ArticlePDF Available

Network Traffic Management using Dynamic Bandwidth on Demand

Authors:

Abstract

Traffic Analysis and measurement in large networks is very challenging task for network managers. Bandwidth plays a vital role during network traffic analysis and management. Bandwidth allocation becomes a critical issue for effective network management. Bandwidth on demand concept gradually evolved while addressing the need of network managers for monitoring on-demand traffic. Use of efficient bandwidth allocation algorithm significantly improves network performance by assuring availability of network to all users. In this paper, we propose an optimized algorithm using the concept “rating of web pages”, which is based on users’ past accessibility. This algorithm assigns a minimum guaranteed bandwidth to each connected user, instead of equally dividing the total available bandwidth among the users. Finally, based on rating of web pages, any excess bandwidth is distributed dynamically among existing users. This significantly improves the average utilization of available bandwidth.
Abstract Traffic Analysis and measurement in large
networks is very challenging task for network managers.
Bandwidth plays a vital role during network traffic analysis and
management. Bandwidth allocation becomes a critical issue for
effective network management. Bandwidth on demand concept
gradually evolved while addressing the need of network
managers for monitoring on-demand traffic. Use of efficient
bandwidth allocation algorithm significantly improves network
performance by assuring availability of network to all users. In
this paper, we propose an optimized algorithm using the concept
rating of web pages”, which is based on users’ past accessibility.
This algorithm assigns a minimum guaranteed bandwidth to
each connected user, instead of equally dividing the total
available bandwidth among the users. Finally, based on rating of
web pages, any excess bandwidth is distributed dynamically
among existing users. This significantly improves the average
utilization of available bandwidth.
Index Terms Network Traffic classification, Software Defined
Network, BoD, SeLeCT, Load balancing, Incremental clustering.
I. INTRODUCTION
In the current scenario, almost all business
applications are being carried out over Internet. Online
businesses increasingly rely on Internet for its basic
operations. Along with increase in the complexity of Internet
services, there is drastic increase in Content Delivery
Networks (CDNs) and mobile Internet usage. With the growth
of technology along with increase in users, complexity will
continue to increase in the future. According to survey done
by CISCO in 2016, nearly 40% of the world population has
Internet connection which was less than 1% in 1995. Hence
there is a high demand for Internet traffic management.
Traffic Engineering (TE) deals with the measurement
and management of network traffic to designs optimized
network traffic for routing and improving network resources
utilization. When number of user increases, it causes
bottleneck problem in accessing the network. Passive network
is an effective solution to the bottleneck problem in accessing
P. C. Sethi is Ph.D scholar and working as Senior Research Fellow (SRF)
in Department of Computer Science and Appications, Utkal University, Vani
Vihar, Bhubaneswar, Odisha, India. The author can be reached over e-mail:
pcsethijrf14@utkaluniversity.ac.in.
P. K. Behera is working as Reader (Associate Professor) in Department of
Computer Science and Appications, Utkal University, Vani Vihar,
Bhubaneswar, Odisha, India. The author can be reached over e-mail:
p_behera@hotmail.com.
This work is supported under UGC grant RGNF-2013-14-ORI-49267.
the network. Remote device configuration, network
performance monitoring, network resource usage verification
and network fault detection are the major responsibilities of
SNMP. A third-party SNMP management software or a user
defined SNMP management software can be used for network
management.
This research paper deals with a diverse research
interests that focuses on Traffic Engineering (TE) based
Software Defined Network (SDN) for network traffic
monitoring, network traffic measurement and management for
efficient processing as compared to traditional processing.
SDN is a way to deal with network organization that permits
the network managers to manage the system based on abstract
lower-level functionality. Since the static design of traditional
network doesn't bolster the dynamic, versatile figuring and
capacity needs of more advanced processing situations, SDN
idea is utilized by the various data center. This is
accomplished by decoupling or disassociating the framework
that settles on choices about where network traffic is available.
SDN is commonly associated with the OpenFlow protocols.
To begin with, we propose a reference system for TE
in SDN based on page rating. It comprises of two sections,
such as, network traffic estimation and network traffic
administration. Network traffic was estimated by monitoring
the real network and breaking down the system into different
activities. Network traffic estimation is the prerequisite for
traffic administration. Network traffic measurement and
forecasting is the fundamental requirement in the network
traffic management. Traffic load balancing, guaranteed
scheduling of network information are the related fields of
network traffic management. Here, network traffic
management using web page rating was proposed for
improving the quality of service.
The rest of this paper is organized as follows: Section 2
presents the literature overview related to network traffic
management, section 3 describes the proposed work, section 4
contains the proposed algorithm implemented using page
rating, section 5 deals with the experimental result and section
6 provides performance of the algorithm and section 7
provides the conclusion. Section 8 contains the future scope of
the research work.
Network Traffic Management using
Dynamic Bandwidth on Demand
P. C. Sethi, P. K. Behera
P. G. Department of Computer Science, Utkal University, Vani Vihar, Bhunaneswar, Odisha, India
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
369
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
II. LITERATURE OVERVIEW
Network traffic may occur due to the exponential growth
of Internet user and limited availability of various Internet
resources. According to Cisco, the global smartphone traffic
will increase by ten folds by 2019 [figure-1].
[Fig-1: Increase in Traffic Chart by Smart Phone users]
Millions of users relay on various broadband connections.
The ratio of bandwidth supply by different broadband service
providers are represented in figure-2.
