286 research outputs found

    Bidirectional propagation method for analysis of reflection on radio networks

    Get PDF
    In this paper, our aim is to evaluate and analyze two propagation methods over mobile IPv6 networks which are bidirectional tunneling and routing optimization and both deliver a packet from a correspondent node to the mobile node and vice versa via specific tunnel. To this end we propose a mobile IPv6 scenario by including real-time applications such as video- conferencing. As a result of the evaluation, routing optimization method reduces end-to-end delay and packet delay variation because the number of packets experience tunneling is reduced by this method. This results in increasing network performance

    Research on heteregeneous data for recognizing threat

    Get PDF
    The information increasingly large of volume dataset and multidimensional data has grown rapidly in recent years. Inter-related and update information from security communities or vendor network security has present of content vulnerability and patching bug from new attack (pattern) methods. It given a collection of datasets, we were asked to examine a sample of such data and look for pattern which may exist between certain pattern methods over time. There are several challenges, including handling dynamic data, sparse data, incomplete data, uncertain data, and semistructured/unstructured data. In this paper, we are addressing these challenges and using data mining approach to collecting scattered information in routine update regularly from provider or security community

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering

    Get PDF
    Intrusions pose a serious security risk in a network environment. New intrusion types, of which detection systems are unaware, are the most difficult to detect. The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. Our method is able to detect many different types of intrusions, while maintaining a low false positive rate as verified over the Knowledge Discovery and Data Mining - KDD CUP 1999 dataset

    Fuzzy C-Mean And Genetic Algorithms Based Scheduling For Independent Jobs In Computational Grid

    Get PDF
    The concept of Grid computing is becoming the most important research area in the high performance computing. Under this concept, the jobs scheduling in Grid computing has more complicated problems to discover a diversity of available resources, select the appropriate applications and map to suitable resources. However, the major problem is the optimal job scheduling, which Grid nodes need to allocate the appropriate resources for each job. In this paper, we combine Fuzzy C-Mean and Genetic Algorithms which are popular algorithms, the Grid can be used for scheduling. Our model presents the method of the jobs classifications based mainly on Fuzzy C-Mean algorithm and mapping the jobs to the appropriate resources based mainly on Genetic algorithm. In the experiments, we used the workload historical information and put it into our simulator. We get the better result when compared to the traditional algorithms for scheduling policies. Finally, the paper also discusses approach of the jobs classifications and the optimization engine in Grid scheduling

    Utilizing multifaceted requirement traceability approach: a case study

    Get PDF
    Software evolution is inevitable. When a system evolves, there are certain relationships among software artifacts that must be maintained. Requirement traceability is one of the important factors in facilitating software evolution since it maintains the artifacts relationship before and after a change is performed. Requirement traceability can be expensive activities. Many researchers have addressed the problem of requirement traceability, especially to support software evolution activities. Yet, the evaluation results of these approaches show that most of them typically provide only limited support to software evolution. Based on the problems of requirement traceability, we have identified three directions that are important for traceability to support software evolution, i.e. process automation, procedure simplicity, and best results achievement. Those three directions are addressed in our multifaceted approach of requirement traceability. This approach utilizes three facets to generate links between artifacts, i.e. syntactical similarity matching, link prioritization, and heuristic-list based processes. This paper proposes the utilization of multifaceted approach to traceability generation and recovery in facilitating software evolution process. The complete experiment has been applied in a real case study. The results show that utilization of these three facets in generating the traceability among artifacts is better than the existing approach, especially in terms of its accuracy

    Additional Resource Allocation for improving Fairness in WiMAX

    Get PDF
    IEEE 802.16 standard provides resources to both service classes Constant Bit Rate (CBR) and Variable Bit Rate (VBR). Both of these services required enough resources to transmit data efficiently.Considering available literature there is a gap to provide additional resources for fulfillment of the required service class.In this paper we propose a Service Based Fair Resource Allocation (SBFRA) Mechansim, for evaluating the required service from Subscriber (SS) along with the channel condition. Our proposed model evaluates, for providing the required service to SS how much additional resource will be required. In this model we introduced Priority Queue Scheduling Methodology for providing additional resources as per channel condition. In this paper we made comparison with and without proposed model on both traffic, CBR and VBR. We experiment that our proposed model manages the user request by providing them additional resources as required for satisfaction. Their request handled in Priority Queue Scheduling based mechanism. Results shows, that we achieve improvement by providing the additional resource on fair scheduling basis. To achieve the required performance for fairness we have to compromise on with delay

    Attack and Vulnerability Penetration Testing: FreeBSD

    Get PDF
     Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks

    Wireless Body Area Networks for Healthcare Applications: An Overview

    Get PDF
    Healthcare systems have been facing various new challenges due to increasing and rising aging population in healthcare. Advance information and communication technologies have introduced Wireless Body Area Networks (WBANs) for healthcare systems. WBANs provide different monitoring services in healthcare sector for monitoring their patients with more convenience. WBANs are economical solutions and non-invasive technology for healthcare applications. This review paper provides a comprehensive review on WBANs applications, services and recent challenges

    A critical review of MANET testbed using mobile robot Technology

    Get PDF
    This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot m obility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for e xperiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobile robot technology and approach to suit their own specific needs
    corecore