Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Engineering

Network Anomaly Detection Using Management Information Base (Mib) Network Traffic Variables, Jun Li Aug 2004

Network Anomaly Detection Using Management Information Base (Mib) Network Traffic Variables, Jun Li

Dissertations

In this dissertation, a hierarchical, multi-tier, multiple-observation-window, network anomaly detection system (NADS) is introduced, namely, the MIB Anomaly Detection (MAD) system, which is capable of detecting and diagnosing network anomalies (including network faults and Denial of Service computer network attacks) proactively and adaptively. The MAD system utilizes statistical models and neural network classifier to detect network anomalies through monitoring the subtle changes of network traffic patterns. The process of measuring network traffic pattern is achieved by monitoring the Management Information Base (Mifi) II variables, supplied by the Simple Network Management Protocol (SNMP) LI. The MAD system then converted each monitored …


Performance Evaluation Of Communication Systems With Transmit Diversity, Chunjun Gao May 2004

Performance Evaluation Of Communication Systems With Transmit Diversity, Chunjun Gao

Dissertations

Transmit diversity is a key technique to combat fading with multiple transmit antennae for next-generation wireless communication systems. Space-time block code (STBC) is a main component of this technique. This dissertation consists of four parts: the first three discuss performance evaluation of STBCs in various circumstances, the fourth outlines a novel differential scheme with full transmit diversity.

In the first part, closed-form expressions for the bit error rate (BER) are derived for STBC based on Alamouti's scheme and utilizing M-ary phase shift keying (MPSK) modulation. The analysis is carried out for a slow, flat Rayleigh fading channel with coherent detection …


Multi-Rate Access Schemes And Successive Interference Cancellation For Wireless Multimedia Mc-Cdma Communications, Mizhou Tan May 2004

Multi-Rate Access Schemes And Successive Interference Cancellation For Wireless Multimedia Mc-Cdma Communications, Mizhou Tan

Dissertations

To catch up with the fast changes of the information challenges, providing multimedia services has become a very important requirement for future wireless communications. A proper system, capable of supporting multi-rate transmissions as well as handling high quality of service (QoS) requirements in hostile wireless communication environments, should be sought. Multi-carrier CDMA (MC-CDMA), a combination of multi-carrier modulation (MCM) and direct-sequence CDMA (DS-CDMA), appears to be one of the most elegant solutions. In this dissertation, four multi-rate access schemes, termed uncoded fixed spreading length (UFSL), coded fixed spreading length (CFSL), multi-code fixed spreading length (MFSL) and variable spreading length (VSL), …


Providing Guaranteed Qos In The Hose-Modeled Vpn, Dong Wei May 2004

Providing Guaranteed Qos In The Hose-Modeled Vpn, Dong Wei

Dissertations

With the development of the Internet, Internet service providers (ISPs) are required to offer revenue-generating and value-added services instead of only providing bandwidth and access services. Virtual Private Network (VPN) is one of the most important value-added services for ISPs.

The "classical" VPN service is provided by implementing layer 2 technologies, either Frame Relay (FR) or Asynchronous Transfer Mode (ATM). With FR or ATM, virtual circuits are created before data delivery. Since the bandwidth and buffers are reserved, the QoS requirements can be naturally guaranteed. In the past few years, layer 3 VPN technologies are widely deployed due to the …


Phase Noise Effects On Ofdm : Analysis And Mitigation, Songping Wu May 2004

Phase Noise Effects On Ofdm : Analysis And Mitigation, Songping Wu

Dissertations

Orthogonal frequency division multiplexing (OFDM) is a promising technique which has high spectrum efficiency and the robustness against channel frequency selectivity. One drawback of OFDM is its sensitivity to phase noise. It has been shown that even small phase noise leads to significant performance loss of OFDM. Therefore, phase noise effects on OFDM systems need to be analyzed and methods be provided to its mitigation.

Motivated by what have been proposed in the literature, the exact signal to interference plus noise ratio (SINR) is derived in this dissertation for arbitrary phase noise levels. In a multiple access environment with multiple …


Enhancing Qos Provisioning And Granularity In Next Generation Internet, Jie Yang May 2004

Enhancing Qos Provisioning And Granularity In Next Generation Internet, Jie Yang

Dissertations

Next Generation IP technology has the potential to prevail, both in the access and in the core networks, as we are moving towards a multi-service, multimedia and high-speed networking environment. Many new applications, including the multimedia applications, have been developed and deployed, and demand Quality of Service (QoS) support from the Internet, in addition to the current best effort service. Therefore, QoS provisioning techniques in the Internet to guarantee some specific QoS parameters are more a requirement than a desire. Due to the large amount of data flows and bandwidth demand, as well as the various QoS requirements, scalability and …


Statistical Anomaly Denial Of Service And Reconnaissance Intrusion Detection, Zheng Zhang May 2004

Statistical Anomaly Denial Of Service And Reconnaissance Intrusion Detection, Zheng Zhang

Dissertations

This dissertation presents the architecture, methods and results of the Hierarchical Intrusion Detection Engine (HIDE) and the Reconnaissance Intrusion Detection System (RIDS); the former is denial-of-service (DoS) attack detector while the latter is a scan and probe (P&S) reconnaissance detector; both are statistical anomaly systems.

The HIDE is a packet-oriented, observation-window using, hierarchical, multi-tier, anomaly based network intrusion detection system, which monitors several network traffic parameters simultaneously, constructs a 64-bin probability density function (PDF) for each, statistically compares it to a reference PDF of normal behavior using a similarity metric, then combines the results into an anomaly status vector that …


Ad Hoc Network Security And Modeling With Stochastic Petri Nets, Congzhe Zhang May 2004

Ad Hoc Network Security And Modeling With Stochastic Petri Nets, Congzhe Zhang

Dissertations

Advances in wireless technology and portable computing along with demands for high user mobility have provided a major promotion toward the development of ad hoc networks. These networks feature dynamic topology, self-organization, limited bandwidth and battery power of a node. Unlike the existing commercial wireless systems and fixed infrastructure networks, they do not rely on specialized routers for path discovery and traffic routing. Security is an important issue in such networks. Typically, mobile nodes are significantly more susceptible to physical attacks than their wired counterparts.

This research intends to investigate the ad hoc network routing security by proposing a performance …


Qos Provisioning In Multimedia Streaming, Hong Zhao May 2004

Qos Provisioning In Multimedia Streaming, Hong Zhao

Dissertations

Multimedia consists of voice, video, and data. Sample applications include video conferencing, video on demand, distance learning, distributed games, and movies on demand. Providing Quality of Service (QoS) for multimedia streaming has been a difficult and challenging problem. When multimedia traffic is transported over a network, video traffic, though usually compressed/encoded for bandwidth reduction, still consumes most of the bandwidth. In addition, compressed video streams typically exhibit highly variable bit rates as well as long range dependence properties, thus exacerbating the challenge in meeting the stringent QoS requirements of multimedia streaming with high network utilization. Dynamic bandwidth allocation in which …


Ultra-Wideband Technology For Short-Range Wireless Communication, Li Zhao May 2004

Ultra-Wideband Technology For Short-Range Wireless Communication, Li Zhao

Dissertations

The ultra-wideband (UWB) radio core idea is to open large amounts of spectrum to a variety of users with little mutual interference between them. While ultra-wideband is being championed by several commercial companies, this technology has not followed the conventional path where commercial interest is preceded by years of academic research. This work attempts to fill in some of the gap by studying fundamental properties of communications with impulse-based radio UWB signals. We study jam resistance and capacity of UWB. Jam resistance is analyzed for binary pulse position modulation (PPM) with the interference being modeled as correlated Gaussian. Closed-form expressions …


Transmission And Detection For Space-Time Block Coding And V-Blast Systems, Lei He May 2004

Transmission And Detection For Space-Time Block Coding And V-Blast Systems, Lei He

Dissertations

This dissertation focuses on topics of data transmission and detection of space -time block codes (STBC). The STBCs can be divided into two main categories, namely, the orthogonal space-time block codes (OSTBC) and the quasi-orthogonal space-time codes (Q-OSTBC). The space-time block coded systems from transceiver design perspective for both narrow-band and frequency selective wireless environment are studied. The dissertation also processes and studies a fast iterative detection scheme for a high-rate space-time transmission system, the V-BLAST system.

In Chapter 2, a new OSTBC scheme with full-rate and full-diversity, which can be used on QPSK transceiver systems with four transmit antennas …


Hybrid Routing And Bridging Strategies For Large Scale Mobile Ad Hoc Networks, Sheng Xu May 2004

Hybrid Routing And Bridging Strategies For Large Scale Mobile Ad Hoc Networks, Sheng Xu

Dissertations

Multi-hop packet radio networks (or mobile ad-hoc networks) are an ideal technology to establish "instant" communication infrastructure for military and civilian applications in which both hosts and routers are mobile. In this dissertation, a position-based/link-state hybrid, proactive routing protocol (Position-guided Sliding-window Routing - PSR) that provides for a flat, mobile ad-hoc routing architecture is described, analyzed and evaluated. PSR is based on the superposition of link-state and position-based routing, and it employs a simplified way of localizing routing overhead, without having to resort to complex, multiple-tier routing organization schemes. A set of geographic routing zones is defined for each node, …


Adaptive Learning For Event Modeling And Pattern Classification, Shuangshuang Dai Jan 2004

Adaptive Learning For Event Modeling And Pattern Classification, Shuangshuang Dai

Dissertations

It is crucial to detect, characterize and model events of interest in a new propulsion system. As technology advances, the amount of data being generated increases significantly with respect to time. This increase substantially strains our ability to interpret the data at an equivalent rate. It demands efficient methodologies and algorithms in the development of automated event modeling and pattern recognition to detect and characterize events of interest and correlate them to the system performance. The fact that the information required to properly evaluate system performance and health is seldom known in advance further exacerbates this issue.

Event modeling and …


Oblivious Data Hiding : A Practical Approach, Husrev T. Sencar Jan 2004

Oblivious Data Hiding : A Practical Approach, Husrev T. Sencar

Dissertations

This dissertation presents an in-depth study of oblivious data hiding with the emphasis on quantization based schemes. Three main issues are specifically addressed:

1. Theoretical and practical aspects of embedder-detector design.

2. Performance evaluation, and analysis of performance vs. complexity tradeoffs.

3. Some application specific implementations.

A communications framework based on channel adaptive encoding and channel independent decoding is proposed and interpreted in terms of oblivious data hiding problem. The duality between the suggested encoding-decoding scheme and practical embedding-detection schemes are examined. With this perspective, a formal treatment of the "processing" employed in quantization based hiding methods is presented. In …


Multi-Spectral Light Interaction Modeling And Imaging Of Skin Lesions, Sachin Vidyanand Patwardhan Jan 2004

Multi-Spectral Light Interaction Modeling And Imaging Of Skin Lesions, Sachin Vidyanand Patwardhan

Dissertations

Nevoscope as a diagnostic tool for melanoma was evaluated using a white light source with promising results. Information about the lesion depth and its structure will further improve the sensitivity and specificity of melanoma diagnosis. Wavelength-dependent variable penetration power of monochromatic light in the trans-illumination imaging using the Nevoscope can be used to obtain this information. Optimal selection of wavelengths for multi-spectral imaging requires light-tissue interaction modeling. For this, three-dimensional wavelength dependent voxel-based models of skin lesions with different depths are proposed. A Monte Carlo simulation algorithm (MCSVL) is developed in MATLAB and the tissue models are simulated using the …


Ip-Based Virtual Private Networks And Proportional Quality Of Service Differentiation, Jingdi Zeng Jan 2004

Ip-Based Virtual Private Networks And Proportional Quality Of Service Differentiation, Jingdi Zeng

Dissertations

IP-based virtual private networks (VPNs) have the potential of delivering cost-effective, secure, and private network-like services. Having surveyed current enabling techniques, an overall picture of IP VPN implementations is presented.

In order to provision the equivalent quality of service (QoS) of legacy connection-oriented layer 2 VPNs (e.g., Frame Relay and ATM), IP VPNs have to overcome the intrinsically best effort characteristics of the Internet. Subsequently, a hierarchical QoS guarantee framework for IP VPNs is proposed, stitching together development progresses from recent research and engineering work.

To differentiate IP VPN QoS, the proportional QoS differentiation model, whose QoS specification granularity compromises …