期刊文献+
共找到65篇文章
< 1 2 4 >
每页显示 20 50 100
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
1
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
2
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Network traffic identification in packet sampling environment
3
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 network measurement Application identification Packet sampling Application behavior CHARACTERISTIC Metric correlation network management
下载PDF
Development Methodologies for Network Softwarization: A Comparison of DevOps, NetOps, and Verification
4
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2023年第5期97-104,共8页
This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provid... This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provides recommendations for organizations looking to adopt network softwarization. 展开更多
关键词 Development Methodologies network Softwarization DevOps NetOps VERIFICATION Software-Defined networking network Function Virtualization Automation COLLABORATION Testing Validation network Operations network Management
下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
5
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed Web network management CORBA JAVA
下载PDF
Machine learning-based zero-touch network and service management:a survey 被引量:2
6
作者 Jorge Gallego-Madrid Ramon Sanchez-Iborra +1 位作者 Pedro M.Ruiz Antonio F.Skarmeta 《Digital Communications and Networks》 SCIE CSCD 2022年第2期105-123,共19页
The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosio... The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosion along the end-to-end network chain has increased the complexity in the coordinated orchestration of different segments composing the whole infrastructure.The Zero-touch Network and Service Management(ZSM)concept has recently emerged to automatically orchestrate and manage network resources while assuring the Quality of Experience(QoE)demanded by users.Machine Learning(ML)is one of the key enabling technologies that many ZSM frameworks are adopting to bring intelligent decision making to the network management system.This paper presents a comprehensive survey of the state-of-the-art application of ML-based techniques to improve ZSM performance.To this end,the main related standardization activities and the aligned international projects and research efforts are deeply examined.From this dissection,the skyrocketing growth of the ZSM paradigm can be observed.Concretely,different standardization bodies have already designed reference architectures to set the foundations of novel automatic network management functions and resource orchestration.Aligned with these advances,diverse ML techniques are being currently exploited to build further ZSM developments in different aspects,including multi-tenancy management,traffic monitoring,and architecture coordination,among others.However,different challenges,such as the complexity,scalability,and security of ML mechanisms,are also identified,and future research guidelines are provided to accomplish a firm development of the ZSM ecosystem. 展开更多
关键词 Zero-touch network and service management(ZSM) Next generation networks(NGN) Artificial intelligence(AI) Machine learning(ML)
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
7
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and Digital Rights Management Technology ZTE ISDB ATSC
下载PDF
A Survey on Event Mining for ICT Network Infrastructure Management 被引量:1
8
作者 LIU Zheng LI Tao WANG Junchang 《ZTE Communications》 2016年第2期47-55,共9页
1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred milli... 1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred million [2]. The fast growth ol the lnternet pusnes me rapid development of information technology (IT) and communication technology (CT). Many traditional IT service and CT equipment providers are facing the fusion of IT and CT in the age of digital transformation, and heading toward ICT enterprises. Large global ICT enterprises, such as Apple, Google, Microsoft, Amazon, Verizon, and AT&T, have been contributing to the performance improvement of IT service and CT equipment. 展开更多
关键词 event mining failure prediction log analysis network infrastructure management root cause analysis
下载PDF
Several Key Issues in Networking Management of Analytic Instruments 被引量:3
9
作者 LIU Jie 《International Journal of Plant Engineering and Management》 2008年第2期89-95,共7页
To improve the application of networking to analytic instruments, a kind of networking method based on conversion module between serial port RS-232 and protocol TCP/IP of MOXA Company is studied and compared with trad... To improve the application of networking to analytic instruments, a kind of networking method based on conversion module between serial port RS-232 and protocol TCP/IP of MOXA Company is studied and compared with traditional methods. Several characteristic classifications of equipment are summarized, and the methods of relevant data treatment are introduced. The key technical issues and successful cases are also presented which provides the networking of equipment in laboratories with a flexible and highly efficient solution. 展开更多
关键词 analytic instrument networking management TCP/IP RS-232
下载PDF
An Emulating Environment for Network Management of Space Network
10
作者 ZHANG Jun HUANG Yingjun +1 位作者 LI Guohui WU Defeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第2期365-369,共5页
An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling ... An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling network, which consist of sets of HLA/RTI based federates. These federates described the different aspect of the attributes of the satellites, such as orbit coordinate, routing table and the chain budget. We described the architecture of the emulation environment and the software design of federates. We measured the response time of the protocol data units and verified the detecting of the network topology in the environment. The environment was open that the on board router and the simulator of satellite link which developed by third party could be integrated. 展开更多
关键词 space network emulating network management HLA/RTI (High Level Architecture/Runtime infrastructure)
下载PDF
Research and Design of IPv6 Network Management and Operations Support System
11
作者 Chen Bin Ji Wenchong Qiu Zhonghui (China Network Communications Group Corporation, Beijing 100032, China) 《ZTE Communications》 2006年第1期16-20,共5页
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a... IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition. 展开更多
关键词 work Research and Design of IPv6 network Management and Operations Support System Design RFC IETF NMS MIB RMON NGI SNMP ICMP
下载PDF
Load Balancing Fat-Tree on Long-Lived Flows:Avoiding Congestion in a Data Center Network
12
作者 Wen Gao Xuyan Li +1 位作者 Boyang Zhou Chunming Wu 《ZTE Communications》 2014年第2期57-62,共6页
In a data center network (DCN), load balancing is required when servers transfer data on the same path. This is necessary to avoid congestion. Load balancing is challenged by the dynamic transferral of demands and c... In a data center network (DCN), load balancing is required when servers transfer data on the same path. This is necessary to avoid congestion. Load balancing is challenged by the dynamic transferral of demands and complex routing control. Because of the distributed nature of a traditional network, previous research on load balancing has mostly focused on improving the performance of the local network; thus, the load has not been optimally balanced across the entire network. In this paper, we propose a novel dynamic load-balancing algorithm for fat-tree. This algorithm avoids congestions to the great possible extent by searching for non-conflicting paths in a centralized way. We implement the algorithm in the popular software-defined networking architecture and evaluate the algorithm' s performance on the Mininet platform. The results show that our algorithm has higher bisection band- width than the traditional equal-cost multi-path load-balancing algorithm and thus more effectively avoids congestion. 展开更多
关键词 data center network software-defined networking load balancing network management
下载PDF
Management and Control of Outsourcing in Dispersed Network Manufacturing Systems
13
作者 Rob Dekkers Luping Wang 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期249-,共1页
The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at t... The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at tention to the management of the total value chain and therefore puts emphasis o n outsourcing. In fact, outsourcing is an efficient way of utilizing available r esources and has become one key aspect of the manufacturing strategy. Improved d ecision and organization on outsourcing will result in cost production and short er lead-times. However, most concepts and practice of traditional outsourcing do not adapt to t he changing environment and meet increasing performance requirements. On the oth er hand, virtual organisations might display instability between pure outsourcin g and establishing alliance. Balance and trade-off between independent agents a nd creating alliance are thus required. Therefore, the purpose of this paper is to develop a model to support decision-making, management and control on outsou rcing in a dispersed network manufacturing system and to discuss several key iss ues that are relevant to the relationship between the agents of the network. Dev elopment of the model will deploy Applied System Theory and will be built on fou ndations of earlier research on industrial management such the theories of Outso urcing, Order Entry Points, Design of Organisations and Logistic Control. The is sues that will be addressed in this paper are: · The selection of suppliers and co-makers; · Communication between suppliers and clients; · The mechanisms for profit-sharing between agents; · The product data management to integrate the knowledge of the different agent s into product design. Industrial companies will benefit from this research by the practical methods an d implementation extending their business models beyond concepts for outsourcing and alliances. Additionally, the exploration will lead to proactive contributio n of manufacturing during engineering, which would improve management and contro l of dispersed manufacturing systems. 展开更多
关键词 Management and Control of Outsourcing in Dispersed network Manufacturing SYSTEMS
下载PDF
Security,Controllability,Manageability and Survivability in Trustworthy Network
14
作者 Wang Sheng, Yu Hongfang, Xu Du (School of Communication and Information Engineering ,University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China) 《ZTE Communications》 2008年第1期33-38,共6页
The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming m... The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming more and more obvious. Although the Internet community came up with a consensus that the future network should be trustworthy, the concept of 'trustworthy networks' and the ways leading us to a trustworthy network are not yet clear. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy network. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. The network trustworthiness could and should be eventually achieved. 展开更多
关键词 Security Controllability Manageability and Survivability in Trustworthy network NET
下载PDF
The Design of Management Software for Network Device Faults
15
作者 KOU Ya-nan, LI Guo-li, LI Zeng-zi Institute of Computer Architecture & Network, Xi’an Jiaotong University, Xi’an 710038, P. R. China 《International Journal of Plant Engineering and Management》 2001年第1期52-56,共5页
Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general func... Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general functions, server functions, client functions and a database table. The software can make it convenient to monitoring a network device, and improve network efficiency. 展开更多
关键词 network management device fault SERVER CLIENT DATABASE
下载PDF
Research and Design of Network Management Construction Based on Mobile AGENT
16
作者 Yuan-Hui Yu 《Journal of Electronic Science and Technology of China》 2007年第3期215-217,共3页
The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA struc... The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems. 展开更多
关键词 HARBOR manage center monitored node network management construction based on agent.
