Next Issue
Volume 3, March
Previous Issue
Volume 2, September
 
 

Network, Volume 2, Issue 4 (December 2022) – 10 articles

Cover Story (view full-size image): The rapid growth in the IoT network is associated with significant security threats. Network scanning can be used to identify these threats and provide countermeasures in IoT devices. It is necessary to know the status of the communication environment and the reason why network scanning failed. This paper aims to estimate the cause of a failure/delay in network scanning over wireless networks in IoT devices connected to IP networks where a scan packet or its response may sometimes be dropped or delayed. The correct estimation of the cause of a failure/delay in the network scan is achievable using a multimodel-based cause estimator. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
37 pages, 13547 KiB  
Tutorial
Coexistence of Railway and Road Services by Sharing Telecommunication Infrastructure Using SDN-Based Slicing: A Tutorial
by Radheshyam Singh, José Soler, Tidiane Sylla, Leo Mendiboure and Marion Berbineau
Network 2022, 2(4), 670-706; https://doi.org/10.3390/network2040038 - 01 Dec 2022
Cited by 1 | Viewed by 2278
Abstract
This paper provides a detailed tutorial to develop a sandbox to emulate coexistence scenarios for road and railway services in terms of sharing telecommunication infrastructure using software-defined network (SDN) capabilities. This paper provides detailed instructions for the creation of network topology using Mininet–WiFi [...] Read more.
This paper provides a detailed tutorial to develop a sandbox to emulate coexistence scenarios for road and railway services in terms of sharing telecommunication infrastructure using software-defined network (SDN) capabilities. This paper provides detailed instructions for the creation of network topology using Mininet–WiFi that can mimic real-life coexistence scenarios between railways and roads. The network elements are programmed and controlled by the ONOS SDN controller. The developed SDN application can differentiate the data traffic from railways and roads. Data traffic differentiation is carried out using a VLAN tagging mechanism. Further, it also provides comprehensive information about the different tools that are used to generate the data traffic that can emulate messaging, video streaming, and critical data transmission of railway and road domains. It also provides the steps to use SUMO to represent the selected coexistence scenarios in a graphical way. Full article
(This article belongs to the Special Issue Network Slicing)
Show Figures

Figure 1

27 pages, 3774 KiB  
Article
Cloud Workload and Data Center Analytical Modeling and Optimization Using Deep Machine Learning
by Tariq Daradkeh and Anjali Agarwal
Network 2022, 2(4), 643-669; https://doi.org/10.3390/network2040037 - 18 Nov 2022
Cited by 1 | Viewed by 2477
Abstract
Predicting workload demands can help to achieve elastic scaling by optimizing data center configuration, such that increasing/decreasing data center resources provides an accurate and efficient configuration. Predicting workload and optimizing data center resource configuration are two challenging tasks. In this work, we investigate [...] Read more.
Predicting workload demands can help to achieve elastic scaling by optimizing data center configuration, such that increasing/decreasing data center resources provides an accurate and efficient configuration. Predicting workload and optimizing data center resource configuration are two challenging tasks. In this work, we investigate workload and data center modeling to help in predicting workload and data center operation that is used as an experimental environment to evaluate optimized elastic scaling for real data center traces. Three methods of machine learning are used and compared with an analytical approach to model the workload and data center actions. Our approach is to use an analytical model as a predictor to evaluate and test the optimization solution set and find the best configuration and scaling actions before applying it to the real data center. The results show that machine learning with an analytical approach can help to find the best prediction values of workload demands and evaluate the scaling and resource capacity required to be provisioned. Machine learning is used to find the optimal configuration and to solve the elasticity scaling boundary values. Machine learning helps in optimization by reducing elastic scaling violation and configuration time and by categorizing resource configuration with respect to scaling capacity values. The results show that the configuration cost and time are minimized by the best provisioning actions. Full article
(This article belongs to the Special Issue Advanced Technologies in Network and Service Management)
Show Figures