[Fig-2: Ration of supply bandwidth by different Broadband
Service Providers]
Traffic engineering (TE) deals with the study of network
traffic analysis and measurement. Efficient routing
mechanisms are proposed by network traffic engineers to
reduce network resource utilization, control network traffic
and enhance network quality of service (QoS). A Software
Defined Network (SDN) is a new technique of traffic
engineering which works in two layers such as forwarding and
controlling layer of network system. The administrator of
system can perform forwarding to enhance the ability of
network system by appropriate task specification. In
comparison with traditional network traffic management, SDN
has many points of interest to bolster TE for globalized, fast
programmability of network system processing.
Data layer traffic and control layer traffic are two
major categories of network traffic which affects performance
of network system. The data layer traffic uses load balancing
concept for network traffic management. Contrasted with the
customary system, the primary favorable advantage of load
balancing in SDN is that it allows a centralized; stream
oriented centralized traffic management instead of a
distributed approach. Network Organization is done for
efficient system accessibility and performance enhancement.
We had proposed a Sensible network traffic management
approach for dynamic data processing, traffic management
and load balancing to enhance QoS of network.
SDN enables network traffic engineers to select
appropriate path out of various available paths between pair of
nodes participating in network. The SDN controller keeps up
worldwide perspective of present utilization of every way in
system utilizing different network traffic parameters. We had
proposed a network traffic management algorithm for dynamic
streaming of data, traffic management, load balancing, and
efficient QoS.
Various dynamic bandwidth allocation techniques are
widely studies in literatures [1-5]. In [1], the authors proposed
a probabilistic sampling approach for efficient traffic flow
control. Flow-based analysis was applied that reduced the high
volume of network traffic by dividing it into flows generators.
Flow-based analysis detection and monitoring of traffic was
applied for distribution of traffic flow uniformly. Since flow-
based analysis provides poor performance, so monitoring
technique was applied for traffic analysis and concluded that
flow-based monitoring technique provides efficient traffic
management than traditional approach.
In [2], the author proposed a method using link
dimension for traffic monitoring. Link dimension is used to
calculate packet level measurement and deploy packet
sampling technique for traffic monitoring. Three packet
sampling techniques such as Bernoulli sampling, n-in-N
sampling and sFlow sampling was done and concluded that
packet sampling have no negative impact based on sampling
rate and packet sampling. The accuracy of system remains
unaffected even for too short timescales such as 10 ms using
large dataset around the world.
In [3], the author proposed a novel technique for precise
and competent stream oriented latency calculation using load
balancing for traffic management. The latency was measured
based on packet size according to the capacity of network
without involving any time stamping or inquiry packets. A
new approach called COLATE (Counter based Perflow
Latency Estimation scheme) was applied that adds noise for
storage space minimization. Using a statistical approach,
packets are denoise to get that actual latency. For secured
implementation, single hashing along with single memory
update was applied in COLATE for each packet. COLATE
utilized less than 0.1 bits per packet. So, the connection can
accommodate nearly million packets per second. Accordingly,
a single 1 TB drive can be used to store timestamp for more
than 6 years COLATE timestamp data connections. Three
types of network traffic traces were considered such as
backbone, enterprise, and server traffic for efficient analysis of
the proposed system.
In [4], the authors proposed an automated network
protocol identification approach for traffic classification. A
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
370
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
secured semantic trace based information system was applied
for traffic classification. It does not need any prior knowledge
of protocol specification rather frequency rank distribution
concept was applied for management of network traffic. It
supports both connectionless as well as connection oriented
protocols for both short and long flow of data. The average
accuracy of recall is nearly 97.4% with precision nearly
98.4%.
In [5], the authors had proposed an efficient algorithm to
improve network quality of service using dynamic bandwidth
allocation. In a network, each node is assigned with equal
bandwidth which was not utilized properly. Taking the traffic
conditions into consideration, the algorithm was proposed to
provide a guaranteed access and utilize the bandwidth
properly. The resources are allocated following load balancing
condition. In [6], the authors proposed an approach for a
dynamic environment based on clustering. The dynamic
environment was defined as a zero-configuration system i.e.
any type of device can participate in the networking system
using plug-and-play concept for improving the quality of
service. [7, 8] involves a rank based clustering. [7] used click
stream approach for ranking of the pages, accordingly the
clusters are created. The authors guaranteed 100 percent data
transmission, but the time of processing is not considered.
[8,9] provided secured and faster searching approach based
using GFGS (Generalized Frequent Common Gram) technique
by SeLeCT (Self Learning Classifier) following self-seeding
approach on that involves less on-chip memory for processing.
In [10], the authors provided a brief comparison of various
security algorithms. In [11], the authors provided a more
secured approach using RSA algorithm that involves same
processing time but with increased security of data and [12]
contains the description of SeLeCT algorithm.
III. PROPOSED WORK
The data rate reinforced by a network is called
bandwidth. Bandwidth is calculated as difference between
highest and the lowest frequency supported by a network.
Generally, bandwidth is expressed in terms of bits per second
(bps) OR bytes per second (Bps). The theoretical bandwidth
distribution and real-world bandwidth always differs. For
example, theoretically Gigabit Ethernet network supports
1,000 Mbps bandwidth, but in practical this can’t be achieved
due to the overhead of hardware and system software. Hence
bandwidth calculation becomes a challenging task for network
traffic managers. Allocation of bandwidth depends on many
parameters such as type of application running, service level
agreement, hardware performance used for implementation.
Most of the time, network managers only consider number of
user involvement as the major parameter for traffic
management, but instead of number of user involved, the
actual work done by user will affect network performance
during traffic analysis. For example, in a group of 100 users in
network, each user doesn’t utilize network equally; few user
leads to bottleneck problem to the network. So, the traditional
client server distribution of bandwidth will lead to
performance degradation.
In general, each user is assigned with equal bandwidth
irrespective of application. This leads to wastage or
insufficiency of bandwidth. Due to the above reason, a
frequency distribution mechanism is applied which divides the
available bandwidth according to the rating of web page i.e.
the web page which have more rating will be assigned with
higher bandwidth.
