Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a...Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject.展开更多
Traffic emissions have become the major air pollution source in urban areas.Therefore,understanding the highly non-stational and complex impact of traffic factors on air quality is very important for building air qual...Traffic emissions have become the major air pollution source in urban areas.Therefore,understanding the highly non-stational and complex impact of traffic factors on air quality is very important for building air quality prediction models.Using real-world air pollutant data from Taipei City,this study integrates diverse factors,including traffic flow,speed,rainfall patterns,andmeteorological factors.We constructed a Bayesian network probabilitymodel based on rainfall events as a big data analysis framework to investigate understand traffic factor causality relationships and condition probabilities for meteorological factors and air pollutant concentrations.Generalized Additive Model(GAM)verified non-linear relationships between traffic factors and air pollutants.Consequently,we propose a long short term memory(LSTM)model to predict airborne pollutant concentrations.This study propose a new approach of air pollutants and meteorological variable analysis procedure by considering both rainfall amount and patterns.Results indicate improved air quality when controlling vehicle speed above 40 km/h and maintaining an average vehicle flow<1200 vehicles per hour.This study also classified rainfall events into four types depending on its characteristic.Wet deposition from varied rainfall types significantly affects air quality,with TypeⅠrainfall events(long-duration heavy rain)having the most pronounced impact.An LSTM model incorporating GAM and Bayesian network outcomes yields excellent performance,achieving correlation R^(2)>0.9 and 0.8 for first and second order air pollutants,i.e.,CO,NO,NO_(2),and NO_(x);and O_(3),PM_(10),and PM_(2.5),respectively.展开更多
Accurate traffic flow prediction has a profound impact on modern traffic management. Traffic flow has complex spatial-temporal correlations and periodicity, which poses difficulties for precise prediction. To address ...Accurate traffic flow prediction has a profound impact on modern traffic management. Traffic flow has complex spatial-temporal correlations and periodicity, which poses difficulties for precise prediction. To address this problem, a Multi-head Self-attention and Spatial-Temporal Graph Convolutional Network (MSSTGCN) for multiscale traffic flow prediction is proposed. Firstly, to capture the hidden traffic periodicity of traffic flow, traffic flow is divided into three kinds of periods, including hourly, daily, and weekly data. Secondly, a graph attention residual layer is constructed to learn the global spatial features across regions. Local spatial-temporal dependence is captured by using a T-GCN module. Thirdly, a transformer layer is introduced to learn the long-term dependence in time. A position embedding mechanism is introduced to label position information for all traffic sequences. Thus, this multi-head self-attention mechanism can recognize the sequence order and allocate weights for different time nodes. Experimental results on four real-world datasets show that the MSSTGCN performs better than the baseline methods and can be successfully adapted to traffic prediction tasks.展开更多
Urban traffic prediction with high precision is always the unremitting pursuit of intelligent transportation systems and is instrumental in bringing smart cities into reality.The fundamental challenges for traffic pre...Urban traffic prediction with high precision is always the unremitting pursuit of intelligent transportation systems and is instrumental in bringing smart cities into reality.The fundamental challenges for traffic prediction lie in the accurate modelling of spatial and temporal traffic dynamics.Existing approaches mainly focus on modelling the traffic data itself,but do not explore the traffic correlations implicit in origin-destination(OD)data.In this paper,we propose STOD-Net,a dynamic spatial-temporal OD feature-enhanced deep network,to simultaneously predict the in-traffic and out-traffic for each and every region of a city.We model the OD data as dynamic graphs and adopt graph neural networks in STOD-Net to learn a low-dimensional representation for each region.As per the region feature,we design a gating mechanism and operate it on the traffic feature learning to explicitly capture spatial correlations.To further capture the complicated spatial and temporal dependencies among different regions,we propose a novel joint feature,learning block in STOD-Net and transfer the hybrid OD features to each block to make the learning process spatiotemporal-aware.We evaluate the effectiveness of STOD-Net on two benchmark datasets,and experimental results demonstrate that it outperforms the state-of-the-art by approximately 5%in terms of prediction accuracy and considerably improves prediction stability up to 80%in terms of standard deviation.展开更多
With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of ...With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of network security,especially in identifying malicious attacks.However,due to the uneven distribution of network traffic data,particularly the imbalance between attack traffic and normal traffic,as well as the imbalance between minority class attacks and majority class attacks,traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data.To effectively tackle this challenge,we have designed a lightweight intrusion detection model based on diffusion mechanisms,named Diff-IDS,with the core objective of enhancing the model’s efficiency in parsing complex network traffic features,thereby significantly improving its detection speed and training efficiency.The model begins by finely filtering network traffic features and converting them into grayscale images,while also employing image-flipping techniques for data augmentation.Subsequently,these preprocessed images are fed into a diffusion model based on the Unet architecture for training.Once the model is trained,we fix the weights of the Unet network and propose a feature enhancement algorithm based on feature masking to further boost the model’s expressiveness.Finally,we devise an end-to-end lightweight detection strategy to streamline the model,enabling efficient lightweight detection of imbalanced samples.Our method has been subjected to multiple experimental tests on renowned network intrusion detection benchmarks,including CICIDS 2017,KDD 99,and NSL-KDD.The experimental results indicate that Diff-IDS leads in terms of detection accuracy,training efficiency,and lightweight metrics compared to the current state-of-the-art models,demonstrating exceptional detection capabilities and robustness.展开更多
