Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rodrigues, Paul
- Quantitative Trade-off Analysis in Quality Attributes of a Software Architecture Using Bayesian Network Model
Abstract Views :207 |
PDF Views:2
Authors
Source
National Journal of System and Information Technology, Vol 2, No 2 (2009), Pagination: 176-186Abstract
Research into design rationale in the past has focused on argumentation-based design deliberations. These approaches cannot be used to support change impact analysis effectively because the dependency between design elements and decisions are not well represented and cannot be quantified. Without such knowledge, designers and architects cannot easily assess how changing requirements and design decisions may affect the system. We apply Bayesian Network Model (BNM), to capture the probabilistic causal relationships between design elements and decisions. We employ three different BNMbased reasoning methods to analyze the trade-off between the conflicting quality attributes. Markov blanket discovery algorithms can be used for quality assessment BNMs. Additionally, work will be done to determine how known optimization methods such as Tabu search may be applied in the context of the proposed framework. Ultimately, the goal is to create a possibility of automatic execution of steps involved in architectural optimization.Keywords
Network Model (BNM), Architectural Tradeoff Analysis Method (ATAM) Software Architectural Analysis Method (SAAM), Software Architecture Assessment using Bayesian Networks (SAABNet), Stake Holders Expects(SHE) , and Markov Blanket (MB)References
- R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere, “The Architecture Tradeoff Analysis Method”, Proceedings of ICECCS'98, 8-1- 1998.
- R.L. Nord, M.R. Barbacci, P. Clements, R. Kazman, M. Klein, L. O'Brien, J.E. Tomayko, “Integrating the Architecture Tradeoff Analysis Method (ATAM) with the cost benefit analysis method (CBAM)”, CMU SEI Technical Note CMU/SEI-2003- TN-038, Software Engineering Institute, Pittsburgh, PA, 2003.
- Paul Clements, John Bergey and Dave Mason, ”Using the SEI Architecture Tradeoff Analysis Method to Evaluate WIN-T: A Case Study” CMU SEI Technical Note CMU/SEI-2005-TN-027. Software Engineering Institute, Pittsburgh, PA, 2005.
- Houmb, Siv Hilde; Georg, Geri ; Jürjens, Jan ; France, Robert: “An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach”. Integrating Security and Software Engineering: Advances and Future Visions / Mouratidis, Haralambos; Giorgini, Paolo: Idea Group Inc, 2006, 190-219.
- Bate, I. and N. Audsley (2002): “Architecture Tradeoff Analysis and the Influence on Component Design”. Proceedings of Workshop on Component- Based Software Engineering: Composing Systems from Components
- Mildred N. Ambe, Frederick Vizeacoumar ” Evaluation of two architectures Using the Architecture Tradeoff Analysis Method (ATAM), 2002.
- “Software Architecture for Software-Intensive Systems” from www.sei.cmu.edu/architecture /ata_method.html
- Arnon Rotem-Gal-Oz, “Architecture Tradeoff Analysis Method“ www.rgoarchitects.com/Files/ATAM.ppt
- Liming Zhu, Muhammad Ali Babar, Ross Jeffery” Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper” EWSA 2004: 225-229.
- Ali Babar, M., Kitchenham, B., “Assessment of a Framework for Comparing Software Architecture Analysis Methods”, in Proceedings of the 11th International Conference on Evaluation and Assessment in Software Engineering, 2007, Keele, England.
- M. Savahnberg, C. Wohlin. L. Lundberg and M. Mattson, “A Method for Understanding Quality Attributes in Software Architecture Structure.” Proceedings of the 14th International Conference in Software Engineering and Knowledge Engineering , pp. 819-826, July 2002
- T.Saaty, The Analytic Hierarchy Process: Planning , Priority, Setting, Resource Allocation, McGraw-Hill, 1980.
- Lee, J. and K.-H. Hsu, Modeling software architectures with goals in virtual university environment. Information and Software Technology, 2002. 44(6): p. 361- 380.
