Joint Traffic Routing and Distribution of Security Services in High Speed Networks

Size: px
Start display at page:

Download "Joint Traffic Routing and Distribution of Security Services in High Speed Networks"

Transcription

1 Joint Traffic Routing and Distribution of Security Services in High Speed Networks Andreas Hess Telecommunication Networks Group Technical University Berlin, Germany Sudipta Sengupta Microsoft Research Redmond, WA, USA Vijay P. Kumar VPK Technologies Holmdel, NJ, USA Abstract The continued explosion of new virus/worm and other security attacks in the Internet and the tremendous propagation speed of self-propagating attacks has led to network security being considered as a design criterion rather than an afterthought. Attack prevention, detection, and mitigation mechanisms can be broadly classified as network based or host based. Network based security mechanisms have been shown to be much more effective than host based mechanisms, primarily because of the former s ability in identifying attack traffic that is further upstream from the victim and closer to the attack source. In the context of network based mechanisms, we consider a flexible overlay network of security systems running on top of programmable (active) routers. In such an architecture, security services can be dynamically distributed across the network, which provides flexibility for load-balancing of services across nodes and addition of new services over time. Such network based mechanisms inevitably decrease network performance as all packets are analyzed for malicious content before being forwarded. In this paper, we consider traffic routing, placement of active router nodes, and distribution of security services across such nodes so as to optimize certain objectives, including (i) minimize the total number of active router deployed nodes, and (ii) minimize the maximum utilization of any router node in the network. Based on an emulation in the Deter testbed we show the benefit of the presented approach. I. INTRODUCTION Recent developments show that communication networks cannot be secured by sporadic and uncoordinated security devices like firewalls at users and cooperates sites. Moreover, it cannot be expected that all users and administrators will be able to keep their system(s) secure and thus, we think that the protection of end systems should be done in the network. For the purpose, we propose a flexible overlay network of intrusion prevention systems (IPS) running on top of an active networking environment. Active networks consist of programmable nodes (active nodes) on which, for example, IPS services can be dynamically deployed for the purpose of creating overlay networks. In this paper, we remove respective assumptions in two previous approaches either the routes are given or placement of security nodes is given and provide a framework for joint optimization of both design choices. On the one hand, [3] shows how to intelligently distribute security services to efficiently protect end-systems against attacks coming from the Internet. Here, the authors assumed pre-defined routes and tree-based topology. On the other hand, [5] developed a heuristic for the placement of content-filtering nodes in a network, and, given the placement of such nodes, designed a fully polynomial time approximation scheme (FPTAS) that maximizes the traffic carried by the network subject to the constraint that all traffic passes through a content filtering node at least once. We envisage that the contribution of this paper can be applied in a network planning setting where estimated traffic patterns can be used to deploy security services at selected nodes and provision paths for load-balanced routing in the network. We develop two mixed integer linear programming (MILP) formulations that assign the routes and simultaneously place programmable router nodes and distribute security services across these nodes so as to (i) minimize the number of nodes where programmable routers are deployed, or (ii) minimize the maximum utilization of any router node in the network. Any other linear objective function can also be accommodated. In the first approach, the MILP calculates the optimal single path route for each source-destination pair in the network. In the second approach, the set of available routes for each source-destination pair is predefined and multipath routing is allowed. II. JOINT TRAFFIC ROUTING AND DISTRIBUTION OF SECURITY SERVICES In this section, we present our concept for distributed intrusion prevention in high-speed networks. It is based on two pillars: the FIDRAN architecture, which enables the dynamic integration of security services on a programmable router, and the optimal placement of security services in the network. A. The FIDRAN Architecture This section briefly describes the FIDRAN architecture; for a detailed discussion we refer to [4]. The framework consists of core components which run permanently and of add-on components the security services which are dynamically integrated into the system as needed (cf. Fig. 1). The core functionality comprises the traffic selector, the security policy, the control/management module and the default queuing discipline. Security services are implemented as loadable modules featuring IPS specific networking services. The capabilities provided by the underlying programmable networking infrastructure allow to distribute the FIDRAN system on pro-

