17 research outputs found

    Assay of IP mobility management in SDN based mobile network architecture

    Get PDF
    The evolution towards mobile networks flat architecture entreat a key-role for IP mobility management in providing the ubiquitous always-on network access services. This paper provides prospects for efficient mobility management in SDN plus mobile network architecture and describe important call control flows in inter system handover scenario. Distribution of gateway function approach has been followed and evolved with SDN technology. Key improvements with proposed architecture are to support seamless mobility in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. The paper assays the proposed evolution in terms of numbers of signaling messages processed by control entities for an inter system handover procedure relative to current mobile network architecture

    User Profiling Based on Application-Level Using Network Metadata.

    Get PDF
    There is an increasing interest to identify users and behaviour profiling from network traffic metadata for traffic engineering and security monitoring. Network security administrators and internet service providers need to create the user behaviour traffic profile to make an informed decision about policing, traffic management, and investigate the different network security perspectives. Additionally, the analysis of network traffic metadata and extraction of feature sets to understand trends in application usage can be significant in terms of identifying and profiling the user by representing the user's activity. However, user identification and behaviour profiling in real-time network management remains a challenge, as the behaviour and underline interaction of network applications are permanently changing. In parallel, user behaviour is also changing and adapting, as the online interaction environment changes. Also, the challenge is how to adequately describe the user activity among generic network traffic in terms of identifying the user and his changing behaviour over time. In this paper, we propose a novel mechanism for user identification and behaviour profiling and analysing individual usage per application. The research considered the application-level flow sessions identified based on Domain Name System filtering criteria and timing resolution bins (24-hour timing bins) leading to an extended set of features. Validation of the module was conducted by collecting Net Flow records for a 60 days from 23 users. A gradient boosting supervised machine learning algorithm was leveraged for modelling user identification based upon the selected features. The proposed method yields an accuracy for identifying a user based on the proposed features up to 74

    Toward enhanced data exchange capabilities for the oneM2M service platform.

    Get PDF

    Using Burstiness for Network Applications Classification.

    Get PDF
    Network traffic classification is a vital task for service operators, network engineers, and security specialists to manage network traffic, design networks, and detect threats. Identifying the type/name of applications that generate traffic is a challenging task as encrypting traffic becomes the norm for Internet communication. Therefore, relying on conventional techniques such as deep packet inspection (DPI) or port numbers is not efficient anymore. This paper proposes a novel flow statistical-based set of features that may be used for classifying applications by leveraging machine learning algorithms to yield high accuracy in identifying the type of applications that generate the traffic. The proposed features compute different timings between packets and flows. This work utilises tcptrace to extract features based on traffic burstiness and periods of inactivity (idle time) for the analysed traffic, followed by the C5.0 algorithm for determining the applications that generated it. The evaluation tests performed on a set of real, uncontrolled traffic, indicated that the method has an accuracy of 79% in identifying the correct network application.</jats:p
    corecore