3. 1. Bandwidth Computation for Network
Bandwidth for a network can be calculated in two basic
steps:
1. Total available bandwidth calculation.
2. Calculation of required bandwidth for specific
application based on parameter.
If the network is Giga bit Ethernet, then it will support
125,000,000 Bps (considering, 1000 Mbps for a Gigabit
network). Based on number of user and their type of
application, bandwidth needed for each application is to be
determined. According to numbers of bytes transferred per
second, network analyzer detects the bit rate for network.
Cumulative Bytes needed are calculated by the network
analyzer, and then traffic is captured from a test workstation.
According to network traffic generated by each user,
bandwidth is assigned to each user dynamically. Number of
users and type of application will affect the aggregated
efficiency of the system.
The following research work for classification of traffic
is based on three basic fields defined as Classification of
traffic according to user rating for the movieId, SeLeCT
algorithm [12] and bandwidth allocation according to rating.
The Internet traffic clustering is done following rating of
movies of movielens dataset. A Class-Based Weighted Fair
Queuing (CBWFQ) model is considered for clustering of
dataset items as well as bandwidth allocation dynamically.
Required bandwidth differs from network to network and
application to application. A minimum bandwidth called
Minimum Guaranteed Bandwidth (MGB) is initially assigned
to each user. Based on probability distribution of web page
ratings, available bandwidth will be distributed among rest of
users. A queuing system provides a load balancing during
congestion conditions.
The implementation will be done using MovieLens
(http://movielens.org) dataset. MovieLens is an outcome of a
movie reference facility. It contains ratings of movies by
random users between 1-5 according to their preference. The
whole dataset consists of 20000263 ratings with 465564 tag
values for 27278 number of movies. The dataset was created
by collecting ratings of 138493 users between 9th January
1995 and 31st March 2015 and was modified on 17th October
2016. Clients were chosen randomly for consideration. Every
client had evaluated not less than 20 films. No statistical data
is incorporated. Every client is identified by a unique userId,
and no other data was considered.
SeLect algorithm was applied to cluster dataset. SeLeCT
stands for Self-Learning Classifier. It is one of the efficient
algorithms used for Internet Traffic examination. SeLeCT is
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
371
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
an unsupervised algorithm based on self-seeding approach for
automatic traffic classification. It doesn’t involve any prior
knowledge of environment or grouping of data. It provides
nearly 98% perfectness of traffic classification during network
administration. The data automatically switches between
clusters due to adoptive seeding approach. Based on type of
clusters, prediction for data was done. Development of
information and growth of group size is given in figure3.
[Figure-3: Movements & enlargements of a window]
The whole process for dynamic assignment of bandwidth
on demand for network traffic management is represented
using following flow chart [figure-4].
[Figure-4: Flowchart DBoD for network traffic management]
IV. PROPOSED ALGORITHM
Calculation of minimum guaranteed bandwidth is too
difficult task for traffic engineers because the theoretical
bandwidth and the actual bandwidth assigned differ. Most of
the time, actual bandwidth allocated is less than theoretical
bandwidth. Considering the minimum guaranteed bandwidth
as constant, the whole research was implemented. The
minimum guaranteed bandwidth (Bmin) can be calculated as:
      
  

Where, αi - the weight factor (rating) for each web page
Tcycle - maximum transmission cycle needed for each web page
N - total number of users accessing the Internet
Tguard - guard time between two consecutive access
R - transmission rate (both upstream and downstream).
The following parameters are variable for individual
user. The algorithm for dynamic bandwidth on demand service
according to rating of web pages is:
Step-1: Calculate available bandwidth and total number of
user (N).
Step-2: Clusters are made according to the weights (ratings)
by CBWFQ following an incremental approach dynamically.
Step-3: Initialized the queue depth for storing various packets
which are to be stored in a cluster earlier to the drops out of
packet (By default, queue depth is set as 64 which is
maximum length of queue).
Step-4: If any traffic doesn’t match with any cluster, then it is
assigned to one of default cluster. When more parameters
(restrictions) are assigned, data will switch to appropriate
cluster. It is maintained using a normal Weighted Fair
Queuing.
Step-5: Find total bandwidth available. Apply Minimum
Guaranteed Bandwidth (MGB) to each user.
Step-6: Calculate excess bandwidth available.
Excess bandwidth = Total available bandwidth N × MGB
Step-7: Excess Bandwidth to be assign = (Excess bandwidth/
N) × (Current rating/Maximum rating)
Step-8: IF (End of Useri) Then
Release the allocated resources
Goto Step-6
ELSE IF (New User) Then
Allocate Bmin to New User
Goto Step-6
EndIF
Step-9: Stop
V. EXPERIMENTAL RESULT
The algorithm was implemented using MatLab-13 in Intel core
i3 2.20GHz speed processor, 8 GB RAM. Movielens dataset was
used for implementation of proposed algorithm. The pareto
distribution chart for a standard Movielens dataset was
represented in figure-5. It provides standard distribution of
movies based on UserId and Movie rating. Implement of
proposed algorithm was done by considering first 100 users of
data set. 2230 movies information (tuples) are considered for
such implementation.