- Van Gurp, J.B., J. SAABNet: Managing qualitative knowledge in software architecture assessment VO -. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the. 2000.
- N. Sankar Ram and Dr. Paul Rodrigues “Intelligent Risk Prophecy Using More Quality Attributes Injected ATAM and Design Patterns”, 7th WSEAS Int, Conf. on Software Engineering, Parallel and Distributed Systems(SEPADS ’08) University of Cambridge, UK, Feb 20-22, 2008
- N.Sankar Ram et.al “Impact on quality attributes for evaluating software architecture using ATAM and Design Patterns” Asian Journal of Information Technology 7(3):126-129,2008, Medwell Journals,2008
- N.Sankar Ram , Paul Rodrigues, B.Rajalakshmi, “Impact on quality attributes for evaluating software architecture”, Asian Journal of Information Technology 7 (3): 126-129, 2008 ISSN: 1682-3915 © Medwell Journals, 2008
- Extreme Pedagogy: An Agile Teaching-Learning Methodology for Engineering Education
Abstract Views :172 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, DMI College of Engineering, Chennai – 600123, Tamil Nadu, IN
1 Department of Computer Science and Engineering, DMI College of Engineering, Chennai – 600123, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 9 (2015), Pagination: 828-833Abstract
Traditional instructor-centered, lecture-based teaching methods in engineering education have been criticized for being too linear, dogmatic, systematic and constraining. This paper proposes 'Extreme Pedagogy', a student-centered teaching-learning conceptual framework to improve quality of engineering education which is built on four core values: students and teachers and their interactions, working knowledge, collaboration with students and responding to change. Extreme Pedagogy derives its philosophy from Extreme Programming, an agile software methodology. Extreme Pedagogy aims at continuous improvement of student learning, keeping students' needs and satisfaction as its focus.Keywords
Engineering Education, Extreme Pedagogy, Extreme Programming, Teaching and Learning.- Size and Flexibility Metrics for E-Learning System
Abstract Views :159 |
PDF Views:1
Authors
Affiliations
1 SRM University, Chennai, IN
2 Vellammal Engineering College, Chennai, IN
3 RVS Padmavathi College of Engineering &Technology, Chennai, IN
4 Dr.MGR University, Chennai, IN
1 SRM University, Chennai, IN
2 Vellammal Engineering College, Chennai, IN
3 RVS Padmavathi College of Engineering &Technology, Chennai, IN
4 Dr.MGR University, Chennai, IN
Source
Software Engineering, Vol 4, No 7 (2012), Pagination: 298-301Abstract
E-learning system is a comprehensive software package that supports for teaching the subject, testing, simulation, discussion or other significant aspect. In software system development process, estimation is playing very important role. The success of any software project largely depends on effective estimation of project effort, time and cost. Estimation helps in setting realistic targets for completing the project. The widely used software estimation techniques like LOC, FP, and COCOMO are not effectively supported for estimating E-Learning systems because the structure and components of E-learning system is different and also the current estimation methodologies given generic solution to all kind of software system. The characteristics and specifications of subject oriented software like E-learning systems not fully come under the limit of existing estimators. They provide wrong estimates and lead customer dissatisfaction due to incompleteness, loss and delay. So in this research paper, along with the concepts of FPA, the new size metric is proposed for E-learning system estimation. This Technique considers the document part and application part of E-Learning system very effectively and estimates the size. In addition with size metric new flexibility metric introduced, it is used to calculate flexibility of software.Keywords
FPA-Function Point Analysis, DTP–Document for Teaching Part, CCP-Common Computational Part, ELSSIZE–E-Learning System Size.- Open Source Test Automation ROI
Abstract Views :144 |
PDF Views:2
Authors
Affiliations
1 Department of CSE (scholar), Bharath University, Chennai, IN
2 Vellamal Engineering College, Chennai, IN
3 Department of IT, Kings Engineering College, Chennai, IN
4 Department of IT, Kings Engineering College, Chennai, IN
1 Department of CSE (scholar), Bharath University, Chennai, IN
2 Vellamal Engineering College, Chennai, IN
3 Department of IT, Kings Engineering College, Chennai, IN
4 Department of IT, Kings Engineering College, Chennai, IN
Source
Software Engineering, Vol 3, No 10 (2011), Pagination: 445-449Abstract