2 i Packets 1 Trace Point i 2 Security Policy Traffic Selector Drop Management Module Queues 3 4 Forward Fig. 1. Control Module Service Process Chains S 2 S 7... S m S 2... S 4 S 5... S l S 4... S 1 S 2... S n S 1... The FIDRAN architecture 5 Network grammable routers. The dynamic creation of an IPS overlay network is thereby enabled. Secure communication between programmable nodes is also provided. All network traffic is redirected to the traffic selector, which according to the rules specified in the security policy assigns the traffic to one of the categories: forward, process or drop. Traffic that is assigned to the category forward is directly forwarded and not analyzed by any installed security service (see Fig. 1). It is either not necessary to check this traffic (e. g. encrypted traffic, IPSec), or another programmable node on the route to the end-system is in charge of doing so. Traffic in the category process is queued and analyzed by specific security services. The detailed proceeding for queuing and analysis as well as the reaction in case of a detected attack is also specified in the security policy. Finally, traffic belonging to the category drop is blocked altogether by the traffic selector. The management and the control modules are responsible for the configuration of the FIDRAN system. The management module is the interface between the overlay network of programmable routers and the FIDRAN system. Hence, it is able to trigger the download of a security service from a service repository. The control module coordinates the downloaded security services. Most attacks are based on a vulnerability that is specific for an operating system, protocol or application, so a modularization of the protection services is possible. In order to realize a demand-driven intrusion prevention system, the required security services for a specific set of destinations are concatenated and stored in a service process chain. A process chain is a linked list of security services with an unique identifier that is composed of IP-address(es), port(s), and protocol. A security service can be part of one or more process chains. In addition, each security service keeps track of the amount of alarms it raised and the packets it dropped. Once the chains are set up, the control module takes a packet from one of the waiting queues, inspects it, and forwards it to the appropriate process chain. The security services contain the intrusion prevention intelligence that actually provides protection against attacks. According to the statistics recorded by them, they are reordered in regular intervals in order to optimize the internal packet processing. B. Modeling Packet Processing Times The processing time for a packet can be modeled as a sum of three components: the basic delay T base representing the routing delay in a standard network router; the delay T active representing the overhead necessary to decide whether a packet must be processed on the programmable router (applies only if the router is programmable); the sum of the processing times T s for each service s that is applied to a packet. Accordingly, the total processing time for a packet that receives services in the set A S at a node is given by T base + T active + s A T s For further details on the individual components we refer to [3]. C. Distribution of Services with Single Path Routing We first consider the single path routing version of the problem, where a demand is routed along a single path from source to destination under the constraint that it is analyzed by all security services. Multi-path routing, considered in the next section, allows the demand to be split across multiple paths from source destination. Given a network with link capacities, traffic demands, and packet processing times as above, we consider the problem of routing, placement of programmable routers, and distribution of security services, so as to minimize the total number of nodes with deployed programmable routers. Towards the end of this section, we consider a second objective function also. Let routing variable ze k have value 1 if the routing of demand k uses link e, value 0 otherwise. Let variable wi k have value 1 if node i is on the routed path for demand k, value 0 otherwise. Let service distribution variable yis k be the fraction of demand k that is provided service type s at node i. Let variable x i have value 1 if node i is a programmable router node, value 0 otherwise. Then, our problem can be expressed as the following polynomial size mixed integer linear program (MILP): subject to e E + (i) z k e minimize e E (i) e E (i) e E + (i) z k e = i N x i { +1 if i = s(k) 1 if i = d(k) 0 otherwise i N, k D (1) z k e 1 i N, k D (2) z k e 1 i N, k D (3)