Though actual implementation was done using 2230
information but for simplicity, first tuple for each user is
represented in the table and graph showing comparison among
required bandwidth and proposed bandwidth in figure-6.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
372
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Figure-6 [Comparison Graph of Required bandwidth and
Proposed bandwidth]
The table showing the comparison among the old and
new bandwidth is assigned for each user represented
(considering the first element of result) is given in table-1.
user
Id
movie
Id
rating
old
Bandwidth
new
Bandwidth
1
2
3.5
0.448833
0.442581
2
367
3.5
0.448833
0.442581
3
480
5
0.448833
0.630139
4
490
5
0.448833
0.630139
6
489
4
0.448833
0.505100
7
494
4
0.448833
0.505100
8
480
5
0.448833
0.630139
9
500
4
0.448833
0.505100
10
356
4
0.448833
0.505100
11
356
3
0.448833
0.380061
12
500
4.5
0.448833
0.567620
13
494
3
0.448833
0.380061
14
500
5
0.448833
0.630139
15
500
2
0.448833
0.255022
16
500
3
0.448833
0.380061
17
356
4
0.448833
0.505100
18
480
3
0.448833
0.380061
19
480
1.5
0.448833
0.192502
20
494
4
0.448833
0.505100
21
474
2
0.448833
0.255022
22
474
4
0.448833
0.505100
23
494
4
0.448833
0.505100
24
493
3
0.448833
0.380061
25
500
4
0.448833
0.505100
26
500
3.5
0.448833
0.442581
27
500
4
0.448833
0.505100
28
491
3
0.448833
0.380061
29
500
3
0.448833
0.380061
30
500
3
0.448833
0.380061
31
466
3.5
0.448833
0.442581
32
364
3
0.448833
0.380061
33
497
4
0.448833
0.505100
34
480
1
0.448833
0.129982
35
500
5
0.448833
0.630139
36
500
4
0.448833
0.505100
37
485
1.5
0.448833
0.192502
38
67
2
0.448833
0.255022
40
376
4
0.448833
0.505100
41
471
1
0.448833
0.129982
42
446
3
0.448833
0.380061
43
355
1
0.448833
0.129982
44
480
2.5
0.448833
0.317541
45
349
4
0.448833
0.505100
46
353
2
0.448833
0.255022
47
500
3
0.448833
0.380061
48
480
3.5
0.448833
0.442581
49
497
4
0.448833
0.505100
50
475
4.5
0.448833
0.567620
51
497
4
0.448833
0.505100
52
463
2
0.448833
0.255022
53
480
5
0.448833
0.630139
54
488
5
0.448833
0.630139
55
494
4
0.448833
0.505100
56
480
4
0.448833
0.505100
57
497
2
0.448833
0.255022
58
480
5
0.448833
0.630139
60
471
3.5
0.448833
0.442581
61
441
4.5
0.448833
0.567620
62
500
3.5
0.448833
0.442581
63
345
4.5
0.448833
0.567620
64
389
3
0.448833
0.380061
66
500
3
0.448833
0.380061
67
480
2
0.448833
0.255022
68
380
4
0.448833
0.505100
69
468
4
0.448833
0.505100
70
500
3
0.448833
0.380061
71
494
1
0.448833
0.129982
72
356
5
0.448833
0.630139
73
500
4
0.448833
0.505100
74
457
3
0.448833
0.380061
75
337
4
0.448833
0.505100
77
500
4
0.448833
0.505100
78
410
3
0.448833
0.380061
79
480
4
0.448833
0.505100
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
373
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
80
497
4
0.448833
0.505100
81
376
4
0.448833
0.505100
82
480
4
0.448833
0.505100
83
318
5
0.448833
0.630139
84
342
3.5
0.448833
0.442581
85
457
5
0.448833
0.630139
86
262
4.5
0.448833
0.567620
87
318
5
0.448833
0.630139
88
457
5
0.448833
0.630139
89
500
1.5
0.448833
0.192502
90
318
5
0.448833
0.630139
91
500
4
0.448833
0.505100
92
500
4
0.448833
0.505100
93
236
3
0.448833
0.380061
94
500
5
0.448833
0.630139
95
368
3
0.448833
0.380061
96
497
3
0.448833
0.380061
97
480
3.5
0.448833
0.442581
98
500
4
0.448833
0.505100
99
356
5
0.448833
0.630139
100
480
3
0.448833
0.380061
Table-1 [Comparison table of old and new bandwidth]
The graph presented in firure-7 depicts comparison
between the earlier method and the proposed method showing
utilization of bandwidth. This graph contains 2230 tuples of
the dataset. It is evident from the graph that the proposed
method results in optimized utilization of bandwidth.
VI. PERFORMANCE OF ALGORITHM
The minimum guaranteed bandwidth is assigned to each
user who participated in the network, which is essential to
satisfy the basic bandwidth requirement. The calculated excess
bandwidth is distributed among the users having higher rating.
Considering the higher rating items as high demanded web
pages, a frequency distribution technique was applied for
bandwidth on demand (using SeLeCT). By application of this
algorithm, any wastage or insufficiency of bandwidth was
managed effectively. Hence, the efficiency of the overall
system increases significantly as compared to earlier system.
VII. CONCLUSION
Due to the exponential growth of Internet users, the
limited bandwidth has to be utilized efficiently. Growth of
Internet users highly increases traffic over the network, which
puts more responsibility on traffic engineers for controlled
network management. Since each user doesn’t need equal
bandwidth for their application, most of the time there is either
wastage of bandwidth or insufficient bandwidth for
demanding users. Allocating bandwidth on demand based on
rating of web pages provides a solution for controlling
wastage of bandwidth for naive and insufficient bandwidth for
expert users. With the use of proposed algorithm, the total
available bandwidth is distributed dynamically among
different types of Internet users based on their needs. Thus, the
optimized utilization of bandwidth was carried out efficiently
among different users.
VIII. FUTURE WORK
The above research work is implemented using rating of
web pages as parameter. Higher rating web pages are assigned
higher bandwidth. We have not taken into consideration the
priority of user or the vitality of information which can also
play an important role in decision making process about the
dynamic allocation of bandwidth for the rated pages. These
parameters can also be considered for more effective
assignment of bandwidth in a dynamic environment.
