1,691 Hits in 6.0 sec

Traffic modeling, prediction, and congestion control for high-speed networks: a fuzzy AR approach

Bor-Sen Chen, Sen-Chueh Peng, Ku-Chen Wang
2000 IEEE transactions on fuzzy systems  
Based on adaptive AR-prediction model and queueing theory, a simple congestion control scheme is proposed to provide an efficient traffic management for high-speed networks.  ...  We propose that the use of this fuzzy-AR model has greater potential for congestion control of packet network traffic.  ...  Inherently, it is also suitable for prediction of the packet traffic in broad-band networks. Therefore, the fuzzy-AR model has an important potential application in traffic congestion control.  ... 
doi:10.1109/91.873574 fatcat:d5xcjcqd7zetbodgrjhy3irfkq

ACCPndn: Adaptive Congestion Control Protocol in Named Data Networking by learning capacities using optimized Time-Lagged Feedforward Neural Network

Amin Karami
2015 Journal of Network and Computer Applications  
This paper develops an Adaptive Congestion Control Protocol in NDN (ACCPndn) by learning capacities in two phases to control congestion traffics before they start impacting the network performance.  ...  In the first phase -adaptive trainingwe propose a Time-Lagged Feedforward Network (TLFN) optimized by hybridization of particle swarm optimization and genetic algorithm to predict the source of congestion  ...  Network traffic prediction plays an important role in guaranteeing quality of service in computer networks [23] .  ... 
doi:10.1016/j.jnca.2015.05.017 fatcat:tjus2h73zvgu7ap5s45q5inciy

Artificial intelligence enabled software-defined networking: a comprehensive overview

Majd Latah, Levent Toker
2019 IET Networks  
Our study showed that the research efforts focused on three main sub-fields of AI namely: machine learning, meta-heuristics and fuzzy inference systems.  ...  SDN separates the control plane from the data plane and moves the network management to a central point, called the controller, that can be programmed and used as the brain of the network.  ...  [230] employed a (LSTM-RNN) approach for predicting traffic matrix. GÉANT traffic matrices and related network states were the input of the LSTM network.  ... 
doi:10.1049/iet-net.2018.5082 fatcat:celiaiit7jhrfnufpoltuecf5y

Energy Efficient Routing Protocols for Mobile Ad hoc Networks: A Review

M. Izharul, S.P. Singh, M N
2015 International Journal of Computer Applications  
As all the participating mobile nodes are mobile in nature in MANET and due to frequent movement of the participating mobile nodes, it is very difficult to predict the topology of the networks at any time  ...  participating mobile nodes of the networks.  ...  They have derived an asymptotic expression for the computation of the average variablerange transmission and traffic capacity in wireless ad hoc networks.  ... 
doi:10.5120/ijca2015907255 fatcat:ytwdleyqpzcthjzuxoco7s5ayi

Guest editorial: intelligent techniques in high speed networks

E. Gelenbe, I.W. Habib, S. Palazzo, C. Douligeris
2000 IEEE Journal on Selected Areas in Communications  
For example, multimedia traffic prediction for the purpose of traffic shaping or reserving resources, was shown to be much simpler and indeed more accurate using neural networks than traditional linear  ...  They combine conventional traffic modeling techniques and fuzzy logic to design call admission control algorithms for ATM.  ...  His main technical interests lie in the areas of performance evaluation of high speed networks, neurocomputing in networking, and information management, risk assessment and evaluation for emergency response  ... 
doi:10.1109/jsac.2000.824786 fatcat:ugin3hwuajhqljqgrnaqpmab3i

Understanding Modern Intrusion Detection Systems: A Survey [article]

Liu Hua Yeo, Xiangdong Che, Shalini Lakkaraju
2017 arXiv   pre-print
It attempts to compare the various methods of intrusion techniques. It also describes the various approaches and the importance of IDSs in information security.  ...  This paper presents a general overview of IDSs, the way they are classified, and the different algorithms used to detect anomalous activities.  ...  Packets are subject to being missed when an IDS is connected to a switch SPAN port, especially when that switch is busy processing a large burst of traffic.  ... 
arXiv:1708.07174v2 fatcat:56ubkzf3kfd2pbfsw2bury5ww4

Fuzzy logic based anomaly detection for embedded network security cyber sensor

Ondrej Linda, Milos Manic, Todd Vollmer, Jason Wright
2011 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)  
Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm.  ...  The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.  ...  The algorithm extracts fuzzy rules using an adapted version of the online nearest neighbor clustering algorithm directly to the stream of packets.  ... 
doi:10.1109/cicybs.2011.5949392 dblp:conf/cics/LindaMVW11 fatcat:3kdkwddk45bupeilwvx26f7334

Intrusion detection based on fuzzy logic for wireless body area networks: review and proposition