3 i N w k i = { 1 if i = s(k) or d(k) e E (i) zk e otherwise i N, k D (4) y k is w k i i N, k D, s S (5) y k is x i i N, k D, s S (6) y k is = 1 k D, s S (7) t(k)w k i T base 1 i N (8) t(k)w k i (T base + T active) + t(k) T sy k is s S 1 + C(1 x i) i N (9) z k e u e e E (10) z k e, wk i, xi {0, 1} e E, i N, k D (11) y k is 0 i N, k D, s S (12) Constraints (1)-(4) involve the routing of the demands. Constraints (1) corresponding to the routing of one unit of flow from node i to node j along a single path. Constraints (2) and (3) guarantee that the paths are loop-free by enforcing that the total in-degree or out-degree of used links at any node is at most 1. Constraints (4) say that a node i (other than source or destination) is on the path for routing demand k if it has an incident link that is used. Constraints (5)-(7) involve the deployment of programmable routers at nodes and the distribution of services among such nodes. Constraints (5) model the fact that the routed demand k can receive some security service at node i only if node i is on the path. Constraints (6) model the additional requirement that such a node should have a programmable router deployed. Constraints (7) state that for each demand and for each type of service, the fraction of traffic processed over all nodes on the routed path should be 1. Constraints (8)-(9) model stability conditions for packet processing times. The total traffic entering node i is f i = t(k)wk i. Thus, the average time between consecutive packet arrivals is 1/f i. The stability condition for a node i without a programmable router is T base 1/f i, or f i T base 1. This is constraint (8). This constraint becomes redundant if x i = 1 (i.e., node i has a programmable router) due to the presence of constraint (9). The average processing time of a packet at a programmable router node i is T base + T active + t(k)w k i f i T s yis k s S Now observe that the bilinear product term wi kyk is is 0 when wi k = 0, i.e., when node i is not on the path for demand k. In that case, yis k is also 0. Otherwise, when wk i = 1, the product term equals yis k. Thus, in both case, we have wk i yk is = yk is. Hence, the average processing time becomes T base + T active + 1 t(k) T s yis k f i s S This must be at most 1/f i, whence f i (T base + T active ) + t(k) s S T s y k is 1 This corresponds to constraint (9). We have added a term C(1 x i ) on the right-hand-side of (9), where C = t(k)(t base + T active + s S T s ) so that this constraint is correct when node i has a programmable router (x i = 1), and is redundant otherwise (x i = 0). Finally, constraints (10) are the link capacity constraints. It is well known that the performance of a router rapidly degrades as packet processing times approach inter-packet arrival times. Motivated by this, we might want to minimize the maximum ratio of average packet processing time to the average packet inter-arrival time at each node. The value of this ratio at a node i is the left-hand-size of constraint (8) if node i is not a programmable router, or constraint (9) is node i is a programmable router. If we denote the maximum value of this ratio over all nodes by v, we want to minimize v subject to constraints (1)-(7) and (10)-(12), with constraints (8)-(9) replaced by t(k)wi k T base v i N (13) t(k)wi k (T base + T active ) + t(k) T s yis k s S v + C(1 x i ) i N (14) The mixed integer linear programs outlined in this section and the next can be solved using a standard MILP solver like CPLEX. D. Distribution of Services with Multi-Path Routing In this section, we modify the MILP formulation for single path routing to allow routing of the demand to be split across multiple paths from source destination. Let P k denote the set of available paths from source s(k) to destination d(k) for routing demand k. For example, we could choose the K- shortest hop paths from s(k) to d(k) as the set P k. The routing variables now become z k (P ) which denotes the amount of traffic on path P for routing demand k. Also, let service distribution variable yis k (P ) be the amount (and not fraction) from z k (P ) that is provided service type s at node i. The variable yis k (P ) is defined only if node i appears on path P. We will simplify notation and use P to denote either the set of nodes or the set of links on path P (the specific use will be clear from the context). Then, the multi-path routing version of our problem can be expressed as the following polynomial size mixed integer linear program (MILP):

4 STTL CHIN subject to minimize i N x i z k (P ) = t(k) k D (15) P P k y k is (P ) t(k)xi i N, P P k, k D, s S (16) y k is (P ) = zk (P ) P P k, SNVA r 9 r 10 r 3 r 7 Fig. 2. r 6 r 5 The Abilene network r 2 r 8 r 11 NYCM WASH P i P i i P k D, s S (17) z k (P )T base 1 i N (18) z k (P )(T base + T active) + P e T sy k is (P ) P i s S 1 + C(1 x i) i N (19) z k (P ) u e e E (20) x i {0, 1} i N (21) z k (P ), y k is (P ) 0 i N, P P k, k D, s S (22) In a manner analogous to that in the previous section, we can minimize the maximum ratio of average packet processing time to the average packet inter-arrival time at each node. The value of this ratio at a node i is the left-hand-size of constraint (18) if node i is not a programmable router, or constraint (19) is node i is a programmable router. If we denote the maximum value of this ratio over all nodes by v, we want to minimize v subject to constraints (15)-(17) and (20)-(22), with constraints (18)-(19) replaced by z k (P )T base v i N (23) P i T s yis(p k ) z k (P )(T base + T active ) + P i P i s S v + C(1 x i ) III. EMULATION i N (24) The performance of FIDRAN was assessed on the Cyber Defense Technology Experimental Research testbed (DETER) [2], [7] which is a shared infrastructure designed for mediumscale repeatable experiments in computer security. The testbed provides a pool of over 300 computers of varying hardware which can be used to emulate networks. As scenario we chose the Abilene network depicted in Figure 2 which is a research IP backbone connecting multiple universities across the US. For this network real world data traffic flows and link capacities is available on the project s web-site [1]. Reference [3] describes in detail the FIDRAN prototype implemented which includes a set of security services and LOSA r 4 which was used throughout the experiments. Table I represents the traffic matrix, the column index specifies the source and the row index the destination. Measurements of local-area and wide-area network traffic have shown that packet-switched data traffic is self-similar. Glen Kramer implemented a tool [6] to synthetically generate self-similar network traffic traces by the superposition of a large number of 0/1 renewal processes whose ON and OFF periods are heavy tailed distributed. Finally, to avoid effects of congestion and flow control mechanisms all experiments were restricted to Udp-traffic. To consider the hardware resources provided by the DETER testbed, the network was emulated on a scale of 1 : 100 which means that traffic rates were divided by 100 and accordingly the delays were multiplied by 100. A. The Abilene Network In the network each subnet sends data to all other subnets resulting in an overall number of 30 traffic flows. The propagation delay for each link was specified by dividing the distance from start node to end node by the speed of light. Table I represents the traffic matrix, the column index specifies the source and the row index the destination. To generate the traffic each subnet is supplied with an UDP sender for each destination which generates self-similar traffic as described above. Each experiment lasted 1800s and contained the sending of over 7, 500, 000 packets. TABLE I THE ABILENE TRAFFIC MATRIX [MBPS] To CHIN LOSA NYCM SNVA STTL WASH CHIN X LOSA X NYCM X SNVA X STTL X WASH X Each traffic flow must be analyzed by three security services, whereby the service processing times T s were scaled as mentioned. We study the performance of the solutions obtained for both presented MILPs (single-path routing and multipath routing) with the objective of minimizing the maximum router utilization, and compare them to the solutions of the MILPs presented in [3] extended to generalized topologies. r 1