REFERENCES
[1] Zahra Jadidi, Vallipuram Muthukkumarasamy, Elankayer Sithirasenan,
and Kalvinder Singh, ―A Probabilistic Sampling Method for Efficient
Flow-based Analysis‖, JOURNAL OF COMMUNICATIONS AND
NETWORKS, VOL. 18, NO. 5, OCTOBER 2016, P-818-825.
[2] Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Hans van
den Berg, and Aiko Pras, ―Impact of Packet Sampling on Link
Dimensioning‖, IEEE TRANSACTIONS ON NETWORK AND
SERVICE MANAGEMENT, VOL. 12, NO. 3, SEPTEMBER 2015,
p392-405
[3] Muhammad Shahzad and Alex X. Liu, ―Accurate and Efficient Per-Flow
Latency Measurement Without Probing and Time Stamping‖,
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 6,
DECEMBER 2016, P3477-3492
[4] Xiaochun Yun, Member, IEEE, Yipeng Wang, Member, IEEE,
Yongzheng Zhang, Member, IEEE, and Yu Zhou, Member, IEEE, “A
Semantics-Aware Approach to the Automated Network Protocol
Identification”, IEEE/ACM TRANSACTIONS ON NETWORKING,
VOL. 24, NO. 1, FEBRUARY 2016, P583-595
[5] P.C. Sethi, P.K. Behera, ―An efficient dynamic bandwidth allocation
algorithm for improving the quality of service of networks‖, European
Journal of Academic Essays, Special Issue (1), 2014, P31-35.
[6] P. C. Sethi, ―UPnP and Secure Group Communication Technique for
Zeroconfiguration Environment construction using Incremental
Clustering‖, International Journal of Engineering Research &
Technology (IJERT), Vol. 2 Issue 12, December 2013, ISSN: 2278
0181, pp. 20952101
[7] P. C. Sethi, C. Dash: ―High Impact Event Processing using Incremental
Clustering in Unsupervised Feature Space through Genetic algorithm by
Selective Repeat ARQ protocol‖, ICCCT– 2nd IEEE Conference
2011, pp. 310315.
[8] P. C. Sethi, P.K. Behera, ―Secure Packet Inspection using Hierarchical
Pattern matching implemented Using Incremental Clustering
Algorithm‖, December–2224, ICHPCA2014 (IEEE International
Conference)
[9] P. C. Sethi, P. K. Behera, ―Internet Traffic Classification for Faster and
Secured Network Service‖, International Journal of Computer
Applications (IJCA), Volume 131 No.4, December2015, pp. 1520
[10] P. C. Sethi, P. K. Behera, Methods of Network Security and Improving
the Quality of Service A Survey, International Journal of Advanced
Research in Computer Science and Software Engineering (IJARCSSE)
Volume 5, Issue 7, July 2015, pp. 10981106
[11] P. C. Sethi, P. K. Behera, ―RSA Cryptography Algorithm Using linear
Congruence Class‖, International Journal of Advanced Research (2016),
Volume 4, Issue 5, 1335-1347
[12] Luigi Grimaudo, Marco Mellia, Elena Baralis and Ram Keralapura,
―SeLeCT: Self-Learning Classifier for Internet Traffic‖, IEEE
TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
VOL. 11, NO. 2, JUNE 2014 (P144 P157)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
374
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Er. P. C. Sethi received the B. Tech and M.Tech degrees in
Information Technology Engineering and
Computer Science Engineering from College of
Engineering & Technology, Bhubaneswar. He has
qualified UGC-NET three times in Computer
Science and Applications. He is currently pursuing
PhD in P.G. Department of Computer Science at
Utkal University, Odisha, India. His current
research area of interest is Network Security and
QoS. He has published five research papers in refered international
journals and two IEEE conference paper. He is a life time member of
CSI, ISTE, IAENG, CSTA.
Dr. P. K. Behera is currently working as Reader at Department of
Computer Science, Utkal University,
Bhubaneswar, Odisha, India. He has more than
two decades of teaching experience. His area of
interest is MANET, Wireless Network,
Distributed Systems, Mobile Computing,
Network and Information Security, Software
Engineering. He has published number of
research papers in reputed International
Conferences and Journals. He is a reviewer of many national and
International referred Journals. He is the Secretary of CSI
Bhubaneswar Chapter.
Fig 5: Pareto Distribution Chart for Movielens dataset
[Fig-7: Comparison Graph of Old and New bandwidth needed]
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 6, June 2017
375
https://sites.google.com/site/ijcsis/
ISSN 1947-5500
... Since the number of internet users increases exponentially, the maintenance, as well as processing time for cryptography algorithms, are comparatively high. So in [9], the authors proposed an efficient method for managing the traffic incurred during networking considering bandwidth on demand approach in a run time environment for faster processing and performing better utilization of bandwidth. Paper [10] is the extension of [9] which not only provides faster data transmission but also provides security to information using double ECC algorithm. ...
... So in [9], the authors proposed an efficient method for managing the traffic incurred during networking considering bandwidth on demand approach in a run time environment for faster processing and performing better utilization of bandwidth. Paper [10] is the extension of [9] which not only provides faster data transmission but also provides security to information using double ECC algorithm. ...
... We have adopted 2-gram techniques in which set of di-bits (double bits occurring sequentially) are finally obtained for the set of items. The set of di-bits undergoes ECC implementation to provide group security [7,9]. ...