Figure 1

15 pages, 1175 KiB  
Article
Detection of Malicious Network Flows with Low Preprocessing Overhead
by Garett Fox and Rajendra V. Boppana
Network 2022, 2(4), 628-642; https://doi.org/10.3390/network2040036 - 04 Nov 2022
Cited by 4 | Viewed by 2987
Abstract
Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their use to offline analysis of previously [...] Read more.
Machine learning (ML) is frequently used to identify malicious traffic flows on a network. However, the requirement of complex preprocessing of network data to extract features or attributes of interest before applying the ML models restricts their use to offline analysis of previously captured network traffic to identify attacks that have already occurred. This paper applies machine learning analysis for network security with low preprocessing overhead. Raw network data are converted directly into bitmap files and processed through a Two-Dimensional Convolutional Neural Network (2D-CNN) model to identify malicious traffic. The model has high accuracy in detecting various malicious traffic flows, even zero-day attacks, based on testing with three open-source network traffic datasets. The overhead of preprocessing the network data before applying the 2D-CNN model is very low, making it suitable for on-the-fly network traffic analysis for malicious traffic flows. Full article
(This article belongs to the Special Issue Advanced Technologies in Network and Service Management)
Show Figures

Figure 1

22 pages, 3405 KiB  
Article
Protecting Chiller Systems from Cyberattack Using a Systems Thinking Approach
by Shaharyar Khan and Stuart Madnick
Network 2022, 2(4), 606-627; https://doi.org/10.3390/network2040035 - 02 Nov 2022
Cited by 1 | Viewed by 1895
Abstract
Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and ransomware, the vulnerabilities and dangers posed by industrial [...] Read more.
Recent world events and geopolitics have brought the vulnerability of critical infrastructure to cyberattacks to the forefront. While there has been considerable attention to attacks on Information Technology (IT) systems, such as data theft and ransomware, the vulnerabilities and dangers posed by industrial control systems (ICS) have received significantly less attention. What is very different is that industrial control systems can be made to do things that could destroy equipment or even harm people. For example, in 2021 the US encountered a cyberattack on a water treatment plant in Florida that could have resulted in serious injuries or even death. These risks are based on the unique physical characteristics of these industrial systems. In this paper, we present a holistic, integrated safety and security analysis, we call Cybersafety, based on the STAMP (System-Theoretic Accident Model and Processes) framework, for one such industrial system—an industrial chiller plant—as an example. In this analysis, we identify vulnerabilities emerging from interactions between technology, operator actions as well as organizational structure, and provide recommendations to mitigate resulting loss scenarios in a systematic manner. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

23 pages, 9511 KiB  
Article
An Efficient Information Retrieval System Using Evolutionary Algorithms
by Doaa N. Mhawi, Haider W. Oleiwi, Nagham H. Saeed and Heba L. Al-Taie
Network 2022, 2(4), 583-605; https://doi.org/10.3390/network2040034 - 28 Oct 2022
Cited by 5 | Viewed by 4720
Abstract
When it comes to web search, information retrieval (IR) represents a critical technique as web pages have been increasingly growing. However, web users face major problems; unrelated user query retrieved documents (i.e., low precision), a lack of relevant document retrieval (i.e., low recall), [...] Read more.
When it comes to web search, information retrieval (IR) represents a critical technique as web pages have been increasingly growing. However, web users face major problems; unrelated user query retrieved documents (i.e., low precision), a lack of relevant document retrieval (i.e., low recall), acceptable retrieval time, and minimum storage space. This paper proposed a novel advanced document-indexing method (ADIM) with an integrated evolutionary algorithm. The proposed IRS includes three main stages; the first stage (i.e., the advanced documents indexing method) is preprocessing, which consists of two steps: dataset documents reading and advanced documents indexing method (ADIM), resulting in a set of two tables. The second stage is the query searching algorithm to produce a set of words or keywords and the related documents retrieving. The third stage (i.e., the searching algorithm) consists of two steps. The modified genetic algorithm (MGA) proposed new fitness functions using a cross-point operator with dynamic length chromosomes with the adaptive function of the culture algorithm (CA). The proposed system ranks the most relevant documents to the user query by adding a simple parameter (∝) to the fitness function to guarantee the convergence solution, retrieving the most relevant user’s document by integrating MGA with the CA algorithm to achieve the best accuracy. This system was simulated using a free dataset called WebKb containing Worldwide Webpages of computer science departments at multiple universities. The dataset is composed of 8280 HTML-programed semi-structured documents. Experimental results and evaluation measurements showed 100% average precision with 98.5236% average recall for 50 test queries, while the average response time was 00.46.74.78 milliseconds with 18.8 MB memory space for document indexing. The proposed work outperforms all the literature, comparatively, representing a remarkable leap in the studied field. Full article
(This article belongs to the Special Issue Advanced Technologies in Network and Service Management)
Show Figures

