Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr Aug 2002

Protection And Restoration Algorithms For Wdm Optical Networks, Pitipatana Sakarindr

Theses

Currently, Wavelength Division Multiplexing (WDM) optical networks play a major role in supporting the outbreak in demand for high bandwidth networks driven by the Internet. It can be a catastrophe to millions of users if a single optical fiber is somehow cut off from the network, and there is no protection in the design of the logical topology for a restorative mechanism. Many protection and restoration algorithms are needed to prevent, reroute, and/or reconfigure the network from damages in such a situation. In the past few years, many works dealing with these issues have been reported. Those algorithms can be …


Attack Visualization For Intrusion Detection System, Mohammad A. Rabie Jan 2002

Attack Visualization For Intrusion Detection System, Mohammad A. Rabie

Theses

Attacks detection and visualization is the process of attempting to identify instances of network misuse by comparing current activity against the expected actions of an intruder. Most current approaches to attack detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks, which vary from expected patterns. Artificial neural networks provide the potential to identify and classify network activity based on limited, incomplete, and nonlinear data sources. Presenting an approach to the process of Attack visualization that utilizes the analytical strengths of neural networks, and providing the results …


Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj Jan 2002

Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj

Theses

In today's fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This paper will examine various intrusion detection systems. The task of intrusion detection is to monitor usage of a system and detect and malicious activity, therefore, the architecture is a key component when studying intrusion detection systems. This thesis will also analyze various neural networks for statistical anomaly intrusion detection systems. The thesis will focus on the Hierarchical Intrusion Detection system (HIDE) architecture. The HIDE system detects network based attack as anomalies …


Adaptive Radio Resource Management For 2.5g Cellular Networks, Ken Murray Jan 2002

Adaptive Radio Resource Management For 2.5g Cellular Networks, Ken Murray

Theses

Recent years have seen a dramatic increase in demand for mobile communication services and with the introduction of 2.5G services such as general packet radio service, this trend is expected to increase further. These new services will introduce highly dynamic tele-traffic variations due to the inherent variability in resource usage of the new data services. The net effect will be considerable increase in load on the available radio resources. The currently employed fixed channel allocation scheme lacks the flexibility to support such traffic variations. A plethora of dynamic channel allocation schemes have been proposed in the past in an effort …