Article
Full-text available
Nowadays security is main issue during transmission of data. Among many cryptographic methods, ECC is the public key asymmetric cryptosystem which provides faster computation over smaller size in comparison to other asymmetric key cryptosystems. In this paper, we have proposed a group security algorithm using the ECC cryptography algorithm. The group security is applied to ECC in terms of m-gram selection called ECC m-gram selection. Due to the group security implementation in terms of common grams, processing speed will be faster in comparison to individual item security. We have also made the comparison study between the traditional ECC algorithm with the proposed group security algorithm using generalized frequent-common gram selection for depicting lesser time requirements to achieve better security for the whole process.
... This method also leads to a group pattern matching, searching and storage mechanism for optimized processing in comparison to the traditional approach. In [13], the authors proposed the RSA algorithm using congruence class so that relatively more security can be achieved in comparison to traditional algorithm implementation. In paper [13,14], the authors proposed a dynamic network traffic management technique for on demand service provided in secure manner. ...
... In [13], the authors proposed the RSA algorithm using congruence class so that relatively more security can be achieved in comparison to traditional algorithm implementation. In paper [13,14], the authors proposed a dynamic network traffic management technique for on demand service provided in secure manner. In the papers [12][13][14], cryptography algorithms are applied for providing information security and an attempt is made towards improving the network Quality of Service (QoS). ...
... In paper [13,14], the authors proposed a dynamic network traffic management technique for on demand service provided in secure manner. In the papers [12][13][14], cryptography algorithms are applied for providing information security and an attempt is made towards improving the network Quality of Service (QoS). The network security and QoS can also be optimized by improving the features of IDS. ...
Article
Full-text available
In the context of information security, cyber-attacks such as malware attacks, viruses, etc. caused substantial damage to many organizations. The most common solution to cyber-attack is cryptography algorithm implementation and Intrusion Detection System (IDS). Different cryptography algorithms with varying key length are used to achieve different level of information security. IDS is used to control and alert the cyber-attacks which are much redundant and generates many false alerts in real-life application. The filtering and classification of false alerts involve substantial investment and security analysis. We propose a self-Learning data management approach in terms of data characterization using SeLINA for minimizing false alerts. Two different queues namely: Normal Queue and Suspicious Queues are used for storing information without and with any false alert respectively. The Suspicious Queue then undergoes filtering using feature detection technique. Subsequently, the filtered information with no false alert signals is transferred to the Normal Queue using a supervised hierarchical structure towards minimization of false alerts. Consequently, this technique is helpful to identify malicious attacks easily with no extra time for false alert detection.
... In [5], the researcher proposed a recommendation technique using web page rating in order to calculate the effective requirement of bandwidth for each user activity. ...
... We have used the SHA-256 algorithm [5] for achieving information security in our research work. SHA-256 algorithm consists of the compression function followed The initial hash value H i (0) is found by considering 32-bit words of the fractional parts of square root of the initial eight prime numbers represented as: "6a09e667, bb67ae85, 3c6ef372, a54ff53a, 510e527f, 9b05688c, 1f83d9ab, and 5be0cd19." ...
Chapter
Full-text available
The evolution of a large number of network-related emerging technologies leads to the exponential growth in the number of users. Traditional to corporate activities are being done over online medium. Hence, the network administrators’ job is becoming tedious. The overall performance of the network depends on various parameters among which network traffic plays a major role. All the network resources are equally shared among all the available users. Malicious activities within the network lead to less availability of network resources for the actual users. Due to this reason, dynamic network traffic monitoring and analysis are becoming essential for identification of the malicious activities in the network. In this paper, we have proposed a dynamic network traffic monitoring and management technique to identify malicious traffic and prioritize the activities in order to assign the bandwidth within the network for network QoS. Finally, the security algorithm is applied to achieve information security.KeywordsNetwork Traffic MonitoringDynamic Bandwidth AllocationGeneralized Frequent Common Gram (GFCG)SeLeCTQuality of Service (QoS)
... The usage of this algorithm has overwhelmed the proper functioning, especially for the e-commerce websites that are prone to deal with voluminous and secured transactions [17,26]. For this reason, a comparative study between RSA and ECC was done, which resulted to be beneficial for ECC, although the level of security was equally the same, but the data size that was considered was of smaller bit size, due to which the processing time was comparatively less than RSA [5,28]. ...
Article
Full-text available
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).
... Network traffic analysis involve management of various resources out of which bandwidth plays a major role. The researcher proposed a dynamic bandwidth management technique [8] for on-demand service. Since the images involve more bandwidth in comparison to text information, the proposed work could be integrated with dynamic resource management technique for faster and secure service. ...
Chapter
Full-text available
In the current covid pandemic situation, secure online transmission of data has the highest precedence over other activities. For providing computational hardness that is for making tough to break the key for finding the unique message, there are various algorithms are present. For secure data transmission, many researchers have applied different cryptography algorithms and in order to improve the level of information security, different hybrid cryptography algorithms have been proposed. In cryptography algorithm implementation, key management plays a major role. For this reason, we have applied an image encryption technique in which a random image is considered as the key. Using the random image as a key, we have encrypted another image as information using the RSA algorithm. The comparison of the proposed method is done with the traditional approach and concluded that the cryptography algorithm implemented using an image as key provides more security in terms of encryption and decryption time.
... The outbreak of computer virus is often unpredictable and sudden, which can quickly destroy the data in the application program or system, have a serious impact on the use of the computer, and even steal the data and information in the computer. 23 Latency is one of the main characteristics of computer virus, because computer virus is a kind of program designed by people. After being implanted into the system, it is like a time bomb, which will not immediately show destructiveness. ...