Figure 1

15 pages, 2102 KiB  
Article
An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications
by Maria Papathanasaki, Panagiotis Fountas and Kostas Kolomvatsos
Network 2022, 2(4), 568-582; https://doi.org/10.3390/network2040033 - 25 Oct 2022
Viewed by 1242
Abstract
The ever-increasing demand for services of end-users in the Internet of Things (IoT) often causes great congestion in the nodes dedicated to serving their requests. Such nodes are usually placed at the edge of the network, becoming the intermediates between the IoT infrastructure [...] Read more.
The ever-increasing demand for services of end-users in the Internet of Things (IoT) often causes great congestion in the nodes dedicated to serving their requests. Such nodes are usually placed at the edge of the network, becoming the intermediates between the IoT infrastructure and Cloud. Edge nodes offer many advantages when adopted to perform processing activities that are realized close to end-users, limiting the latency in the provision of responses. In this article, we attempt to solve the problem of the potential overloading of edge nodes by proposing a mechanism that always keeps free space in their queue to host high-priority processing tasks. We introduce a proactive, self-healing mechanism that utilizes the principles of Fuzzy Logic, in combination with a non-parametric statistical method that reveals the trend of nodes’ loads as depicted by the incoming tasks and their capability to serve them in the minimum possible time. Through our approach, we manage to ensure the uninterrupted service of high-priority tasks, taking into consideration the demand for tasks as well. Based on this approach, we ensure the fastest possible delivery of results to the requestors while keeping the latency for serving high-priority tasks at the lowest possible levels. A set of experimental scenarios is adopted to evaluate the performance of the suggested model by presenting the corresponding numerical results. Full article
(This article belongs to the Special Issue Emerging Networks and Systems for Edge Computing)
Show Figures

Figure 1

23 pages, 2429 KiB  
Article
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems
by John Kafke and Thiago Viana
Network 2022, 2(4), 545-567; https://doi.org/10.3390/network2040032 - 18 Oct 2022
Cited by 1 | Viewed by 1841
Abstract
Voice over IP is quickly becoming the industry standard voice communication service. While using an IP-based method of communication has many advantages, it also comes with a new set of challenges; voice networks are now accessible to a multitude of internet-based attackers from [...] Read more.
Voice over IP is quickly becoming the industry standard voice communication service. While using an IP-based method of communication has many advantages, it also comes with a new set of challenges; voice networks are now accessible to a multitude of internet-based attackers from anywhere in the world. One of the most prevalent threats to a VoIP network are Denial-of-Service attacks, which consume network bandwidth to congest or disable the communication service. This paper looks at the current state of research into the mitigation of these attacks against VoIP networks, to see if the mechanisms in place are enough. A new framework is proposed titled the “Call Me Maybe” framework, combining elements of latency monitoring with dynamic protocol switching to mitigate DoS attacks against VoIP systems. Research conducted around routing VoIP over TCP rather than UDP is integrated into the proposed design, along with a latency monitoring mechanism to detect when the service is under attack. Data gathered from a Cisco Packet Tracer simulation was used to evaluate the effectiveness of the solution. The gathered results have shown that there is a statistically significant improvement in the response times of voice traffic when using the “Call Me Maybe” framework in a network experiencing a DoS attack. The research and findings therefore aim to provide a contribution to the enhancement of the security of VoIP and future IP-based voice communication systems. Full article
Show Figures

