these large applications and use less data. Integrating in a mobile cloud system to allocate and store these applications will allow for the mobile devices to conserve battery and memory by avoiding large computational processes. Another major concern is security breaches resulting in data theft and/or invasion of privacy. In this paper, we present a new framework that will allow for a smart load balancer to efficiently allocate resources to increase application processing speed for data and request response of memory stored by mobile devices in a secure manner
    corecore