Abstract
A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the network, which take into account the parameters of traffic multifractality and the probability of detecting attacks in telecommunications networks were proposed. The both proposed methods accounting the given restrictions on the delay time and the number of lost packets for every type quality of service traffic. During simulation the parameters of transmitted traffic (self-similarity, intensity) and the parameters of network (current channel load, node buffer size) were changed and the maximum allowable load of network was determined. The results of analysis show that occurrence of overload when transmitting traffic over a switched channel associated with multifractal traffic characteristics and presence of attack. It was shown that proposed methods can reduce the lost data and improve the efficiency of network resources.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Yu-Xing, Y.: Research for network security and reliability and performance assess. In: Proceedings of the Fourth International Conference on Intelligent Systems Design and Engineering Applications, Zhangjiajie, pp. 444–447 (2013). https://doi.org/10.1109/isdea.2013.506
Daradkeh, Y.I., Kirichenko, L., Radivilova, T.: Development of QoS methods in the information networks with fractal traffic. Int. J. Electron. Telecommun. 64(1), 27–32 (2018). https://doi.org/10.24425/118142
Acharya, H.S., Dutta, S.R., Bhoi, R.: The impact of self-similarity network traffic on quality of services (QoS) of telecommunication network. Int. J. IT Eng. Appl. Sci. Res. (IJIEASR) 2, 54–60 (2013)
Czarkowski, M., Kaczmarek, S., Wolff, M.: Influence of self-similar traffic type on performance of QoS routing algorithms. INTL J. Electron. Telecommun. 62(1), 81–87 (2016). https://doi.org/10.1515/eletel-2016-0011
Ivanisenko, I., Kirichenko, L., Radivilova, T.: Investigation of self-similar properties of additive data traffic. In: Proceedings of 2015 Xth International Scientific and Technical Conference “Computer Sciences and Information Technologies” (CSIT), pp. 169–171. IEEE (2015). https://doi.org/10.1109/stc-csit.2015.7325459
Pramanik, S., Datta, R., Chatterjee, P.: Self-similarity of data traffic in a Delay Tolerant Network. In: 2017 Wireless Days, pp. 39–42 (2017). https://doi.org/10.1109/wd.2017.7918112
Bhat, U.N.: An Introduction to Queueing Theory: Modeling and Analysis in Applications. Birkhauser/Springer, Boston (2015)
Hu, Z., Mukhin, V., Kornaga, Y., Lavrenko, Y., Herasymenko, O.: Distributed computer system resources control mechanism based on network-centric approach. Int. J. Intell. Syst. Appl. IJISA. 9(7), 41–51 (2017)
Ivanisenko, I., Radivilova, T.: The multifractal load balancing method. In: Proceedings of Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), pp. 122–123. IEEE (2015). https://doi.org/10.1109/infocommst.2015.7357289
Aggarwal, A., Verma, R., Singh, A.: An efficient approach for resource allocations using hybrid scheduling and optimization in distributed system. Int. J. Educ. Manag. Eng. (IJEME) 8(3), 33–42 (2018). https://doi.org/10.5815/ijeme.2018.03.04
Radivilova, T., Kirichenko, L., Ivanisenko, I.: Calculation of distributed system imbalance in condition of multifractal load. In: Proceedings of Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), pp. 156–158. IEEE (2016). https://doi.org/10.1109/infocommst.2016.7905366
Kirichenko, L., Ivanisenko, I., Radivilova, T.: Dynamic load balancing algorithm of distributed systems. In: Proceedings of the 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pp. 515–518. IEEE (2016). https://doi.org/10.1109/tcset.2016.7452102
Gupta, N., Srivastava, K., Sharma, A.: Reducing false positive in intrusion detection system: a survey. Int. J. Comput. Sci. Inf. Technol. 7(3), 1600–1603 (2016)
Deka, R., Bhattacharyya, D.: Self-similarity based DDoS attack detection using Hurst parameter. Secur. Commun. Netw. 9(17), 4468–4481 (2016)