Asmae Bengag, Amina Bengag, Omar Moussaoui
2022 Indonesian Journal of Electrical Engineering and Computer Science  
To make the IDS more efficient, the fuzzy logic (FL) is one of the well-known techniques that is known for its powerful mechanism used to differentiate network traffic levels.  ...  In this paper, we start to present an overview of IDS and FL functionality.  ...  ACKNOWLEDGEMENTS This work is supported by the Hassan II Academy of Sciences and Technologies and Mohammed First University, Morocco.  ... 
doi:10.11591/ijeecs.v26.i2.pp1091-1102 fatcat:tsegakljbrestjqwmpicj2tumy

A Multineuron-Based Routing Algorithm of Tile-Based 2-D Mesh

Neetu Faujdar, Akash Punhani, Ankush Agarwal, Pradeep Kumar, Ajitesh Kumar, Mariusz Glabowski
2022 Wireless Communications and Mobile Computing  
The result obtained shows that the performance metric for the uniform traffic is slightly better in comparison to XY routing at the higher loads of 80%.  ...  The reason for better handling of the loads is due to the parallelization due to the pipeline created by the neural network routing decision.  ...  A fuzzy C-means clustering algorithm is used in the SIF. The proposed algorithm is an assurance to achieve balanced clusters over the network.  ... 
doi:10.1155/2022/6508895 fatcat:yl2qngb4vjabxoiwgjuhshjxle

Shared intelligent optimum route selection through traffic management system in VANET– SIRS

Mukund B Wagh, N. Gomathi
2017 International Journal of Engineering & Technology  
This approach consists of isolating the whole network area into clusters.  ...  A Vehicular Ad-hoc Network (VANET) consists of the vehicle to vehicle and vehicle to roadside communication.  ...  Clustering methods can be suitable for creating scale acceptability in the network [7] .  ... 
doi:10.14419/ijet.v7i1.2.9037 fatcat:jc5hvvefxvehtatpo4e4q5l6fu

Detection Of UDP Attacks In Software Defined Networks Using Fuzzy Logic

G.O. Ogunleye, Fasan Oluwabukola
2020 Zenodo  
The packets are classified into normal and attack packets. Confusion matrix is used to calculate the accuracy of the model.  ...  We further experiment how UDP attack can be performed in SDN, design a fuzzy model using Jfuzzylite library and detect the UDP attack in a software-defined network using fuzzy logic model.  ...  The objectives of this project are: designing a model for detecting UDP attack in software-defined network, implementing using Fuzzy Logic technique.  ... 
doi:10.5281/zenodo.3764653 fatcat:4lbk5kbdtberfbly6zwgye66gq

Guest Editorial Introduction to the Special Issue on Adaptive Learning Systems in Communication Networks

A.G. Parlos, C. Ji, T. Parisini, M. Baglietto, A.F. Atiya, K. Claffy
2005 IEEE Transactions on Neural Networks  
In the paper by Atiya et al. an adaptive prediction model for MPEG-coded traffic is presented.  ...  The paper by Siripongwutikorn et al. presents the use of ABC for a quantitative packet loss rate guarantee to aggregate traffic in packet switched networks.  ...  He holds numerous patents involving "sensorless" machine condition assessment technologies and algorithms for training neural networks for use in estimation and control-many of which have been licensed  ... 
doi:10.1109/tnn.2005.857081 fatcat:sqfcf2ygnbdrrmxz5a5yuehmge

An Adaptive Secure Fuzzy Multicast communication in Large Scale Mobile Ad Hoc Networks

B. G. Obula Reddy
2012 IOSR Journal of Computer Engineering  
Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology.  ...  The mobility of nodes will always increase the communication delay because of re-clustering and cluster head selections.  ...  Adaptive fuzzy logic based security-level In this section, an adaptive fuzzy logic based Security-Level algorithm is presented.  ... 
doi:10.9790/0661-0712232 fatcat:fen64ljprvbx5fgeyydpxiaufu

Diverse Congestion Control Schemes for Wireless Sensor Networks

Amit Grover Et al.
2021 Turkish Journal of Computer and Mathematics Education  
In this paper, an extensive study of earlier reported diverse congestion techniques explicitly diverse Algorithm based - and Layer based-congestion techniques is carried out.  ...  Furthermore, a demonstration is carried out for contemporary earlier reported strategies such as Pro-AODV, CC-AODV, EDAPR, ED-AODV and PCC-AODV by evaluating delay, packet delivery ratio (PDR) and packet  ...  Congestion control for MUlti-class Traffic (COMUT), a cluster-based mechanism supports multiple classes of traffic for sensor networks [18] .  ... 
doi:10.17762/turcomat.v12i6.5401 fatcat:7z4wrczagfdbfi3qr4jowag7z4

A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention

Ayei E. Ibor, Florence A. Oladeji, Olusoji B. Okunoye
2018 International Journal of Security and Its Applications  
Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes  ...  for implementing them.  ...  This second line of defence is based on a clustering technique considered as an unsupervised learning algorithm, which helps to detect anomalous traffic in WSNs.  ... 
doi:10.14257/ijsia.2018.12.4.02 fatcat:hvw3wlfyuzffdn4jm6azad5zje
« Previous Showing results 1 — 15 out of 1,691 results