Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Author(s): 

Issue Info: 
  • Year: 

    2017
  • Volume: 

    92
  • Issue: 

    1
  • Pages: 

    181-196
Measures: 
  • Citations: 

    1
  • Views: 

    129
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 129

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MONTAZEROLGHAEM A.

Issue Info: 
  • Year: 

    2022
  • Volume: 

    20
  • Issue: 

    1
  • Pages: 

    1-12
Measures: 
  • Citations: 

    0
  • Views: 

    411
  • Downloads: 

    0
Abstract: 

Nowadays, multimedia networks on the Internet have become a low-cost and efficient alternative to PSTN. Multimedia transfer applications on the Internet are becoming more and more popular. This connection consists of two phases: signaling and media. The signaling phase is performed by SIP proxies and the media phase by network switches. One of the most important challenges in multimedia networks is the overload of SIP proxies and network switches in the signaling and media phases. The existence of this challenge causes a wide range of network users to face a sharp decline in the quality of service. In this article, we model the routing problem in multimedia networks to deal with the overload. In this regard, we present a technology-based method of Software-based networks and a mathematical programming model in multimedia networks. The proposed method is simulated under various scenarios and topologies. The results investigate that the throughput and resource consumption has improved.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 411

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Issue Info: 
  • Year: 

    2018
  • Volume: 

    5
  • Issue: 

    3
  • Pages: 

    1424-1434
Measures: 
  • Citations: 

    1
  • Views: 

    79
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 79

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
Measures: 
  • Views: 

    100
  • Downloads: 

    0
Abstract: 

With the rapid growth of computer devices, network communication faced different challenges from network management to traffic engineering. Software-defined networking (SDN) is a well-known solution for optimizing these communications. SDN is a new networking architecture to simplify network management that separates the control plane from the data plane. The central controller is the major advantage of SDN; however, it has security vulnerabilities such as being unreachable in Distributed Denial-of-Service attacks (DDoS). Consequently, it is very important to protect SDN from DDoS attacks. In this paper, we proposed an algorithm for DDoS attack detection and reducing its impact in SDN architecture with multiple distributed controllers. We presented two methods 1) the entropy of destination IP addresses and 2) Packet window initiation rate for early detection of DDoS. We used Mininet and floodlight to simulate our algorithm in different scenarios. The result shows that our algorithm outperforms other works in various network configurations and multi-victim attacks.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 100

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    8
  • Issue: 

    2 (30)
  • Pages: 

    121-129
Measures: 
  • Citations: 

    0
  • Views: 

    210
  • Downloads: 

    263
Abstract: 

SDN makes the network programmable, agile, and flexible with data and control traffic separating. This architecture consists of three layers which are application, control and data. The aim of our research is concentrated on the control layer to improve the performance of the network in an autonomic manner. In the first step, we have categorized the performance improvement researches based on network performance improvement solutions proposed in the recent papers. This performance improvement solution clustering is one of our contributions to our paper. The significant contribution in this paper is a novel autonomic SDN-based architecture to ameliorate the performance metrics including blocking probability (BP), delay, jitter, packet loss rate (PLR), and path utilization. Our SDN-based autonomic system consists of three layers (data, autonomic control, and Route learning) to separate the traffics based on deep neural networks (DNN) and to route the flows with the greedy algorithm. The autonomic SDN-based architecture which has proposed in this paper makes better network performance metrics dynamically. Our proposed autonomic architecture will be developed in the POX controller which has developed by python. Mininet is used for simulation and the results are compared with the commonly used SDN named pure SDN in this article. The simulation results show that our structure works better in a full-mesh topology and improves the performance metrics simultaneously. The average performance is improved by about %2. 5 in comparison with pure SDN architecture based on the Area Under Curve (AUC) of network performance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 210

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 263 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Gharvirian F. | BOHLOOLI A.

Issue Info: 
  • Year: 

    2017
  • Volume: 

    30
  • Issue: 

    11 (TRANSACTIONS B: Applications)
  • Pages: 

    1714-1722
Measures: 
  • Citations: 

    0
  • Views: 

    195
  • Downloads: 

    82
Abstract: 

Software defined network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main control is made unreachable for any reason, the architecture of the network is crashed. A distributed denial of service (DDoS) attack is a threat for the SDN controller which can make it unreachable. In the previous researches in DDoS detection in SDN, not enough work has been done on improvement of accuracy in detection. The proposed solution of this research can detect DDoS attack on SDN controller with a noticeable accuracy and prevents serious damage to the controller. For this purpose, fast entropy of each flow is computed at certain time intervals. Then, by the use of adaptive threshold, the possibility of a DDoS attack is investigated. In order to achieve more accuracy, another method, computing flow initiation rate, is used alongside. After observation of the results of this two methods, according to the described conditions, the existence of an attack is confirmed or rejected, or this decision is made at the next step of the algorithm, with further study of flow statistics of network switches by the perceptron neural network. The evaluation results show that the proposed algorithm has been able to make a significant improvement in detection rate and a reduction in false alarm rate compared to closest previous work, besides maintaining the average detection time on an acceptable level.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 195

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 82 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    10
  • Issue: 

    2 (38)
  • Pages: 

    120-131
Measures: 
  • Citations: 

    0
  • Views: 

    158
  • Downloads: 