Article
Full-text available
With the continuous development of communication technology and computer network technology and the continuous progress of social economy, information technology has penetrated into all aspects of people's lives. The basic task of communication network is to ensure the reliability and security of information transmission. Based on the above background, the purpose of this study is to study the application of information communication network security management and control based on big data technology. Based on the concept and management and control structure of information communication network, combined with the data collection and preprocessing in big data technology, this study analyzes the feasibility of big data technology applied in communication network management and control and expounds the specific application of big data technology from the four aspects of troubleshooting, security protection, business management, and resource allocation. At last, the test environment of information communication network security management and control platform based on big data technology is built in the laboratory to test the network management performance and routing transmission performance of the system. The experimental results show that the communication success rate of the information communication network security management and control platform based on big data technology remains to 91.78%. It can be seen from the test results that the information communication network security management and control platform based on big data technology can not only accurately collect sensor data but also have the function of real‐time monitoring network status and reconfiguration of nodes. This research takes several problems in the field of information security processing in the basic structure of information communication network.
... To deal with the network traffic management, in [8,9] the authors proposed a webpage rank based network traffic management scheme for dynamic bandwidth assignment within a network. To deal with the information security aspects, in [10,11] the authors proposed a modified algorithm so that without prior knowledge, identifying the actual message will be nearly impossible. Here, we have proposed a hybrid model using a mathematical model that will not only provide the security to information but also manage the online mode of teaching with a compromise in terms of degradation in the quality of the video. ...
Article
Full-text available
The COVID-19 pandemic has resulted in a dramatic change in our day to day life. It affected not only the normal working of many organizations but also the traditional classroom teaching and learning methodologies. Since everyone has to maintain social distancing to follow COVID-19 guidelines, work from home is being preferred as the best alternative as a preventive measure from spreading the pandemic. In its severe impact, schools, colleges, and universities were shut down, pushing nearly 1.2 billion students out of the classroom. As a result, the education system has to suddenly adapt to a distinctive online-based e-learning approach over digital platforms. Research tells that online learning motivated more towards the retention of online resources with less cost in terms of money and time. But, it has also brought many challenges along the way. In this research work, we focus on some of the major challenges such as information security and network bandwidth problem during online teaching. The related security measures being adopted in our research work to secure personal information during any online teaching and learning process. We also focus on some basic learning models for provisioning effective online-based teaching and learning.
Chapter
It is now becoming increasingly clear what new challenges even democratic states face in relation to this new medium. If we follow Jack M. Balkin’s above line of thought, we can say that, with the emergence and spread of the Internet, there have been many cases, in addition to classical political censorship, where it is also difficult to decide whether we can really talk about censorship. In his writings, he consistently argues for the use of the term speech control rather than censorship, which shows how the scope of speech and the resulting content control has changed according to some views. “Traditional or ‘old-school’ techniques of speech regulation have generally employed criminal penalties, civil damages, and injunctions to regulate individual speakers and publishers”, but the twenty-first century has fundamentally rewritten these. All this, as will be seen in a moment, makes it very difficult to determine whether we are talking about content regulation or censorship in individual cases.
Book
This book features best selected research papers presented at the International Conference on Machine Learning, Internet of Things, and Big Data (ICMIB 2021) held at Indira Gandhi Institute of Technology, Sarang, India, during December 2021. It comprises high-quality research work by academicians and industrial experts in the field of machine learning, mobile computing, natural language processing, fuzzy computing, green computing, human–computer interaction, information retrieval, intelligent control, data mining and knowledge discovery, evolutionary computing, IoT and applications in smart environments, smart health, smart city, wireless networks, big data, cloud computing, business intelligence, Internet security, pattern recognition, predictive analytics applications in healthcare, sensor networks and social sensing, and statistical analysis of search techniques.
Article
Full-text available
Due to the enormous demand for networking services, the performance and security of information has to be improved. To provide information security, numerous cryptographic algorithms were proposed by various researchers, out of which RSA algorithm is one the most popular algorithm. RSA algorithm uses linear congruence method which restricted the operation to specific class of values. RSA algorithm needs exponential time for decryption of message. By extending the RSA algorithm using congruence class and selecting the key in random, the security of algorithm can be increased. Higher the congruence class index, higher will be its level of security. For each of the congruence class element, complexity of algorithm will be same but there will be increase in the level of security. The basic idea behind this implementation is that by converting the given linear congruence into congruence class and solving them algebraically, actual information can be produced. This paper contains the comparison between linear congruence and congruence class using RSA algorithm. Finally we contend that, due to congruence class implementation, the complexity of algorithm will remain same as that of regular RSA algorithm with enhancement in information security by random congruence class key selection.
Article
Full-text available
Due to the growth in prominence of Web, there is a need for proficient system administration. Network visibility becomes very crucial for traffic engineering and network management. A large number of users demands varied information at a given time. By identifying the users that demand same type of information and clustering them into different groups, the Internet accessibility and resource utilization can be improved. The most popular solutions for network management are Deep Packet Inspection algorithm, In-Depth Packet Inspection algorithm and some related statistical classification technologies. All these solutions depend on the availability of a training set. Supervised (classification) and unsupervised (clustering) algorithms are used for identification of the network traffic. Network traffic analysis always depends on various parameters such as the data to be searched, the time of searching, available bandwidth, number of accessing users, architecture of the network system, etc. For simplicity, the type of data and the data rate was considered for this implementation. Due to clustering, automatic identification of the classes of traffic was achieved. Since clustering technique is used for group processing of information, group signature techniques is being applied here for secured data processing.