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l...Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.展开更多
In this paper we apply the nonlinear time series analysis method to small-time scale traffic measurement data. The prediction-based method is used to determine the embedding dimension of the traffic data. Based on the...In this paper we apply the nonlinear time series analysis method to small-time scale traffic measurement data. The prediction-based method is used to determine the embedding dimension of the traffic data. Based on the reconstructed phase space, the local support vector machine prediction method is used to predict the traffic measurement data, and the BIC-based neighbouring point selection method is used to choose the number of the nearest neighbouring points for the local support vector machine regression model. The experimental results show that the local support vector machine prediction method whose neighbouring points are optimized can effectively predict the small-time scale traffic measurement data and can reproduce the statistical features of real traffic measurements.展开更多
Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, g...Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, grey theory, and chaos theory, this paper proposes a novel combined model, wavelet-grey-chaos (WGC), for network traffic prediction. In the WGC model, we develop a time series decomposition method without the boundary problem by modifying the standard à trous algorithm, decompose the network traffic into two parts, the residual part and the burst part to alleviate the accumulated error problem, and employ the grey model GM(1,1) and chaos model to predict the residual part and the burst part respectively. Simulation results on real network traffic show that the WGC model does improve prediction accuracy.展开更多
Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic mo...Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation.展开更多
Modeling of network traffic is a fundamental building block of computer science. Measurements of network traffic demonstrate that self-similarity is one of the basic properties of the network traffic possess at large ...Modeling of network traffic is a fundamental building block of computer science. Measurements of network traffic demonstrate that self-similarity is one of the basic properties of the network traffic possess at large time-scale. This paper investigates the change of non-stationary self-similarity of network traffic over time,and proposes a method of combining the discrete wavelet transform (DWT) and Schwarz information criterion (SIC) to detect change points of self-similarity in network traffic. The traffic is segmented into pieces around changing points with homogenous characteristics for the Hurst parameter,named local Hurst parameter,and then each piece of network traffic is modeled using fractional Gaussian noise (FGN) model with the local Hurst parameter. The presented experimental performance on data set from the Internet Traffic Archive (ITA) demonstrates that the method is more accurate in describing the non-stationary self-similarity of network traffic.展开更多
This paper researched the traffic of optical networks in time-space complexity,proposed a novel traf-fic model for complex optical networks based on traffic grooming,designed a traffic generator GTS(gener-ator based o...This paper researched the traffic of optical networks in time-space complexity,proposed a novel traf-fic model for complex optical networks based on traffic grooming,designed a traffic generator GTS(gener-ator based on time and space)with 'centralized+distributed' idea,and then made a simulation in Clanguage.Experiments results show that GTS can produce the virtual network topology which can changedynamically with the characteristic of scaling-free network.GTS can also groom the different traffic andtrigger them under real-time or scheduling mechanisms,generating different optical connections.Thistraffic model is convenient for the simulation of optical networks considering the traffic complexity.展开更多
Due to the diversified demands of quality of service(QoS) in volume multimedia application, QoS routings for multiservice are becoming a research hotspot in low earth orbit(LEO) satellite networks. A novel QoS sat...Due to the diversified demands of quality of service(QoS) in volume multimedia application, QoS routings for multiservice are becoming a research hotspot in low earth orbit(LEO) satellite networks. A novel QoS satellite routing algorithm for multi-class traffic is proposed. The goal of the routing algorithm is to provide the distinct QoS for different traffic classes and improve the utilization of network resources. Traffic is classified into three classes and allocated priorities based on their QoS requirements, respectively. A priority queuing mechanism guarantees the algorithm to work better for high-priority classes. In order to control the congestion, a blocking probability analysis model is built up based on the Markov process theory. Finally, according to the classification link-cost metrics, routings for different classes are calculated with the distinct QoS requirments and the status of network resource. Simulations verify the performance of the routing algorithm at different time and in different regions, and results demonstrate that the algorithm has great advantages in terms of the average delay and the blocking probability. Meanwhile, the robustness issue is also discussed.展开更多
