Skip to main content

The Methods to Improve Quality of Service by Accounting Secure Parameters

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 938))

Abstract

A solution to the problem of ensuring quality of service, providing a greater number of services with higher efficiency taking into account network security is proposed. In this paper, experiments were conducted to analyze the effect of self-similarity and attacks on the quality of service parameters. Method of buffering and control of channel capacity and calculating of routing cost method in the network, which take into account the parameters of traffic multifractality and the probability of detecting attacks in telecommunications networks were proposed. The both proposed methods accounting the given restrictions on the delay time and the number of lost packets for every type quality of service traffic. During simulation the parameters of transmitted traffic (self-similarity, intensity) and the parameters of network (current channel load, node buffer size) were changed and the maximum allowable load of network was determined. The results of analysis show that occurrence of overload when transmitting traffic over a switched channel associated with multifractal traffic characteristics and presence of attack. It was shown that proposed methods can reduce the lost data and improve the efficiency of network resources.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Yu-Xing, Y.: Research for network security and reliability and performance assess. In: Proceedings of the Fourth International Conference on Intelligent Systems Design and Engineering Applications, Zhangjiajie, pp. 444–447 (2013). https://doi.org/10.1109/isdea.2013.506

  2. Daradkeh, Y.I., Kirichenko, L., Radivilova, T.: Development of QoS methods in the information networks with fractal traffic. Int. J. Electron. Telecommun. 64(1), 27–32 (2018). https://doi.org/10.24425/118142

    Article  Google Scholar 

  3. Acharya, H.S., Dutta, S.R., Bhoi, R.: The impact of self-similarity network traffic on quality of services (QoS) of telecommunication network. Int. J. IT Eng. Appl. Sci. Res. (IJIEASR) 2, 54–60 (2013)

    Google Scholar 

  4. Czarkowski, M., Kaczmarek, S., Wolff, M.: Influence of self-similar traffic type on performance of QoS routing algorithms. INTL J. Electron. Telecommun. 62(1), 81–87 (2016). https://doi.org/10.1515/eletel-2016-0011

    Article  Google Scholar 

  5. Ivanisenko, I., Kirichenko, L., Radivilova, T.: Investigation of self-similar properties of additive data traffic. In: Proceedings of 2015 Xth International Scientific and Technical Conference “Computer Sciences and Information Technologies” (CSIT), pp. 169–171. IEEE (2015). https://doi.org/10.1109/stc-csit.2015.7325459

  6. Pramanik, S., Datta, R., Chatterjee, P.: Self-similarity of data traffic in a Delay Tolerant Network. In: 2017 Wireless Days, pp. 39–42 (2017). https://doi.org/10.1109/wd.2017.7918112

  7. Bhat, U.N.: An Introduction to Queueing Theory: Modeling and Analysis in Applications. Birkhauser/Springer, Boston (2015)

    Book  Google Scholar 

  8. Hu, Z., Mukhin, V., Kornaga, Y., Lavrenko, Y., Herasymenko, O.: Distributed computer system resources control mechanism based on network-centric approach. Int. J. Intell. Syst. Appl. IJISA. 9(7), 41–51 (2017)

    Google Scholar 

  9. Ivanisenko, I., Radivilova, T.: The multifractal load balancing method. In: Proceedings of Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), pp. 122–123. IEEE (2015). https://doi.org/10.1109/infocommst.2015.7357289

  10. Aggarwal, A., Verma, R., Singh, A.: An efficient approach for resource allocations using hybrid scheduling and optimization in distributed system. Int. J. Educ. Manag. Eng. (IJEME) 8(3), 33–42 (2018). https://doi.org/10.5815/ijeme.2018.03.04

    Article  Google Scholar 

  11. Radivilova, T., Kirichenko, L., Ivanisenko, I.: Calculation of distributed system imbalance in condition of multifractal load. In: Proceedings of Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), pp. 156–158. IEEE (2016). https://doi.org/10.1109/infocommst.2016.7905366

  12. Kirichenko, L., Ivanisenko, I., Radivilova, T.: Dynamic load balancing algorithm of distributed systems. In: Proceedings of the 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pp. 515–518. IEEE (2016). https://doi.org/10.1109/tcset.2016.7452102

  13. Gupta, N., Srivastava, K., Sharma, A.: Reducing false positive in intrusion detection system: a survey. Int. J. Comput. Sci. Inf. Technol. 7(3), 1600–1603 (2016)

    Google Scholar 

  14. Deka, R., Bhattacharyya, D.: Self-similarity based DDoS attack detection using Hurst parameter. Secur. Commun. Netw. 9(17), 4468–4481 (2016)