The need of increasing the potential benefits and reliability of a project by re-usable Test Automation Framework coupled with open source tools that use the concept of Return on Investment (ROI).Which reduces the execution cost and time of testing cycle and maintenance effort thereby resulting in increased productivity by using additional test cases within a given schedule. In this paper we will discuss how the ROI calculation can also be achieved through TAF Selenium tool that is used to reduce the execution time and cost without any framework costs and optimum usage and uses discrete business keywords which are reusable. High ROI can also be achieved on the basis of cost, time and extensible. Using TAF the script development result will help increase the speed of test execution and provides maximum number of resources, increase productivity and ROI; it provides ease of script generation & management, concurrent, remote execution, test data generation and customized reports with screen shots.Keywords
Test Automation Framework, ROI Calculation, Tool, Reusable, Driven Approach.- Fuzzy Clustering Algorithms-Different Methodologies and Parameters-A Survey
Abstract Views :158 |
PDF Views:1
Authors
Affiliations
1 Department of IT, Jawahar Engineering College, IN
2 Velammal Engineering College, IN
3 Department of CSE, Pondicherry University, IN
1 Department of IT, Jawahar Engineering College, IN
2 Velammal Engineering College, IN
3 Department of CSE, Pondicherry University, IN
Source
Data Mining and Knowledge Engineering, Vol 2, No 12 (2010), Pagination:Abstract
Fuzzy clustering algorithms are helpful when there exists a dataset with sub groupings of points having indistinct boundaries and overlap between the clusters. This paper gives an overview of different classical fuzzy clustering algorithm. The fuzzy clustering algorithms can be categorized as classical fuzzy clustering and shape based clustering. The paper describes about the general working behavior, the methodologies followed on these approaches and the parameters which affects the performance of classical fuzzy clustering algorithms.
Keywords
Fuzzy Clustering, Classical Fuzzy Clustering Shape Based Clustering.- Novel Approach of Implementing Speech Recognition using Neural Networks for Information Retrieval
Abstract Views :129 |
PDF Views:0
Authors
K. Sajeer
1,
Paul Rodrigues
2
Affiliations
1 Department of Computer Science, Research and Development Centre, Bharathiar University, Coimbatore - 641 046, Tamil Nadu, IN
2 DMI Engineering College, Palanchur , Chennai - 600123, Tamil Nadu, IN
1 Department of Computer Science, Research and Development Centre, Bharathiar University, Coimbatore - 641 046, Tamil Nadu, IN
2 DMI Engineering College, Palanchur , Chennai - 600123, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 33 (2015), Pagination:Abstract
Objective: Retrieval of information using speech recognition and Neural Network. Methods: A novel method is proposed for information retrieval using speech recognition and Neural Network. Automatic Speech Recognition (ASR) is the technological process that allows translation of information spoken by a human being into corresponding text. Marcovian technique is used to update the sampling weight generated from the input speech. The Kalman filtering technique is used to extract the feature vector (s). Neural Network is used to classify the feature vector (s) based on the energy updation. Results: The performance of the proposed method is evaluated in terms of SNR. The system components are speech processing, feature extraction, training and testing by using neural networks and information retrieval. Conclusion: In the proposed method the retrieve process proved >90% success.Keywords
Information Retrieval, Kalman Filtering, Marcovian Technique, Neural Network, Speech Recognition.- Estimating the size of E-Learning System using Learning Object Points Method
Abstract Views :137 |
PDF Views:0
Authors
Affiliations
1 SRM University, Kattankulathur, Chennai - 603203, Tamil Nadu, IN
2 DMI College of Engineering, Chennai – 600123, Tamil Nadu, IN
1 SRM University, Kattankulathur, Chennai - 603203, Tamil Nadu, IN
2 DMI College of Engineering, Chennai – 600123, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
Background/Objectives: Software size estimation is the key factor to determine the planning activities of software development process. Size is the base factor to determine effort, duration, schedule, cost and others that affect the development process. E-Learning system is also a software system support for Computer and internet based teaching and learning process. Development of E-Learning system is under crises because of improper estimates that lead incompleteness, loss and delay, it affects customer satisfaction. To overcome the problem, a research made on the sizing techniques used in industry and the inabilities are identified. Methods/Statistical Analysis: Based on the analysis of all industry oriented size estimation techniques, this research introduces a new sizing technique called Learning Object Point method (LOP). Learning Object Points method is quantifying the size and complexity of an E-Learning system in terms of learning objects and functionalities. Sizing is independent of computer languages, development methodology and technology behind the development. LOP can be estimated early stage of software development process. It is prepared based on the user perspective so users of the E-Learning system have a better understanding of what LOP are measuring. Findings: The performance analysis of Learning Object Point’s method was conducted over Function point Analysis by using different projects developed in the industry. Size and duration calculated using FPA produced wrong results. So the project management activities like planning, scheduling and costing produced imprecise outcomes but LOP produced more close to actual results so it supports project management activities effectively. Applications/Improvements: LOP can be used to size E-Learning applications accurately. Sizing is important component in determining productivity. It is easily understood by the non-technical user. This helps communicate sizing information to a user or customer. Conversion to LOC is similar to FP to LOC conversion. It also supports to estimate any kind software application other than E-Learning system also. Estimate development effort and Cost benefit analysis using LOP. To Derive Business Decisions.Keywords
E-Learning System, Learning Object Points Method, Size Estimation, Software Project Management, Software Sizing- ANN Models and their Implications in Content Extraction
Abstract Views :139 |
PDF Views:0
Authors
Affiliations
1 JNTUK, Kakinada – 533003, Andhra Pradesh, IN
2 King Khalid University, SA
3 Central University, Kalapet – 605014, Puducherry, IN
1 JNTUK, Kakinada – 533003, Andhra Pradesh, IN
2 King Khalid University, SA
3 Central University, Kalapet – 605014, Puducherry, IN
Source
Indian Journal of Science and Technology, Vol 9, No 30 (2016), Pagination:Abstract
Objectives: Internet is the repository of information, which contains enormous information about the past, present which can be used to predict future. To know the unknown users are inclined towards searching the internet rather than referencing the library because of ease of availability. This requirement initiates the need to find the content of a web page with in shortest period of time irrespective of the form the page is. So information and content extraction need to be at a basic generic level and easier to implement without depending on any major software. Methods: The study aims on extraction of information from the available data after the data is digitized. The digitized data is converted to pixel- maps which are universal. The pixel map will not face the issues of the form and the format of the web page content. Statistical method is incorporated to extract the attributes of the images so that issues of language hence text-script and format do not pose problems, the extracted features are presented to the Back Propagation algorithm. Findings: The accuracy is presented and how the content extraction within certain bounds could be possible Tested using unstructured word sets chosen from web pages. The method is demonstrated for mono lingual, multi-lingual and transliterated documents so that the applicability is universal. Applications/Improvement: The method is generic, uses pixel-maps of the data which is software and language independent.Keywords
Back Propagation, Content Extraction, Information, Statistical, Deterministic.- Novel Creative Innovative Patterns for Architecture Analysis (CIPA)
Abstract Views :113 |
PDF Views:0
Authors
Affiliations
1 Computer Science Department, SRM University, SRM Nagar, Potheri, Kattankulathur, Kancheepuram District, Near Potheri Railway Station, Chennai - 603203, Tamil Nadu, IN
2 Computer Science Department, King Khalid University, Abha, SA
1 Computer Science Department, SRM University, SRM Nagar, Potheri, Kattankulathur, Kancheepuram District, Near Potheri Railway Station, Chennai - 603203, Tamil Nadu, IN
2 Computer Science Department, King Khalid University, Abha, SA
Source
Indian Journal of Science and Technology, Vol 9, No 30 (2016), Pagination:Abstract
Objectives: To improve the quality attributes of software architecture using new patterns. Methods/Statistical Analysis: Software architecture analysis methods are developed to reduce risk and to improve software quality. Patterns which have impact on the quality of software systems are used for the development of software. In this paper, novel Creative Innovative patterns are used. Findings: When Creative Innovative patterns are applied in the case study of hospital management system, the quality attributes like bug fixing cost, scalability, availability, maintainability, usability and reliability are improved. Application/Improvement: This paper uses Hospital management system which is enriched by Creative Innovative patterns and explains how these patterns help to improve the quality attributes of the architecture of a Hospital management system.Keywords
ATAM, Creative Innovative Patterns Pattern, Hospital Management System, Software Architecture Analysis Methods.- A Potential and Proficient Relay Node Selection (PPRS) Mechanism for MANET Performance Enhancement
Abstract Views :171 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SRM University, Chennai – 603203, Tamil Nadu, IN
2 Department of CSE, College of CS, KKU, Abha, SA
1 School of Computing, SRM University, Chennai – 603203, Tamil Nadu, IN
2 Department of CSE, College of CS, KKU, Abha, SA
Source
Indian Journal of Science and Technology, Vol 9, No 47 (2016), Pagination:Abstract
Objectives: The main objective is to propose a Potential and Proficient Relay Node Selection (PPRS) Mechanism for progressing MANET Performance. Method/Analysis: Although, Routing issues are under constant study for many years now already. The literature shows that the issue of performance lacking in highly dynamic MANETs has not been completely eliminated. Consequently, the main method adapted by PPRS mechanism is the individual next hop selection consecutively along with the estimation of success probability for selecting that node. Findings: The consequent and persistent next hop selection builds up MANET routes while assuring great communication statistics even under highly dynamic conditions. Novelty/Improvement: The performance of the PPRS mechanism is contrasted with existing EDEAR mechanism using simulations in the network simulator.Keywords
Energy, MANET, Mobility, Relay Node, Throughput.- Engaging Millennial Students in an Engineering Classroom using Extreme Pedagogy
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, DMI College of Engineering, Chennai - 600123, Tamil Nadu, IN
1 Department of Computer Science and Engineering, DMI College of Engineering, Chennai - 600123, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 24 (2015), Pagination:Abstract
Students of the millennial generation, born in the late twentieth century, have been raised in an environment of technology, entertainment, information and social connections. Unlike their predecessors in the previous generation, they have different educational expectations. The differences these students bring to the classroom are a challenge and also an opportunity for the instructors to provide useful learning experiences to these students. Traditional pedagogy, which is characterized by lecture-styled teaching seems to be inappropriate to respond to the needs and characteristics of the millennials. This paper discusses the unique characteristics of the millennial students, limitations of the traditional pedagogy to serve the millennials and proposes a novel pedagogy called, Extreme Pedagogy as an alternative to engage effectively today’s students in the engineering classroom.Keywords
Engineering Education, Extreme Pedagogy, Millennials, Traditional Pedagogy.- Modified Deep Learning Methodology Based Malicious Intrusion Detection System in Software Defined Networking
Abstract Views :307 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
2 Department of Computer Science and Engineering, DMI College of Engineering, Chennai, Tamil Nadu, IN
1 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
2 Department of Computer Science and Engineering, DMI College of Engineering, Chennai, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 4 (2021), Pagination: 381-389Abstract
Software Defined Networking (SDN) has increased a high-level attention in recent years, mainly because of its ability to address the cyber security challenges. Machine learning architectures were developed as the SDN system to detect the security threads; however, present techniques are limited with (i) higher computation time during malicious switch detection, (ii) reduced malicious switch detection rate (MSDR). This paper presents modified deep learning architecture based SDN system consist of two stages: (i) training stage, computes the external feature maps from both trusted and malicious network switches connected to the SDN controller, (ii) testing stage, classifying the trust and malicious switches connected with SDN controller. The feature maps are trained and classified with Modified LeNET Convolutional Neural Networks (CNN) architecture. The proposed methodology is simulated via network simulator under environmental constraint conditions. The results shows that the proposed methodology reduced the malicious switch detection computational time about a half as well as it increased the MSDR to about 6% compared to the conventional methodologies.Keywords
SDN, Switch, Malicious, CNN, Feature Maps.References
- X.-F. Chen, and S.Z.Yu, “CIPA: Collaborative intrusion prevention architecture for programmable network and SDN,”Comput. Secur. Vol. 58, No.1, 2016, pp. 1-19.
- T. Das, V. Sridharan, and M. Gurusamy, “A survey on controller placement in sdn. ieee communications surveys and tutorials,” Vol. 22, No. 1, 2020, pp. 472-503.
- E. Vasilomanolakis, S. Karuppayah, M. Muhlhauser, and Mathias Fischer, “Taxonomy and survey of collaborative intrusion detection,” ACM Comput. Surv. Vol. 47, No. 4, 2015, pp. 1-10.
- C.J. Fung and R. Boutaba, “Design and management of collaborative intrusion detection networks,” IFIP/IEEE International Symposium on Integrated Network Management (IM), Vol.1, No.1, 2013, pp. 955-961.
- S. Hameed, and H.A. Khan, “SDN based collaborative scheme for mitigation of DDOS attacks,” Future Internet, Vol. 10, No. 3, 2018, pp. 281-288.
- Z. Ma, L. Liu, and W. Meng, “Towards multiple-mix-attack detection via consensus-based trust management in IOT networks,” Comput. Secur., Vol.1, N0.1, 2020, pp. 12-17.
- Y. Meng, “The practice on using machine learning for network anomaly intrusion detection,” IEEE International Conference on Machine Learning and Cybernetics, Vol.1, No.1, 2011, pp. 576-581.
- W. Meng, W. Li, Y. Xiang and K.-K.R. Choo., “A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks,” Journal of Network and Computer Applications, Vol. 78, No.3, 2017, pp. 162-169.
- R. Gupta, and S. Rajan, “Comparative analysis of convolution neural network models for continuous Indian sign language classification”, Procedia Computer Science, Vol. 171, No.2, 2020, 1542–1550.
- D. Chasaki and C. Mansour, “Detecting malicious hosts in SDN through system call learning,” IEEE Conference on Computer Communications Workshops, 2021, pp. 1-6.
- M. Amanowicz and D. Jankowski, “Detection and classification of malicious flows in software-defined networks using data mining techniques,” Sensors, Vol.21, No.1, 2021, pp.1-24.
- A. Derhab, M. Guerroumi, M. Belaoued, and O. Cheikhrouhou, “BMC-SDN: blockchain-based multi controller architecture for secure software-defined networks,” Wireless Communications and Mobile Computing, Vol. 2021, No. 9984666, 2021, pp.1-15.
- F.N. Nife, and Z. Kotulski, “Application-aware firewall mechanism for software defined networks,” J. Network Syst Manage, Vol. 28, No.1,2020, pp. 605–626.
- A. Sebbar, K. ZKIK, and Y. Baddi, “MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context,” Journal of Ambient Intell Human Comput, Vol.11, No.7, 2020, pp. 5875–5894.
- P. W. Chi, M. H. Wang, and Y. Zheng, "Sandbox Net: An online malicious SDN application detection framework for SDN networking," International Computer Symposium (ICS), Vol.1, No.1, 2020, pp. 397-402.
- C.V. Neu, C. Tatsch, R.C. Lunardi, R.A. Michelin, A.M. Orozco, and A.F. Zorzo, “Lightweight IPS for port scan in open flow SDN networks,” IEEE/IFIP Network Operations and Manag. Symposium, Taipei, Taiwan, 2018, pp. 1–6.
- Y. Chang, and T. Lin, “Cloud-clustered firewall with distributed SDN devices,” IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Vol.1, No.1, 2018, pp. 1–5, 2018.
- Improving Performance and Efficiency of Software Defined Networking by Identifying Malicious Switches through Deep Learning Model
Abstract Views :374 |
PDF Views:5
Authors
Affiliations
1 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
2 Department of Computer Science and Engineering, King Khalid University, Abha, SA
1 Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, IN
2 Department of Computer Science and Engineering, King Khalid University, Abha, SA
Source
International Journal of Computer Networks and Applications, Vol 9, No 1 (2022), Pagination: 72-83Abstract
In recent times, Software Defined Networking (SDN) has developed widely to provide capable solutions for future internet services. As with the solutions, SDN brings us a hazardous rise in malicious threats. We investigated a sort of Distributed Denial of Services (DDoS) assault known as an internet services attack, which evaluates the influence of both traffic flow and throughput depletions in order to characterize the abnormalities. This sort of attack has a significant impact on the whole SDN. This paper introduces a deep learning method to improve the performance efficiency of the SDN by classifying the network switch into either a trusted switch or a malicious switch device. In this research, an attack detection methodology for Internet services utilizing Software Defined Networking (SDN) is proposed. The SDN controller may evaluate traffic flow, detect anomalies, and restrict both incoming and outgoing traffic as well as source nodes. The SDN considers a Convolutional Neural Network (CNN) based attack detection system that can identify malicious node. Kaggle datasets are used to test and train CNN and the features such as packet duration, packet count, byte count, accuracy for identifying the flow of trusted and malicious switches. According to the results, the CNN-based attack detection system can identify the attack with an accuracy of 89 percent. The comparison evaluation with the already proposed LeNet CNN of the feature classification proves that the flow is the trusted one and with the constant throughput with the help of the deep learning model.Keywords
Software Defined Networking (SDN), Kaggle Dataset, Convolutional Neural Networks (CNN), Keras, Internet Service Attack, Malicious Switches, Malicious Node, Distributed Denial of Services.References
- Oliveira, T.F.; Xavier-de-Souza, S.; Silveira, L.F. Improving Energy Efficiency on SDN Control-Plane Using Multi-Core Controllers. Energies, 14, 3161, 2021.
- Mohsin Masood, Mohamed Mostafa Fouad, Saleh Seyedzadeh and Ivan Glesk, “Energy Efficient Software Defined Networking Algorithm for Wireless Sensor Networks”, 13th International Scientific Conference on Sustainable, Modern and Safe Transport, 2019.
- Madhukrishna Priyadarsini, Padmalochan Bera, and Mohammad Ashiqur Rahman, “A New Approach for Energy Efficiency in Software Defined Network”, Fifth International Conference on Software Defined Systems (SDS), 2018.
- Thangaraj Ethilu, Abirami Sathappan, Paul Rodrigues, "Modified Deep Learning Methodology Based Malicious Intrusion Detection System in Software Defined Networking", International Journal of Computer Networks and Applications (IJCNA), 8(4), PP: 381-389, 2021, DOI: 10.22247/ijcna/2021/209704.
- Danda B. Rawat and Swetha R. Reddy, Software Defined Networking Architecture, Security and Energy Efficiency: A Survey,IEEE communication surveys and tutorials,2019.
- W. Meng, W. Li, Y. Xiang and K.-K.R. Choo. A Bayesian Inferencebased Detection Mechanism to Defend Medical Smartphone Networks Against Insider Attacks. Journal of Network and Computer Applications, vol. 78, pp. 162-169, Elsevier, 2017.
- Rinki Gupta, Sreeraman Rajan, “Comparative Analysis of Convolution Neural Network Models for Continuous Indian Sign Language Classification”, Procedia Computer Science 171 (2020) 1542–1550.
- P. -W. Chi, M. -H. Wang and Y. Zheng, "SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking," 2020 International Computer Symposium (ICS), 2020, pp. 397-402.
- Sebbar, A., ZKIK, K., Baddi, Y. MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J Ambient Intell Human Comput 11, 5875–5894 (2020).
- Nife, F.N., Kotulski, Z. Application-Aware Firewall Mechanism for Software Defined Networks. J Netw Syst Manage 28, 605–626 (2020).
- Neu C. V., Tatsch C. G., Lunardi R. C., Michelin R. A., Orozco A. M. S.,and Zorzo A. F.: Lightweight IPS for port scan in OpenFlow SDN networks. In NOMS 2018 IEEE/IFIP Network Operations and Manag. Symposium, Taipei, Taiwan, pp. 1–6, (2018).
- H. Naeem, B. Guo, and M. R. Naeem, ‘‘A light-weight malware static visual analysis for IoT infrastructure,’’ in Proc. Int. Conf. Artif. Intell. Big Data (ICAIBD), May 2018, pp. 240–244.
- H. Zhang, X. Xiao, F. Mercaldo, S. Ni, F. Martinelli, and A. K. Sangaiah, ‘‘Classification of ransomware families with machine learning based on N-Gram of opcodes,’’ Future Gener. Comput. Syst., vol. 90, pp. 211–221, Jan. 2019.
- A. Khalilian, A. Nourazar, M. Vahidi-Asl, and H. Haghighi, ‘‘G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families,’’ Expert Syst. Appl., vol. 112, pp. 15–33, Dec. 2018.
- Y.-S. Liu, Y.-K. Lai, Z.-H. Wang, and H.-B. Yan, ‘‘A new learning approach to malware classification using discriminative feature extraction,’’ IEEE Access, vol. 7, pp. 13015–13023, 2019.
- Chang Y., and Lin T.: Cloud-clustered firewall with distributed SDN devices. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1–5. (2018).
- J. Yan, Y. Qi, and Q. Rao, ‘‘Detecting malware with an ensemble method based on deep neural network,’’ Secur. Commun. Netw., vol. 2018, pp. 1–16, Mar. 2018.
- D. Gibert, C. Mateu, J. Planes, and R. Vicens, ‘‘Classification of malware by using structural entropy on convolutional neural networks,’’ in Proc. 32nd AAAI Conf. Artif. Intell., (AAAI), 30th Innov. Appl. Artif. Intell. (IAAI), 8th AAAI Symp. Educ. Adv. Artif. Intell. (EAAI), New Orleans, LA, USA, 2018, pp. 7759–7764.
- Z. Ma, L. Liu, W. Meng. Towards Multiple-Mix-Attack Detection via Consensus-based Trust Management in IoT Networks. Computers & Security, In press (2020).
- Y. Meng. The practice on using machine learning for network anomaly intrusion detection. The 2011 International Conference on Machine Learning and Cybernetics (ICMLC 2011), IEEE, pp. 576-581, 2011.
- Andrzej Kamisiński, Carol Fung,” FlowMon: Detecting Malicious Switches in Software-Defined Networks”, ACM CCS workshop on Automated Decision Making for Active Cyber Defense ,2015.
- Lis, A.; Sudolska, A.; Pietryka, I.; Kozakiewicz, A. Cloud Computing and Energy Efficiency: Mapping the Thematic Structure of Research. Energies 2020, 13, 4117.
- Aujla, G.S.; Kumar, N.; Zomaya, A.Y.; Ranjan, R. Optimal Decision Making for Big Data Processing at Edge-Cloud Environment: An SDN Perspective. IEEE Trans. Ind. Inform. 2018, 14, 778–789.
- Xu, G.; Dai, B.; Huang, B.; Yang, J.; Wen, S. Bandwidth-aware energy efficient flow scheduling with SDN in data center networks. Future Gener. Comput. Syst. 2017, 68, 163–174.
- Fernández-Fernández, A.; Cervelló-Pastor, C.; Ochoa-Aday, L. Energy Efficiency and Network Performance: A Reality Check in SDN-Based 5G Systems. Energies 2017.
- Son, J.; Dastjerdi, A.V.; Calheiros, R.N.; Buyya, R. SLA-Aware and Energy-Efficient Dynamic Overbooking in SDN-Based Cloud Data Centers. IEEE Trans. Sustain. Comput. 2017, 2, 76–89.