Intrusion detection system ean make effective alarm for illegality of networkusers, which is absolutely necessarily and important to build security environment of communicationbase service According to the principle t...Intrusion detection system ean make effective alarm for illegality of networkusers, which is absolutely necessarily and important to build security environment of communicationbase service According to the principle that the number of network traffic can affect the degree ofself-similar traffic, the paper investigates the variety of self-similarity resulted fromunconventional network traffic. A network traffic model based on normal behaviors of user isproposed and the Hursl parameter of this model can be calculated. By comparing the Hurst parameterof normal traffic and the self-similar parameter, we ean judge whether the network is normal or notand alarm in time.展开更多
Many real-world networks are demonstrated to either have layered network structures in themselves or interconnect with other networks,forming multilayer network structures.In this survey,we give a brief review of rece...Many real-world networks are demonstrated to either have layered network structures in themselves or interconnect with other networks,forming multilayer network structures.In this survey,we give a brief review of recent progress in traffic dynamics on multilayer networks.First,we introduce several typical multilayer network models.Then,we present some mainstream performance indicators,such as network capacity,average transmission time,etc.Moreover,we discuss some optimization strategies for improving the transmission performance.Finally,we provide some open issues that could be further explored in the future.展开更多
This paper discusses the dynamic behavior and its predictions for a simulated traffic flow based on the nonlinear response of a vehicle to the leading car's movement in a single lane. Traffic chaos is a promising fie...This paper discusses the dynamic behavior and its predictions for a simulated traffic flow based on the nonlinear response of a vehicle to the leading car's movement in a single lane. Traffic chaos is a promising field, and chaos theory has been applied to identify and predict its chaotic movement. A simulated traffic flow is generated using a car-following model( GM model), and the distance between two cars is investigated for its dynamic properties. A positive Lyapunov exponent confirms the existence of chaotic behavior in the GM model. A new algorithm using a RBF NN (radial basis function neural network) is proposed to predict this traffic chaos. The experiment shows that the chaotic degree and predictable degree are determined by the first Lyapunov exponent. The algorithm proposed in this paper can be generalized to recognize and predict the chaos of short-time traffic flow series展开更多
Multiplicative multifractal process could well modal video traffic. The multiplier distributions in the multiplicatire multifractal model for video traffic are investigated and it is found that Gaussian is not suitabl...Multiplicative multifractal process could well modal video traffic. The multiplier distributions in the multiplicatire multifractal model for video traffic are investigated and it is found that Gaussian is not suitable for describing the multipliers on the small time scales. A new statistical distribution-symmetric Pareto distribution is introduced. It is applied instead of Gaussian for the multipliers on those scales. Based on that, the algorithm is updated so that symmetric pareto distribution and Gaussian distribution are used to model video traffic but on different time scales. The simulation results demonstrate that the algorithm could model video traffic more accurately.展开更多
As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big probl...As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life.展开更多
One of the key challenges in largescale network simulation is the huge computation demand in fine-grained traffic simulation.Apart from using high-performance computing facilities and parallelism techniques,an alterna...One of the key challenges in largescale network simulation is the huge computation demand in fine-grained traffic simulation.Apart from using high-performance computing facilities and parallelism techniques,an alternative is to replace the background traffic by simplified abstract models such as fluid flows.This paper suggests a hybrid modeling approach for background traffic,which combines ON/OFF model with TCP activities.The ON/OFF model is to characterize the application activities,and the ordinary differential equations(ODEs) based on fluid flows is to describe the TCP congestion avoidance functionality.The apparent merits of this approach are(1) to accurately capture the traffic self-similarity at source level,(2) properly reflect the network dynamics,and(3) efficiently decrease the computational complexity.The experimental results show that the approach perfectly makes a proper trade-off between accuracy and complexity in background traffic simulation.展开更多
While Internet traffic is currently dominated by elastic data transfers, it is anticipated that streaming applications will rapidly develop and contribute a significant amount of traffic in the near future. Therefore,...While Internet traffic is currently dominated by elastic data transfers, it is anticipated that streaming applications will rapidly develop and contribute a significant amount of traffic in the near future. Therefore, it is essential to understand and capture the relation between streaming and elastic traffic behavior. In this paper, we focus on developing simple yet effective approximations to capture this relationship. We study, then, an analytical model to evaluate the end-to-end performance of elastic traffic under multi-queuing system. This model is based on the fluid flow approximation. We assume that network architecture gives the head of priority to real time traffic and shares the remaining capacity between the elastic ongoing flows according to a specific weight.展开更多
基金the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2024-9/1).
文摘Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject.
基金supported by the Ministry of Environment(Environmental Protection Administration),Taiwan(Projects EPA-106-L103-02-A022,EPA-106-L102-02-A142)the"National"Science and Technology Council(Ministry of Science and Technology),Taiwan(Nos.108-2625-M-008-002,108-2119-M-008-003,108-2636-E-008-004,109-2636-E-008-008,110-2636-E-008-006,111-2636-E-008-014,and 112-2636-E-008-005(Young Scholar Fellowship Program),112-2119-M-008-010,and 108-2638-E-008-001-MY2(Shackleton Program Grant)).
文摘Traffic emissions have become the major air pollution source in urban areas.Therefore,understanding the highly non-stational and complex impact of traffic factors on air quality is very important for building air quality prediction models.Using real-world air pollutant data from Taipei City,this study integrates diverse factors,including traffic flow,speed,rainfall patterns,andmeteorological factors.We constructed a Bayesian network probabilitymodel based on rainfall events as a big data analysis framework to investigate understand traffic factor causality relationships and condition probabilities for meteorological factors and air pollutant concentrations.Generalized Additive Model(GAM)verified non-linear relationships between traffic factors and air pollutants.Consequently,we propose a long short term memory(LSTM)model to predict airborne pollutant concentrations.This study propose a new approach of air pollutants and meteorological variable analysis procedure by considering both rainfall amount and patterns.Results indicate improved air quality when controlling vehicle speed above 40 km/h and maintaining an average vehicle flow<1200 vehicles per hour.This study also classified rainfall events into four types depending on its characteristic.Wet deposition from varied rainfall types significantly affects air quality,with TypeⅠrainfall events(long-duration heavy rain)having the most pronounced impact.An LSTM model incorporating GAM and Bayesian network outcomes yields excellent performance,achieving correlation R^(2)>0.9 and 0.8 for first and second order air pollutants,i.e.,CO,NO,NO_(2),and NO_(x);and O_(3),PM_(10),and PM_(2.5),respectively.
基金supported by the National Natural Science Foundation of China(Grant Nos.62472149,62376089,62202147)Hubei Provincial Science and Technology Plan Project(2023BCB04100).
文摘Accurate traffic flow prediction has a profound impact on modern traffic management. Traffic flow has complex spatial-temporal correlations and periodicity, which poses difficulties for precise prediction. To address this problem, a Multi-head Self-attention and Spatial-Temporal Graph Convolutional Network (MSSTGCN) for multiscale traffic flow prediction is proposed. Firstly, to capture the hidden traffic periodicity of traffic flow, traffic flow is divided into three kinds of periods, including hourly, daily, and weekly data. Secondly, a graph attention residual layer is constructed to learn the global spatial features across regions. Local spatial-temporal dependence is captured by using a T-GCN module. Thirdly, a transformer layer is introduced to learn the long-term dependence in time. A position embedding mechanism is introduced to label position information for all traffic sequences. Thus, this multi-head self-attention mechanism can recognize the sequence order and allocate weights for different time nodes. Experimental results on four real-world datasets show that the MSSTGCN performs better than the baseline methods and can be successfully adapted to traffic prediction tasks.
基金supported by the National Natural Science Foundation of China,Grant/Award Number:62401338by the Shandong Province Excellent Youth Science Fund Project(Overseas),Grant/Award Number:2024HWYQ-028by the Fundamental Research Funds of Shandong University.
文摘Urban traffic prediction with high precision is always the unremitting pursuit of intelligent transportation systems and is instrumental in bringing smart cities into reality.The fundamental challenges for traffic prediction lie in the accurate modelling of spatial and temporal traffic dynamics.Existing approaches mainly focus on modelling the traffic data itself,but do not explore the traffic correlations implicit in origin-destination(OD)data.In this paper,we propose STOD-Net,a dynamic spatial-temporal OD feature-enhanced deep network,to simultaneously predict the in-traffic and out-traffic for each and every region of a city.We model the OD data as dynamic graphs and adopt graph neural networks in STOD-Net to learn a low-dimensional representation for each region.As per the region feature,we design a gating mechanism and operate it on the traffic feature learning to explicitly capture spatial correlations.To further capture the complicated spatial and temporal dependencies among different regions,we propose a novel joint feature,learning block in STOD-Net and transfer the hybrid OD features to each block to make the learning process spatiotemporal-aware.We evaluate the effectiveness of STOD-Net on two benchmark datasets,and experimental results demonstrate that it outperforms the state-of-the-art by approximately 5%in terms of prediction accuracy and considerably improves prediction stability up to 80%in terms of standard deviation.
基金supported by the Key Research and Development Program of Hainan Province(Grant Nos.ZDYF2024GXJS014,ZDYF2023GXJS163)the National Natural Science Foundation of China(NSFC)(Grant Nos.62162022,62162024)Collaborative Innovation Project of Hainan University(XTCX2022XXB02).
文摘With the rapid development of Internet of Things technology,the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast,bringing unprecedented challenges to the field of network security,especially in identifying malicious attacks.However,due to the uneven distribution of network traffic data,particularly the imbalance between attack traffic and normal traffic,as well as the imbalance between minority class attacks and majority class attacks,traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data.To effectively tackle this challenge,we have designed a lightweight intrusion detection model based on diffusion mechanisms,named Diff-IDS,with the core objective of enhancing the model’s efficiency in parsing complex network traffic features,thereby significantly improving its detection speed and training efficiency.The model begins by finely filtering network traffic features and converting them into grayscale images,while also employing image-flipping techniques for data augmentation.Subsequently,these preprocessed images are fed into a diffusion model based on the Unet architecture for training.Once the model is trained,we fix the weights of the Unet network and propose a feature enhancement algorithm based on feature masking to further boost the model’s expressiveness.Finally,we devise an end-to-end lightweight detection strategy to streamline the model,enabling efficient lightweight detection of imbalanced samples.Our method has been subjected to multiple experimental tests on renowned network intrusion detection benchmarks,including CICIDS 2017,KDD 99,and NSL-KDD.The experimental results indicate that Diff-IDS leads in terms of detection accuracy,training efficiency,and lightweight metrics compared to the current state-of-the-art models,demonstrating exceptional detection capabilities and robustness.
基金funding by Comunidad de Madrid within the framework of the Multiannual Agreement with Universidad Politécnica de Madrid to encourage research by young doctors(PRINCE project).
文摘Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks.
基金Project supported by the National Natural Science Foundation of China (Grant No 60573065)the Natural Science Foundation of Shandong Province,China (Grant No Y2007G33)the Key Subject Research Foundation of Shandong Province,China(Grant No XTD0708)
文摘In this paper we apply the nonlinear time series analysis method to small-time scale traffic measurement data. The prediction-based method is used to determine the embedding dimension of the traffic data. Based on the reconstructed phase space, the local support vector machine prediction method is used to predict the traffic measurement data, and the BIC-based neighbouring point selection method is used to choose the number of the nearest neighbouring points for the local support vector machine regression model. The experimental results show that the local support vector machine prediction method whose neighbouring points are optimized can effectively predict the small-time scale traffic measurement data and can reproduce the statistical features of real traffic measurements.
基金Project supported by National Basic Research Program of China (Grant Nos 2009CB320505 and 2009CB320504)National High Technology Research and Development Program of China (Grant Nos 2006AA01Z235, 2007AA01Z206 and 2009AA01Z210)
文摘Network traffic prediction models can be grouped into two types, single models and combined ones. Combined models integrate several single models and thus can improve prediction accuracy. Based on wavelet transform, grey theory, and chaos theory, this paper proposes a novel combined model, wavelet-grey-chaos (WGC), for network traffic prediction. In the WGC model, we develop a time series decomposition method without the boundary problem by modifying the standard à trous algorithm, decompose the network traffic into two parts, the residual part and the burst part to alleviate the accumulated error problem, and employ the grey model GM(1,1) and chaos model to predict the residual part and the burst part respectively. Simulation results on real network traffic show that the WGC model does improve prediction accuracy.
基金The National Natural Science Foundation ofChia(No60372076)The Important cienceand Technology Key Item of Shanghai Science and Technology Bureau ( No05dz15004)
文摘Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation.
基金the National High Technology Research and Development Program (863) of China(Nos. 2005AA145110 and 2006AA01Z436)the Natural Science Foundation of Shanghai of China(No. 05ZR14083)the Pudong New Area Technology Innovation Public Service Platform of China(No. PDPT2005-04)
文摘Modeling of network traffic is a fundamental building block of computer science. Measurements of network traffic demonstrate that self-similarity is one of the basic properties of the network traffic possess at large time-scale. This paper investigates the change of non-stationary self-similarity of network traffic over time,and proposes a method of combining the discrete wavelet transform (DWT) and Schwarz information criterion (SIC) to detect change points of self-similarity in network traffic. The traffic is segmented into pieces around changing points with homogenous characteristics for the Hurst parameter,named local Hurst parameter,and then each piece of network traffic is modeled using fractional Gaussian noise (FGN) model with the local Hurst parameter. The presented experimental performance on data set from the Internet Traffic Archive (ITA) demonstrates that the method is more accurate in describing the non-stationary self-similarity of network traffic.
基金Supported by the High Technology Research and Development Programme of China (No. 2008AA01A328)the National Natural Science Foundation of China (No. 60772022)+2 种基金the Program for New Century Excellent Talents in University (No. NCET-05-0112)the Program for Changjiang Scholars and Innovative Research Team in University of MOE, China (No. IRT0609)111 Project (No. B07005)
文摘This paper researched the traffic of optical networks in time-space complexity,proposed a novel traf-fic model for complex optical networks based on traffic grooming,designed a traffic generator GTS(gener-ator based on time and space)with 'centralized+distributed' idea,and then made a simulation in Clanguage.Experiments results show that GTS can produce the virtual network topology which can changedynamically with the characteristic of scaling-free network.GTS can also groom the different traffic andtrigger them under real-time or scheduling mechanisms,generating different optical connections.Thistraffic model is convenient for the simulation of optical networks considering the traffic complexity.
基金This work is supported by the State 863 Program (2003AA148040), the National Science Foundation of China (No. 10471151, No. 60216263, No. 6990312), New Century Excellent Talent Support Project of Chinese Ministry of Education, Doctor Station Foundation of Chinese Ministry of Education, Chongqing Tackle Key Problem Program (CSTC, 2004AC2008) and Chongqing Natural Science Foundation (CSTC, 2004BB2151).
基金Supported by the National High Technology Research and Development Program of China(″863″Program)(2010AAxxx404)~~
文摘Due to the diversified demands of quality of service(QoS) in volume multimedia application, QoS routings for multiservice are becoming a research hotspot in low earth orbit(LEO) satellite networks. A novel QoS satellite routing algorithm for multi-class traffic is proposed. The goal of the routing algorithm is to provide the distinct QoS for different traffic classes and improve the utilization of network resources. Traffic is classified into three classes and allocated priorities based on their QoS requirements, respectively. A priority queuing mechanism guarantees the algorithm to work better for high-priority classes. In order to control the congestion, a blocking probability analysis model is built up based on the Markov process theory. Finally, according to the classification link-cost metrics, routings for different classes are calculated with the distinct QoS requirments and the status of network resource. Simulations verify the performance of the routing algorithm at different time and in different regions, and results demonstrate that the algorithm has great advantages in terms of the average delay and the blocking probability. Meanwhile, the robustness issue is also discussed.
文摘Intrusion detection system ean make effective alarm for illegality of networkusers, which is absolutely necessarily and important to build security environment of communicationbase service According to the principle that the number of network traffic can affect the degree ofself-similar traffic, the paper investigates the variety of self-similarity resulted fromunconventional network traffic. A network traffic model based on normal behaviors of user isproposed and the Hursl parameter of this model can be calculated. By comparing the Hurst parameterof normal traffic and the self-similar parameter, we ean judge whether the network is normal or notand alarm in time.