5 Drop-rate [packets/s] No Dijkstra SP MP end-to-end-delay [s] No Dijkstra SP MP Flow-ID (a) Flow-specific drop rates Flow-ID (b) Flow-specific end-to-end-delays Fig. 3. Results for Abilene Network IV. RESULTS Our objective is to balance the router load while providing security service to all packets and not increase the delay or drop performance of the network, thus appropriate metrics must be used. The performance of the placement strategies is evaluated in terms of mean packet drop rates and end-toend-delays. Figure 3(a) depicts for all deployment strategies the flowspecific packet drop rates as well as flow-specific end-to-end delays. The flow-ids are assigned according to the traffic matrix, for example, the flow from CHIN to LOSA has the flow-id 1 and ID 15 identifies the flow from NYCM to WASH. The flow-specific average end-to-end-delays are depicted in Figure 3(b). The impact of doing intrusion prevention is evident in both figures. Initially, almost no drops occur in case that no FIDRAN system is running on a router. Then independent of the strategy chosen the deployment of security services in the network causes packet loss. When comparing strategies Dijkstra, MP and SP with each other, it can be seen that both optimal deployment strategies clearly reduce the packet drop rates. For example, considering the flow of the highest volume from WASH to NYCM flow-id 28 the mean drop rate is 51packets/sec for the Dijkstra strategy, 28packets/sec for the SP strategy and finally, 14packets/sec for the MP strategy. The high average end-to-end-delays for the Dijkstra strategy depicted in Figure 3(b) and are correlated to the drop-rates (Figure 3(a)). Nearly all packets the red boxes in Figure 3(a) represent the number of packets that are dropped when no router is running a security service are dropped by FIDRAN systems whose waiting queues are filled and consequently, no further packets are accepted. Furthermore, packets in the waiting queue have to wait to be served. V. DISCUSSION Providing security to communication networks requires that packets be inspected for malicious contents and, consequently, impacts normal network operation. In this paper we presented an optimization framework for joint traffic routing and service placement, which can be used to study that impact, while fulfilling a pre-definied objective. Here, we presented objective function that minimize the amount of security-enabled routers or the maximum router load. Using a scenario based on a real network the Abilene network we showed that the routing and deployment strategies obtained as solution to the problems formulated balance the network load and significantly reduce the overall dropping rate. For the scenario under consideration, we also showed that the joint optimization of single path routing and service placement is a big improvement with respect to optimal service placement over routes calculated with the Dijkstra algorithm, since the latter does not take the additional router load due to security processing into account. Good solutions were obtained for both presented strategies. The single-path strategy tends to generate long paths to disburden heavy loaded routers. In contrast, the multi-path strategy splits huge flow into smaller ones and reroutes these over different paths. Both solutions shows that they balance the load well. REFERENCES [1] The Abilene Network. [2] T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experience with DETER: a testbed for security research. In Testbeds and Research Infrastructures for the Development of Networks and Communities TRIDENTCOM, March [3] A. Hess, H. F. Geerdes, and R. Wessäly. Intelligent distribution of intrusion prevention services on programmable routers. In Proc. of 25th IEEE INFOCOM, Barcelona, Spain, May [4] A. Hess, M. Jung, and G. Schäfer. FIDRAN: A flexible Intrusion Detection and Response Framework for Active Networks. In 8th IEEE Symposium on Computers and Communications (ISCC 2003), Kemer,Antalya,Turkey, July [5] M. Kodialam, T. V. Lakshman, and Sudipta Sengupta. Configuring networks with content filtering nodes with applications to network security. In IEEE INFOCOM, [6] Glen Kramer. Synthetic traffic generation. kramer/research.html. [7] Cyber Defense Technology Experimental Research. The deter testbed: Overview. Oct