    Article  Google Scholar 

  15. Ageyev, D., Kirichenko, L., Radivilova, T., Tawalbeh, M., Baranovskyi, O.: Method of self-similar load balancing in network intrusion detection system. In: Proceedings of 28th International Conference Radioelektronika (RADIOELEKTRONIKA), pp. 1–4. IEEE (2018). https://doi.org/10.1109/radioelek.2018.8376406

  16. Bulakh, V., Kirichenko, L., Radivilova, T., Ageiev, D.: Intrusion detection of traffic realizations based on machine learning using fractal properties. In: Proceedings of 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), pp. 1–4. IEEE (2018)

    Google Scholar 

  17. Sharma, R., Chaurasia, S.: An integrated perceptron Kernel classifier for intrusion detection system. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(12), 11–20 (2018). https://doi.org/10.5815/ijcnis.2018.12.02

    Article  Google Scholar 

  18. Chahal, J.K., Kaur, A.: A hybrid approach based on classification and clustering for intrusion detection system. Int. J. Math. Sci. Comput. (IJMSC) 2(4), 34–40 (2016). https://doi.org/10.5815/ijmsc.2016.04.04

    Article  Google Scholar 

  19. Nasr, A.A., Ezz, M.M., Abdulmaged, M.Z.: An intrusion detection and prevention system based on automatic learning of traffic anomalies. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 8(1), 53–60 (2016). https://doi.org/10.5815/ijcnis.2016.01.07

    Article  Google Scholar 

  20. Kirichenko, L., Radivilova, T.: Analyzes of the distributed system load with multifractal input data flows. In: 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM) Proceedings, pp. 260–264. IEEE (2017). https://doi.org/10.1109/cadsm.2017.7916130

  21. Popa, S.M., Manea, G.M.: Using traffic self-similarity for network anomalies detection. In: Proceedings of 20th International Conference on Control Systems and Computer Science, pp. 639–644. IEEE (2015)

    Google Scholar 

  22. Betker, A., Gamrath, I., Kosiankowski, D., Lange, C., Lehmann, H., Pfeuffer, F., Simon, F., Werner, A.: Comprehensive topology and traffic model of a nationwide telecommunication network. IEEE/OSA J. Opt. Commun. Netw. 6(11), 1038–1047 (2014). https://doi.org/10.1364/JOCN.6.001038

    Article  Google Scholar 

  23. Han, D., Chung, J.-M.: Self-similar traffic end-to-end delay minimization multipath routing algorithm. IEEE Commun. Lett. 18(12), 2121–2124 (2014). https://doi.org/10.1109/LCOMM.2014.2362747

    Article  Google Scholar 

  24. Lemeshko, A.V., Evseeva, O.Y., Garkusha, S.V.: Research on tensor model of multi-path routing in telecommunication network with support of service quality by greate number of indices. Telecommun. Radio Eng. 73(15), 1339–1360 (2014). https://doi.org/10.1615/TelecomRadEng.v73.i15.30

    Article  Google Scholar 

  25. Lakshman, N.L., Khan, R.U., Mishra, R.B.: MANETs: QoS and investigations on optimized link state routing protocol. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(10), 26–37 (2018). https://doi.org/10.5815/ijcnis.2018.10.04

    Article  Google Scholar 

  26. Lemeshko, O., Yeremenko, O.: Enhanced method of fast re-routing with load balancing in software-defined networks. J. Electr. Eng. 68(6), 444–454 (2017). https://doi.org/10.1515/jee-2017-0079

    Article  Google Scholar 

  27. Yeremenko, O., Lemeshko, O., Persikov, A.: Secure routing in reliable networks: pro-active and reactive approach. In: Advances in Intelligent Systems and Computing II, CSIT 2017. Advances in Intelligent Systems and Computing, vol. 689, pp. 631–655 (2018). https://doi.org/10.1007/978-3-319-70581-1_44

  28. Fan, C., Zhang, T., Zeng, Z., Chen, Y.: Optimal base station density in cellular networks with self-similar traffic characteristics. In: Proceedings of 2017 Wireless Communications and Networking Conference (WCNC), pp. 1–6. (2017). https://doi.org/10.1109/wcnc.2017.7925881

  29. Bulakh, V., Kirichenko, L., Radivilova, T.: Time series classification based on fractal properties. In: Proceedings of Second International Conference on Data Stream Mining & Processing (DSMP), pp. 198–201. IEEE (2018). https://doi.org/10.1109/dsmp.2018.8478532

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tamara Radivilova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Radivilova, T., Kirichenko, L., Ageiev, D., Bulakh, V. (2020). The Methods to Improve Quality of Service by Accounting Secure Parameters. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_32

Download citation

Publish with us

Policies and ethics