基金the National Natural Science Foundation of China(Grant No.61304154).
文摘Many real-world networks are demonstrated to either have layered network structures in themselves or interconnect with other networks,forming multilayer network structures.In this survey,we give a brief review of recent progress in traffic dynamics on multilayer networks.First,we introduce several typical multilayer network models.Then,we present some mainstream performance indicators,such as network capacity,average transmission time,etc.Moreover,we discuss some optimization strategies for improving the transmission performance.Finally,we provide some open issues that could be further explored in the future.
文摘This paper discusses the dynamic behavior and its predictions for a simulated traffic flow based on the nonlinear response of a vehicle to the leading car's movement in a single lane. Traffic chaos is a promising field, and chaos theory has been applied to identify and predict its chaotic movement. A simulated traffic flow is generated using a car-following model( GM model), and the distance between two cars is investigated for its dynamic properties. A positive Lyapunov exponent confirms the existence of chaotic behavior in the GM model. A new algorithm using a RBF NN (radial basis function neural network) is proposed to predict this traffic chaos. The experiment shows that the chaotic degree and predictable degree are determined by the first Lyapunov exponent. The algorithm proposed in this paper can be generalized to recognize and predict the chaos of short-time traffic flow series
文摘Multiplicative multifractal process could well modal video traffic. The multiplier distributions in the multiplicatire multifractal model for video traffic are investigated and it is found that Gaussian is not suitable for describing the multipliers on the small time scales. A new statistical distribution-symmetric Pareto distribution is introduced. It is applied instead of Gaussian for the multipliers on those scales. Based on that, the algorithm is updated so that symmetric pareto distribution and Gaussian distribution are used to model video traffic but on different time scales. The simulation results demonstrate that the algorithm could model video traffic more accurately.
文摘As a representative of chain-based protocol in Wireless Sensor Networks (WSNs), EEPB is an elegant solution on energy efficiency. However, in the latter part of the operation of the network, there is still a big problem: reserving energy of the node frequently presents the incapacity of directly communicating with the base station, at the same time capacity of data acquisition and transmission as normal nodes. If these nodes were selected as LEADER nodes, that will accelerate the death process and unevenness of energy consumption distribution among nodes.This paper proposed a chain routing algorithm based ontraffic prediction model (CRTP).The novel algorithmdesigns a threshold judgment method through introducing the traffic prediction model in the process of election of LEADER node. The process can be dynamically adjusted according to the flow forecasting. Therefore, this algorithm lets the energy consumption tend-ing to keep at same level. Simulation results show that CRTP has superior performance over EEPB in terms of balanced network energy consumption and the prolonged network life.
基金supported by the Science and Technology Project of Zhejiang Province(No. 2014C01051)the National High Technology Development 863 Program of China( No.2015AA011901)
文摘One of the key challenges in largescale network simulation is the huge computation demand in fine-grained traffic simulation.Apart from using high-performance computing facilities and parallelism techniques,an alternative is to replace the background traffic by simplified abstract models such as fluid flows.This paper suggests a hybrid modeling approach for background traffic,which combines ON/OFF model with TCP activities.The ON/OFF model is to characterize the application activities,and the ordinary differential equations(ODEs) based on fluid flows is to describe the TCP congestion avoidance functionality.The apparent merits of this approach are(1) to accurately capture the traffic self-similarity at source level,(2) properly reflect the network dynamics,and(3) efficiently decrease the computational complexity.The experimental results show that the approach perfectly makes a proper trade-off between accuracy and complexity in background traffic simulation.
文摘While Internet traffic is currently dominated by elastic data transfers, it is anticipated that streaming applications will rapidly develop and contribute a significant amount of traffic in the near future. Therefore, it is essential to understand and capture the relation between streaming and elastic traffic behavior. In this paper, we focus on developing simple yet effective approximations to capture this relationship. We study, then, an analytical model to evaluate the end-to-end performance of elastic traffic under multi-queuing system. This model is based on the fluid flow approximation. We assume that network architecture gives the head of priority to real time traffic and shares the remaining capacity between the elastic ongoing flows according to a specific weight.