Article
Full-text available
During networking, the bandwidth is equally assigned to individual nodes. But each node can't utilize the same amount of bandwidth. The requirement of bandwidth also differs from time to time. For proper utilization of bandwidth, the dynamic bandwidth allocation algorithm can be implemented. Efficient dynamic resource provisioning algorithms are necessary to the development and automation of Quality of Service (QoS) networks. The main goal of these algorithms is to offer services that satisfy the QoS requirements of individual users while guaranteeing at the same time an efficient utilization of network resources. In this paper, we introduce a new service model that provides quantitative assignment of bandwidth guaranteeing the improvement in QoS in terms of network services. We propose an efficient bandwidth allocation algorithm that takes traffic statistics for dynamic bandwidth allocation. We demonstrate through simulation in realistic network scenarios that the proposed dynamic provisioning model is superior to static provisioning in providing resource allocation both in terms of total accepted load and network revenue.
Conference Paper
Full-text available
In the present scenario, most of the computing operations are performed over the Internet. Many companies provide their services using Internet, so networking services becomes more important these days. Hence, there is high demand for secured management of information, along with faster processing of operations. Due to increased demand for network services, there is a need to increase the performance of these services. The gradual increase in the amount of important information increases the packet payloads. EHMA is a faster searching algorithm that reduces the searching time significantly. In the original paper [1], EHMA is implemented in two tiers, but this paper considers the implementation of EHMA in three tiers. It follows incremental clustering algorithm for grouping clusters according to their impact factors. This three tier implementation of EHMA improves the security of the information as it uses SHA-256 for security.
Article
Full-text available
The scales of smart living are needed from small to large size applications. As the scale of the space increases, we can expect that the requirements for the two features zero-configuration and secure data communication channels are getting more important. The feature of zero-configuration reduces the cost to setup the network and secure data communication channels guarantee both the privacy and confidentiality of possible sensitive data transmitted in the network. In this paper, we integrated two technologies, UPnP and secure group communication techniques, to construct an almost zero-configuration secure environment for smart living spaces. A secure and flexible communication environment is constructed as follows. An UPnP controller is implemented to manage devices in the same administrative domain and hence these devices can be treated as members in the same communication group. Using generalized ring signature algorithm key can be managed for building both point-to-point and broadcast secure channels over the UPnP network.
Conference Paper
Full-text available
High impact event represents the information which are frequently used. The frequently used information is maintained in different clusters such that it can be accessed quickly without involving much searching time. Clustering methods are one of the key steps that lead to the transformation of data to knowledge. Clustering algorithms aims at partitioning an initial set of objects into disjoint groups (clusters) such that objects in the same subset are more similar to each other than objects in different groups. In this paper we present a generalization of the k-Windows clustering algorithm in metric spaces by following a selective Repeat ARQ protocol having fixed window size for accurate information transmission. The original algorithm was designed to work on data with numerical values. The proposed generalization does not assume anything about the nature of the data, but only considers the distance function over the data set. The efficiency of the proposed approach is demonstrated on msnbc data sets. Genetic algorithm approach is used to detect and predict high-impact events in different areas such as automotive manufacturing, networking for data transmission, etc. While the high-impact events occurs infrequently, they are quite costly, means they have high-impact on the system key performance indicator. This approach is based on mining these types of events and its impact on the total process execution. The classified data are clustered for future implementation which have similar feature. Due to the clustering concept the clustered data can be used for various applications, which makes it robust. The parameters are optimized for best solution. This approach is tested on high impact events that occurs in networking, during transmission and it was found to be robust, highly accurate and with less probability of fault, for prediction of future occurrences of such events.
Article
Network management and anomaly detection are challenges in high-speed networks due to the high volume of packets that has to be analysed. Flow-based analysis is a scalable method which reduces the high volume of network traffic by dividing it into flows. As sampling methods are extensively used in flow generators such as NetFlow, the impact of sampling on the performance of flow-based analysis needs to be investigated. Monitoring using sampled traffic is a well-studied research area, however, the impact of sampling on flow-based anomaly detection is a poorly researched area. This paper investigates flow sampling methods and shows that these methods have negative impact on flow-based anomaly detection. Therefore, we propose an efficient probabilistic flow sampling method that can preserve flow traffic distribution. The proposed sampling method takes into account two flow features: Destination IP address and octet. The destination IP addresses are sampled based on the number of received bytes. Our method provides efficient sampled traffic which has the required traffic features for both flow-based anomaly detection and monitoring. The proposed sampling method is evaluated using a number of generated flow-based datasets. The results show improvement in preserved malicious flows.
Article
With the growth in number and significance of the emerging applications that require extremely low latencies, network operators are facing increasing need to perform latency measurement on per-flow basis for network monitoring and troubleshooting. In this paper, we propose COLATE, the first per-flow latency measurement scheme that requires no probe packets and time stamping. Given a set of observation points, COLATE records packet timing information at each point so that later, for any two points, it can accurately estimate the average and the standard deviation of the latencies experienced by the packets of any flow in passing the two points. The key idea is that when recording packet timing information, COLATE purposely allows noise to be introduced for minimizing storage space, and when querying the latency of a target flow, COLATE uses statistical techniques to denoise and obtain an accurate latency estimate. COLATE is designed to be efficiently implementable on network middleboxes. In terms of processing overhead, COLATE performs only one hash and one memory update per packet. In terms of storage space, COLATE uses less than 0.1-b/packet, which means that, on a backbone link with half a million packets per second, using a 256-GB drive, COLATE can accumulate time stamps of packets traversing the link for over 1.5 years. We evaluated COLATE using three real traffic traces, namely, a backbone traffic trace, an enterprise network traffic trace, and a data center traffic trace. Results show that COLATE always achieves the required reliability for any given confidence interval.
Hans van den Berg, and Aiko Pras, -Impact of Packet Sampling on Link Dimensioning‖
  • Ricardo De
  • Oliveira Schmidt
  • Ramin Sadre
  • Anna Sperotto
Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Hans van den Berg, and Aiko Pras, -Impact of Packet Sampling on Link Dimensioning‖, IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 12, NO. 3, SEPTEMBER 2015, p392-405