下载PDF
Research on Digital and Analog Electronic Experiment Teaching Course Management based on UltraLab Network Experiment Platform
17
作者 FAN Yiqiang ZHANG Jing +2 位作者 YU Haoran HE Guannan YUAN Hongfang 《International Journal of Plant Engineering and Management》 2018年第4期206-215,共10页
Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of ele... Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of electronics. In order to make teachers teaching more efficiently and students studying more quickly,how to update the experimental course in teaching reform is the key point. This paper analyzing the present situation of teaching in the digital circuit and analog circuit courses,the teaching questions in universities. On the basis of it,the innovation measures of experimental teaching methods and contents are discussed. Our school tries to introduce the UltraLab network experiment platform,reform and optimize the teaching methods of related courses.And it’ s accelerating the construction and development of emerging engineering education’ s process,reducing effectively the teacher’s time for managing in equipment,improving the students’ ability to use instruments. 展开更多
关键词 Index terms-teaching reform in digital and analog circuit UltraLab network experimental platform network management for equipment Emerging engineering education
下载PDF
Design of Power Communication Data Network Management System and Implementation of Data Acquisition Module
18
作者 Yue Zhang Zefeng Jian Hao Wang 《Journal of Electronic Research and Application》 2021年第6期1-5,共5页
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem... The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data. 展开更多
关键词 Electric power communication network management system design Data acquisition
下载PDF
Inventory Management and Demand Forecasting Improvement of a Forecasting Model Based on Artificial Neural Networks
19
作者 Cisse Sory Ibrahima Jianwu Xue Thierno Gueye 《Journal of Management Science & Engineering Research》 2021年第2期33-39,共7页
Forecasting is predicting or estimating a future event or trend.Supply chains have been constantly growing in most countries ever since the industrial revolution of the 18th century.As the competitiveness between supp... Forecasting is predicting or estimating a future event or trend.Supply chains have been constantly growing in most countries ever since the industrial revolution of the 18th century.As the competitiveness between supply chains intensifies day by day,companies are shifting their focus to predictive analytics techniques to minimize costs and boost productivity and profits.Excessive inventory(overstock)and stock outs are very significant issues for suppliers.Excessive inventory levels can lead to loss of revenue because the company's capital is tied up in excess inventory.Excess inventory can also lead to increased storage,insurance costs and labor as well as lower and degraded quality based on the nature of the product.Shortages or out of stock can lead to lost sales and a decline in customer contentment and loyalty to the store.If clients are unable to find the right products on the shelves,they may switch to another vendor or purchase alternative items.Demand forecasting is valuable for planning,scheduling and improving the coordination of all supply chain activities.This paper discusses the use of neural networks for seasonal time series forecasting.Our objective is to evaluate the contribution of the correct choice of the transfer function by proposing a new form of the transfer function to improve the quality of the forecast. 展开更多
关键词 Inventory management Demand forecasting Seasonal time series Artificial neural networks Transfer function Inventory management Demand forecasting Seasonal time series Artificial neural networks Transfer function
下载PDF
Application of GIS and GPS technologies in managing a statewide groundwater monitoring and assessment network in the state of Minnesota,USA
20
《Global Geology》 1998年第1期85-85,共1页
关键词 GIS GPS Application of GIS and GPS technologies in managing a statewide groundwater monitoring and assessment network in the state of Minnesota USA USA
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部