Ageyev, D., Kirichenko, L., Radivilova, T., Tawalbeh, M., Baranovskyi, O.: Method of self-similar load balancing in network intrusion detection system. In: Proceedings of 28th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 1–4. IEEE (2018). https://doi.org/10.1109/radioelek.2018.8376406
Bulakh, V., Kirichenko, L., Radivilova, T., Ageiev, D.: Intrusion detection of traffic realizations based on machine learning using fractal properties. In: Proceedings of 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), pp. 1–4. IEEE (2018)
Sharma, R., Chaurasia, S.: An integrated perceptron Kernel classifier for intrusion detection system. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(12), 11–20 (2018). https://doi.org/10.5815/ijcnis.2018.12.02
Chahal, J.K., Kaur, A.: A hybrid approach based on classification and clustering for intrusion detection system. Int. J. Math. Sci. Comput. (IJMSC) 2(4), 34–40 (2016). https://doi.org/10.5815/ijmsc.2016.04.04
Nasr, A.A., Ezz, M.M., Abdulmaged, M.Z.: An intrusion detection and prevention system based on automatic learning of traffic anomalies. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(1), 53–60 (2016). https://doi.org/10.5815/ijcnis.2016.01.07
Kirichenko, L., Radivilova, T.: Analyzes of the distributed system load with multifractal input data flows. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM) Proceedings, pp. 260–264. IEEE (2017). https://doi.org/10.1109/cadsm.2017.7916130
Popa, S.M., Manea, G.M.: Using traffic self-similarity for network anomalies detection. In: Proceedings of 20th International Conference on Control Systems and Computer Science, pp. 639–644. IEEE (2015)
Betker, A., Gamrath, I., Kosiankowski, D., Lange, C., Lehmann, H., Pfeuffer, F., Simon, F., Werner, A.: Comprehensive topology and traffic model of a nationwide telecommunication network. IEEE/OSA J. Opt. Commun. Netw. 6(11), 1038–1047 (2014). https://doi.org/10.1364/JOCN.6.001038
Han, D., Chung, J.-M.: Self-similar traffic end-to-end delay minimization multipath routing algorithm. IEEE Commun. Lett. 18(12), 2121–2124 (2014). https://doi.org/10.1109/LCOMM.2014.2362747
Lemeshko, A.V., Evseeva, O.Y., Garkusha, S.V.: Research on tensor model of multi-path routing in telecommunication network with support of service quality by greate number of indices. Telecommun. Radio Eng. 73(15), 1339–1360 (2014). https://doi.org/10.1615/TelecomRadEng.v73.i15.30
Lakshman, N.L., Khan, R.U., Mishra, R.B.: MANETs: QoS and investigations on optimized link state routing protocol. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(10), 26–37 (2018). https://doi.org/10.5815/ijcnis.2018.10.04
Lemeshko, O., Yeremenko, O.: Enhanced method of fast re-routing with load balancing in software-defined networks. J. Electr. Eng. 68(6), 444–454 (2017). https://doi.org/10.1515/jee-2017-0079
Yeremenko, O., Lemeshko, O., Persikov, A.: Secure routing in reliable networks: pro-active and reactive approach. In: Advances in Intelligent Systems and Computing II, CSIT 2017. Advances in Intelligent Systems and Computing, vol. 689, pp. 631–655 (2018). https://doi.org/10.1007/978-3-319-70581-1_44
Fan, C., Zhang, T., Zeng, Z., Chen, Y.: Optimal base station density in cellular networks with self-similar traffic characteristics. In: Proceedings of 2017 Wireless Communications and Networking Conference (WCNC), pp. 1–6. (2017). https://doi.org/10.1109/wcnc.2017.7925881
Bulakh, V., Kirichenko, L., Radivilova, T.: Time series classification based on fractal properties. In: Proceedings of Second International Conference on Data Stream Mining & Processing (DSMP), pp. 198–201. IEEE (2018). https://doi.org/10.1109/dsmp.2018.8478532
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Radivilova, T., Kirichenko, L., Ageiev, D., Bulakh, V. (2020). The Methods to Improve Quality of Service by Accounting Secure Parameters. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-16621-2_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16620-5
Online ISBN: 978-3-030-16621-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)