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department

More information

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks

A Fuzzy Logic-Based Information Security Management for Software-Defined Networks A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Distributed Denial of Service (DDoS)

Distributed Denial of Service (DDoS) Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 [CRT14] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 Date: Wednesday 27 th May 2015 Time: 14:00 16:00

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Path Optimization in Computer Networks

Path Optimization in Computer Networks Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host

More information

LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M. F. Elsayed [email protected]

LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M. F. Elsayed khaled@ieee.org LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M F Elsayed khaled@ieeeorg Hassan Fadel Amin M Nassar anassar@engcuedueg hassanfadel@egticomeg Department of Electronics and

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

Network Traffic Monitoring on DETER

Network Traffic Monitoring on DETER Network Traffic Monitoring on DETER Efrain Plascencia Graduate Mentors: Saurabh Amin, Blaine Nelson, Dr. Suzanna Schmeelk Faculty Mentor: Professor S. Shankar Sastry July 30 th, 2010 Research Experience

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {[email protected]}, Microsoft Corporation,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park and Sneha Kumar Kasera School of Computing, University of Utah Email: {jcpark, kasera}@cs.utah.edu Abstract

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Introducing the BIG-IP and Check Point VPN-1/FireWall-1 LB, HALB, VPN, and ELA configurations Configuring the BIG-IP and Check Point FireWall-1

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Network Level Multihoming and BGP Challenges

Network Level Multihoming and BGP Challenges Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.

More information

SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1

SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Supporting Differentiated QoS in MPLS Networks

Supporting Differentiated QoS in MPLS Networks Supporting Differentiated QoS in MPLS Networks Roberto A. Dias 1, Eduardo Camponogara 2, and Jean-Marie Farines 2 1 Federal Technology Center of Santa Catarina, Florianópolis, 88020-300, Brazil 2 Federal

More information

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

The Interaction of Forward Error Correction and Active Queue Management

The Interaction of Forward Error Correction and Active Queue Management The Interaction of Forward Error Correction and Active Queue Management Tigist Alemu, Yvan Calas, and Alain Jean-Marie LIRMM UMR 5506 CNRS and University of Montpellier II 161, Rue Ada, 34392 Montpellier

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Siuli Roy 1, Dola Saha 1, Somprakash Bandyopadhyay 1, Tetsuro Ueda 2, Shinsuke

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

ENSC 427: Communication Networks

ENSC 427: Communication Networks Spring 2012 ENSC 427: Communication Networks Creating a Secure Network through Firewalls and Virtual Private Networks http://www.sfu.ca/~msa102 Team #2 Maxim Soleimani-Nouri Andy Cheng Saman Mehdizadeh

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

Firewall Policy Anomalies- Detection and Resolution

Firewall Policy Anomalies- Detection and Resolution Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee

Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee International Journal of Science and Engineering Vol.4 No.2(2014):251-256 251 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee Yu-Jia Chen, Feng-Yi Lin and Li-Chun Wang Department of

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Internet Security Firewalls

Internet Security Firewalls Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor

More information

Advanced Computer Networks IN2097. 1 Dec 2015

Advanced Computer Networks IN2097. 1 Dec 2015 Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department

More information

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service

More information

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

Aspen Solutions. Branch Office IP Telephony: Improving the Reliability of Voice over Virtual Private Networks. Introduction TECHNICAL NOTE

Aspen Solutions. Branch Office IP Telephony: Improving the Reliability of Voice over Virtual Private Networks. Introduction TECHNICAL NOTE Aspen Solutions Branch Office IP Telephony: Improving the Reliability of Voice over Virtual Private Networks TECHNICAL NOTE Introduction IP PBX and IP phones are increasingly being deployed by small and

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

Business Cases for Brocade Software-Defined Networking Use Cases

Business Cases for Brocade Software-Defined Networking Use Cases Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,

More information