Figure 1

26 pages, 3495 KiB  
Article
A Multimodel-Based Approach for Estimating Cause of Scanning Failure and Delay in IoT Wireless Network
by Babatunde Ojetunde, Naoto Egashira, Kenta Suzuki, Takuya Kurihara, Kazuto Yano and Yoshinori Suzuki
Network 2022, 2(4), 519-544; https://doi.org/10.3390/network2040031 - 12 Oct 2022
Viewed by 1845
Abstract
The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet [...] Read more.
The rapid growth in the IoT network comes with a huge security threat. Network scanning is considered necessary to identify vulnerable IoT devices connected to IP networks. However, most existing network scanning tools or system do not consider the burden of scan packet traffic on the network, especially in the IoT network where resources are limited. It is necessary to know the status of the communication environment and the reason why network scanning failed. Therefore, this paper proposes a multimodel-based approach which can be utilized to estimate the cause of failure/delay of network scanning over wireless networks where a scan packet or its response may sometimes be dropped or delayed. Specifically, the factors that cause network scanning failure/delay were identified and categorized. Then, using a machine learning algorithm, we introduced a multimodel linear discriminant analysis (MM-LDA) to estimate the cause of scan failure/delay based on the results of network scanning. In addition, a one-to-many model and a training data filtering technique were adopted to ensure that the estimation error was drastically reduced. The goal of our proposed method was to correctly estimate the causes of scan failure/delay in IP-connected devices. The performance of the proposed method was evaluated using computer simulation assuming a cellular (LTE) network as the targeted IoT wireless network and using LTE-connected devices as the targeted IoT devices. The proposed MM-LDA correctly estimates the cause of failure/delay of the network scan at an average probability of 98% in various scenarios. In comparison to other conventional machine learning classifiers, the proposed MM-LDA outperforms various classification methods in the estimation of the cause of scan failure/delay. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Figure 1

19 pages, 848 KiB  
Article
Quality of Experience Experimentation Prediction Framework through Programmable Network Management
by Ahmed Osama Basil Al-Mashhadani, Mu Mu and Ali Al-Sharbaz
Network 2022, 2(4), 500-518; https://doi.org/10.3390/network2040030 - 08 Oct 2022
Viewed by 1693
Abstract
Quality of experience (QoE) metrics can be used to assess user perception and satisfaction in data services applications delivered over the Internet. End-to-end metrics are formed because QoE is dependent on both the users’ perception and the service used. Traditionally, network optimization has [...] Read more.
Quality of experience (QoE) metrics can be used to assess user perception and satisfaction in data services applications delivered over the Internet. End-to-end metrics are formed because QoE is dependent on both the users’ perception and the service used. Traditionally, network optimization has focused on improving network properties such as the quality of service (QoS). In this paper we examine adaptive streaming over a software-defined network environment. We aimed to evaluate and study the media streams, aspects affecting the stream, and the network. This was undertaken to eventually reach a stage of analysing the network’s features and their direct relationship with the perceived QoE. We then use machine learning to build a prediction model based on subjective user experiments. This will help to eliminate future physical experiments and automate the process of predicting QoE. Full article
(This article belongs to the Special Issue Emerging Networks and Systems for Edge Computing)
Show Figures

Figure 1

21 pages, 4367 KiB  
Article
NFV/SDN as an Enabler for Dynamic Placement Method of mmWave Embedded UAV Access Base Stations
by Gia Khanh Tran, Masanori Ozasa and Jin Nakazato
Network 2022, 2(4), 479-499; https://doi.org/10.3390/network2040029 - 26 Sep 2022
Cited by 9 | Viewed by 1995
Abstract
In the event of a major disaster, base stations in the disaster area will cease to function, making it impossible to obtain life-saving information. Therefore, it is necessary to provide a wireless communication infrastructure as soon as possible. To cope with this situation, [...] Read more.
In the event of a major disaster, base stations in the disaster area will cease to function, making it impossible to obtain life-saving information. Therefore, it is necessary to provide a wireless communication infrastructure as soon as possible. To cope with this situation, we focus on NFV/SDN (Network Function Virtualization/Software-Defined Networking)-enabled UAVs equipped with a wireless communication infrastructure to provide services. The access link between the UAV and the user is assumed to be equipped with a millimeter-wave interface to achieve high throughput. However, the use of millimeter-waves increases the effect of attenuation, making the deployment of UAVs problematic. In addition, if multiple UAVs are deployed in a limited frequency band, co-channel interference will occur between the UAVs, resulting in a decrease in the data rate. Therefore, in this paper, we propose a method that combines UAV placement and frequency division for a non-uniform user distribution in an environment with multiple UAVs. As a result, it is found that the offered data rate is improved by using our specific placement method, in terms of not only the average but also the outage user rate. Full article
(This article belongs to the Special Issue Network Slicing)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop