A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Traffic modeling, prediction, and congestion control for high-speed networks: a fuzzy AR approach
2000
IEEE transactions on fuzzy systems
Based on adaptive AR-prediction model and queueing theory, a simple congestion control scheme is proposed to provide an efficient traffic management for high-speed networks. ...
We propose that the use of this fuzzy-AR model has greater potential for congestion control of packet network traffic. ...
Inherently, it is also suitable for prediction of the packet traffic in broad-band networks. Therefore, the fuzzy-AR model has an important potential application in traffic congestion control. ...
doi:10.1109/91.873574
fatcat:d5xcjcqd7zetbodgrjhy3irfkq
ACCPndn: Adaptive Congestion Control Protocol in Named Data Networking by learning capacities using optimized Time-Lagged Feedforward Neural Network
2015
Journal of Network and Computer Applications
This paper develops an Adaptive Congestion Control Protocol in NDN (ACCPndn) by learning capacities in two phases to control congestion traffics before they start impacting the network performance. ...
In the first phase -adaptive trainingwe propose a Time-Lagged Feedforward Network (TLFN) optimized by hybridization of particle swarm optimization and genetic algorithm to predict the source of congestion ...
Network traffic prediction plays an important role in guaranteeing quality of service in computer networks [23] . ...
doi:10.1016/j.jnca.2015.05.017
fatcat:tjus2h73zvgu7ap5s45q5inciy
Artificial intelligence enabled software-defined networking: a comprehensive overview
2019
IET Networks
Our study showed that the research efforts focused on three main sub-fields of AI namely: machine learning, meta-heuristics and fuzzy inference systems. ...
SDN separates the control plane from the data plane and moves the network management to a central point, called the controller, that can be programmed and used as the brain of the network. ...
[230] employed a (LSTM-RNN) approach for predicting traffic matrix. GÉANT traffic matrices and related network states were the input of the LSTM network. ...
doi:10.1049/iet-net.2018.5082
fatcat:celiaiit7jhrfnufpoltuecf5y
Energy Efficient Routing Protocols for Mobile Ad hoc Networks: A Review
2015
International Journal of Computer Applications
As all the participating mobile nodes are mobile in nature in MANET and due to frequent movement of the participating mobile nodes, it is very difficult to predict the topology of the networks at any time ...
participating mobile nodes of the networks. ...
They have derived an asymptotic expression for the computation of the average variablerange transmission and traffic capacity in wireless ad hoc networks. ...
doi:10.5120/ijca2015907255
fatcat:ytwdleyqpzcthjzuxoco7s5ayi
Guest editorial: intelligent techniques in high speed networks
2000
IEEE Journal on Selected Areas in Communications
For example, multimedia traffic prediction for the purpose of traffic shaping or reserving resources, was shown to be much simpler and indeed more accurate using neural networks than traditional linear ...
They combine conventional traffic modeling techniques and fuzzy logic to design call admission control algorithms for ATM. ...
His main technical interests lie in the areas of performance evaluation of high speed networks, neurocomputing in networking, and information management, risk assessment and evaluation for emergency response ...
doi:10.1109/jsac.2000.824786
fatcat:ugin3hwuajhqljqgrnaqpmab3i
Understanding Modern Intrusion Detection Systems: A Survey
[article]
2017
arXiv
pre-print
It attempts to compare the various methods of intrusion techniques. It also describes the various approaches and the importance of IDSs in information security. ...
This paper presents a general overview of IDSs, the way they are classified, and the different algorithms used to detect anomalous activities. ...
Packets are subject to being missed when an IDS is connected to a switch SPAN port, especially when that switch is busy processing a large burst of traffic. ...
arXiv:1708.07174v2
fatcat:56ubkzf3kfd2pbfsw2bury5ww4
Fuzzy logic based anomaly detection for embedded network security cyber sensor
2011
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. ...
The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system. ...
The algorithm extracts fuzzy rules using an adapted version of the online nearest neighbor clustering algorithm directly to the stream of packets. ...
doi:10.1109/cicybs.2011.5949392
dblp:conf/cics/LindaMVW11
fatcat:3kdkwddk45bupeilwvx26f7334
Intrusion detection based on fuzzy logic for wireless body area networks: review and proposition
2022
Indonesian Journal of Electrical Engineering and Computer Science
To make the IDS more efficient, the fuzzy logic (FL) is one of the well-known techniques that is known for its powerful mechanism used to differentiate network traffic levels. ...
In this paper, we start to present an overview of IDS and FL functionality. ...
ACKNOWLEDGEMENTS This work is supported by the Hassan II Academy of Sciences and Technologies and Mohammed First University, Morocco. ...
doi:10.11591/ijeecs.v26.i2.pp1091-1102
fatcat:tsegakljbrestjqwmpicj2tumy
A Multineuron-Based Routing Algorithm of Tile-Based 2-D Mesh
2022
Wireless Communications and Mobile Computing
The result obtained shows that the performance metric for the uniform traffic is slightly better in comparison to XY routing at the higher loads of 80%. ...
The reason for better handling of the loads is due to the parallelization due to the pipeline created by the neural network routing decision. ...
A fuzzy C-means clustering algorithm is used in the SIF. The proposed algorithm is an assurance to achieve balanced clusters over the network. ...
doi:10.1155/2022/6508895
fatcat:yl2qngb4vjabxoiwgjuhshjxle
Shared intelligent optimum route selection through traffic management system in VANET– SIRS
2017
International Journal of Engineering & Technology
This approach consists of isolating the whole network area into clusters. ...
A Vehicular Ad-hoc Network (VANET) consists of the vehicle to vehicle and vehicle to roadside communication. ...
Clustering methods can be suitable for creating scale acceptability in the network [7] . ...
doi:10.14419/ijet.v7i1.2.9037
fatcat:jc5hvvefxvehtatpo4e4q5l6fu
Detection Of UDP Attacks In Software Defined Networks Using Fuzzy Logic
2020
Zenodo
The packets are classified into normal and attack packets. Confusion matrix is used to calculate the accuracy of the model. ...
We further experiment how UDP attack can be performed in SDN, design a fuzzy model using Jfuzzylite library and detect the UDP attack in a software-defined network using fuzzy logic model. ...
The objectives of this project are: designing a model for detecting UDP attack in software-defined network, implementing using Fuzzy Logic technique. ...
doi:10.5281/zenodo.3764653
fatcat:4lbk5kbdtberfbly6zwgye66gq
Guest Editorial Introduction to the Special Issue on Adaptive Learning Systems in Communication Networks
2005
IEEE Transactions on Neural Networks
In the paper by Atiya et al. an adaptive prediction model for MPEG-coded traffic is presented. ...
The paper by Siripongwutikorn et al. presents the use of ABC for a quantitative packet loss rate guarantee to aggregate traffic in packet switched networks. ...
He holds numerous patents involving "sensorless" machine condition assessment technologies and algorithms for training neural networks for use in estimation and control-many of which have been licensed ...
doi:10.1109/tnn.2005.857081
fatcat:sqfcf2ygnbdrrmxz5a5yuehmge
An Adaptive Secure Fuzzy Multicast communication in Large Scale Mobile Ad Hoc Networks
2012
IOSR Journal of Computer Engineering
Multicast protocols in MANETs must consider control overhead for maintenance, energy efficiency of nodes and routing trees managements to frequent changes of network topology. ...
The mobility of nodes will always increase the communication delay because of re-clustering and cluster head selections. ...
Adaptive fuzzy logic based security-level In this section, an adaptive fuzzy logic based Security-Level algorithm is presented. ...
doi:10.9790/0661-0712232
fatcat:fen64ljprvbx5fgeyydpxiaufu
Diverse Congestion Control Schemes for Wireless Sensor Networks
2021
Turkish Journal of Computer and Mathematics Education
In this paper, an extensive study of earlier reported diverse congestion techniques explicitly diverse Algorithm based - and Layer based-congestion techniques is carried out. ...
Furthermore, a demonstration is carried out for contemporary earlier reported strategies such as Pro-AODV, CC-AODV, EDAPR, ED-AODV and PCC-AODV by evaluating delay, packet delivery ratio (PDR) and packet ...
Congestion control for MUlti-class Traffic (COMUT), a cluster-based mechanism supports multiple classes of traffic for sensor networks [18] . ...
doi:10.17762/turcomat.v12i6.5401
fatcat:7z4wrczagfdbfi3qr4jowag7z4
A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention
2018
International Journal of Security and Its Applications
Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes ...
for implementing them. ...
This second line of defence is based on a clustering technique considered as an unsupervised learning algorithm, which helps to detect anomalous traffic in WSNs. ...
doi:10.14257/ijsia.2018.12.4.02
fatcat:hvw3wlfyuzffdn4jm6azad5zje
« Previous
Showing results 1 — 15 out of 1,691 results