    58
Abstract: 

The extend of the internet across the world has increased cyber-attacks and threats. One of the most significant threats includes denial-of-service (DoS) which causes the server or network not to be able to serve. This attack can be done by distributed nodes in the network as if the nodes collaborated. This attack is called distributed denial-of-service (DDoS). There is offered a novel architecture for the future networks to make them more agile, programmable and flexible. This architecture is called Software defined network (SDN) that the main idea is data and control network flows separation. This architecture allows the network administrator to resist DDoS attacks in the centralized controller. The main issue is to detect DDoS flows in the controller. In this paper, the Self-Organizing Map (SOM) method and Learning Vector Quantization (LVQ) are used for DDoS attack detection in SDN with distributed architecture in the control layer. To evaluate the proposed model, we use a labelled data set to prove the proposed model that has improved the DDoS attack flow detection by 99. 56%. This research can be used by the researchers working on SDN-based DDoS attack detection improvement.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 158

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 58 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    621
  • Volume: 

    11
  • Issue: 

    4
  • Pages: 

    368-382
Measures: 
  • Citations: 

    0
  • Views: 

    24
  • Downloads: 

    7
Abstract: 

The recent technical trend in the field of communication networks shows a paradigm change from hardware to Software. Software defined networking (SDN) as one of the enablers of digital transformation could have prominent role in this paradigm shift and migration to Knowledge-based network. In this regard, telecom operators are interested in deploying SDN to migrate their infrastructure from a static architecture to a dynamic and programmable platform. However, it seems that they do not consider SDN as one of their priorities and still depend on traditional methods to manage their network (especially in some developing countries such as Iran). Since the first step in applying new technologies is to accept them, we have proposed a comprehensive SDN adoption model with the mixed-method research methodology. At first, the theoretical foundations related to the research problem were examined. Then, based on Grounded theory, in-depth interviews were conducted with 12 experts (including university professors and managers of the major telecom operators). In result, more than a thousand initial codes were determined, which in the review stages and based on semantic commonalities, a total of 112 final codes, 14 categories and 6 themes have been extracted using open, axial and selective coding. Next, in order to confirm the indicators extracted from the qualitative part, the fuzzy Delphi method has been used. In the end, SPSS and SmartPLS 3 Software were used to analyze the data collected from the questionnaire and to evaluate the fit of the model as well as confirm and reject the hypotheses

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 24

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 7 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Shetabi M. | AKBARI A.

Issue Info: 
  • Year: 

    2021
  • Volume: 

    18
  • Issue: 

    4
  • Pages: 

    291-304
Measures: 
  • Citations: 

    0
  • Views: 

    450
  • Downloads: 

    0
Abstract: 

Software-defined network (SDN) is the next generation of network architecture thatby separating the data plane and the control plane enables centralized control with the aim of improving network management and compatibility. However, due to the centralized control policy, this type of network is prone to Inaccessibility of control plane against a denial of service (DoS) attack. In the reactive mode, a significant increase in events due to the entry of new flows into the network puts a lot of pressure on the control plane. Also, the presence of recurring events such as the collection of statistical information from the network, which severely interferes with the basic functionality of the control plane, can greatly affect the efficiency of the control plane. To resist attack and prevent network paralysis, this paper introduces a new architecture called SAHAR, which consists of a control box consisting of a coordinator controller, a primary flow setup controller, and one or more (as needed) secondary flow setup controller(s). Assigning monitoring and managing tasks to the coordinator controller reduces the load of flow setup controllers. In addition, dividing the incoming traffic between the flow setup controllers by the coordinator controller distributes the load at the control plane. Thus, by assigning the traffic load resulting from a denial-of-service attack to one or more secondary flow setup controller(s), the SAHAR architecture can prevent the primary flow setup controller from impairment and resist DoS attacks. Tests show that SAHAR performs better in the face of a DoS attack than existing solutions.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 450

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    5
Measures: 
  • Views: 

    142
  • Downloads: 

    235
Abstract: 

IN THE RECENT YEARS, MANY SOLUTIONS HAVE BEEN PROPOSED TO DELIVER MULTIMEDIA OVER THE BEST-EFFORT INTERNET. THE OBJECTIVE OF THESE APPROACHES IS TO ENSURE HIGH QUALITY OF SERVICE (QOS) AND QUALITY OF EXPERIENCE (QOE) FOR MULTIMEDIA DELIVERY IN THE PRESENCE OF BANDWIDTH FLUCTUATIONS MADE BY FACTORS LIKE SIGNAL PROPAGATION AND network CONGESTION. HOWEVER, MANY OF THESE TECHNIQUES FACES SEVERE LIMITATIONS SUCH AS network BOTTLENECK AND CONGESTION DUE TO THE LACK OF GLOBAL network VIEW. THE SEPARATION OF CONTROL LOGIC AND DATA PLANE IN Software defined networkING (SDN) ARCHITECTURE CONTRIBUTES TO THE SMARTNESS, FLEXIBILITY, AND CONTROLLABILITY OF COMPUTER networkS AND PROVIDES NEW OPPORTUNITIES FOR GUARANTEEING HIGHER QOE FOR MULTIMEDIA VIEWERS. IN THIS SURVEY, WE PRESENT A TAXONOMY OF THE STATE-OF-ART SDN-BASED SOLUTIONS FOR MULTIMEDIA COMMUNICATIONS AND WE SHED LIGHT ON THE RESEARCH GAPS IN THIS AREA.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 142

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 235
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button