Loading...
Search for: jahangir--a--h
0.011 seconds
Total 51 records

    Benford's law behavior of internet traffic

    , Article Journal of Network and Computer Applications ; Vol. 40, issue. 1 , April , 2014 , p. 194-205 Arshadi, L ; Jahangir, A. H ; Sharif University of Technology
    Abstract
    In this paper, we analyze the Internet traffic from a different point of view based on Benford's law, an empirical law that describes the distribution of leading digits in a collection of numbers met in naturally occurring phenomena. We claim that Benford's law holds for the inter-arrival times of TCP flows in case of normal traffic. Consequently, any type of anomalies affecting TCP flows, including intentional intrusions or unintended faults and network failures in general, can be detected by investigating the first-digit distributions of the inter-arrival times of TCP SYN packets. In this paper we apply our findings to the detection of intentional attacks, and leave other types of... 

    Verification of OSPF vulnerabilities by colored petri net

    , Article SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks ; November , 2013 , Pages 102-109 ; 9781450324984 (ISBN) Niari, S. T ; Jahangir, A. H ; Sharif University of Technology
    2013
    Abstract
    Routers and routing protocols are critical parts of a network infrastructure. OSPF is one of the most important routing protocols, and therefore its vulnerabilities can be very destructive. This makes its security analysis critical. There are many reported and potential vulnerabilities in OSPF protocol. Considering the complexity and the ambiguity of its description in RFC 2328, it is very valuable to design a formal model of the protocol and analyze the vulnerabilities of its critical parts. In this paper, some challenging parts of OSPF protocol along with attack scenarios are modeled by means of Colored Petri Net in CPN Tools environment. Then, the reported vulnerabilities are analyzed by... 

    On the gaussian characteristics of aggregated short-lived flows on high-bandwidth links

    , Article Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops ; 2013 , Pages 860-865 ; 9780769549521 (ISBN) Kahe, G ; Jahangir, A. H ; Sharif University of Technology
    2013
    Abstract
    Traffic modeling, traffic decomposition, and traffic engineering are some of the applications of traffic characterization that are mainly based on statistical characteristics of the network traffic. Many empirical analyses on Internet traffic traces show that the flow inter-arrival time distribution generally follows the Weibull distribution. As the scale of the network becomes larger, the Weibull distribution degrades to the Poisson distribution and when the flow arrival rate is high, it asymptotically converges to the Normal distribution. The aggregated traffic on high bandwidth links is the result of statistical multiplexing of many traffic sources, and the flow arrival rate on these... 

    Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks

    , Article Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011, 5 December 2011 through 8 December 2011, Malacca ; 2011 , Pages 308-313 ; 9781457721533 (ISBN) Amin, F ; Jahangir, A. H ; Sharif University of Technology
    Abstract
    Wireless Sensor Networks are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. In this paper, we study and model the time and energy cost of Kerberos protocol by using timed automata in WSN. We model check the protocol using UPPAAL. We show that considering time in the analysis of security protocols yield more confident results  

    An empirical study on TCP flow interarrival time distribution for normal and anomalous traffic

    , Article International Journal of Communication Systems ; 2015 ; 10745351 (ISSN) Arshadi, L ; Jahangir, A. H ; Sharif University of Technology
    Abstract
    SUMMARY: In this paper, we study the effects of anomalies on the distribution of TCP flow interarrival time process. We show empirically that despite the variety of data networks in size, number of users, applications, and load, the interarrival times of normal flows comply with the Weibull distribution, whereas specific irregularities (anomalies) causes deviations from the distribution. We first estimate the scale and shape parameters and then check the discrepancy of the data from a Weibull distribution with the estimated parameters. We also utilize the Weibull counting model to recheck the conformance of small flow interarrival times with the distribution. We perform our experiments on a... 

    A polynomial algorithm for partitioning problems

    , Article Transactions on Embedded Computing Systems ; Volume 9, Issue 4 , 2010 ; 15399087 (ISSN) Tahaee, S. A ; Jahangir, A. H ; Sharif University of Technology
    2010
    Abstract
    This article takes a theoretical approach to focus on the algorithmic properties of hardware/software partitioning. It proposes a method with polynomial complexity to find the global optimum of an NP-hard model partitioning problem for 75% of occurrences under some practical conditions. The global optimum is approached with a lower bound distance for the remaining 25%. Furthermore, this approach ensures finding the 2-approximate of the global optimum partition in 97% of instances where technical assumptions exist. The strategy is based on intelligently changing the parameters of the polynomial model of the partitioning problem to force it to produce (or approach) the exact solution to the... 

    An empirical study on TCP flow interarrival time distribution for normal and anomalous traffic

    , Article International Journal of Communication Systems ; Volume 30, Issue 1 , 2017 ; 10745351 (ISSN) Arshadi, L ; Jahangir, A. H ; Sharif University of Technology
    John Wiley and Sons Ltd  2017
    Abstract
    In this paper, we study the effects of anomalies on the distribution of TCP flow interarrival time process. We show empirically that despite the variety of data networks in size, number of users, applications, and load, the interarrival times of normal flows comply with the Weibull distribution, whereas specific irregularities (anomalies) causes deviations from the distribution. We first estimate the scale and shape parameters and then check the discrepancy of the data from a Weibull distribution with the estimated parameters. We also utilize the Weibull counting model to recheck the conformance of small flow interarrival times with the distribution. We perform our experiments on a diverse... 

    Improving hardware Trojan detection using scan chain based ring oscillators

    , Article Microprocessors and Microsystems ; Volume 63 , 2018 , Pages 55-65 ; 01419331 (ISSN) Asadi Kouhanjani, M. R ; Jahangir, A. H ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    In recent years, the security of integrated circuits (ICs) has received more attention as usage of ICs made by untrustworthy foundries has increased in safety-critical systems [1]. In this paper, we introduce a novel approach for fingerprinting the delay of functional paths in a sequential circuit that have millions of transistors, like processors. We present a method for inserting Ring Oscillators (ROs) into scan chain for measuring the delay of each functional path inside the chip. Using the proposed method, the payload part of Trojans will be detected according to their size and cell types. Our method can be used by power-based Trojan detection approaches for finding the trigger part of... 

    A biometric security scheme for wireless body area networks

    , Article Journal of Information Security and Applications ; Volume 41 , 2018 , Pages 62-74 ; 22142134 (ISSN) Dodangeh, P ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2018
    Abstract
    Wireless body area networks (WBANs) are receiving significant interest as the next generation of wireless networks and emerging technology in the field of health monitoring. One of the most important factors for the acceptance of WBANs is the provision of appropriate security and access control mechanisms. Due to its nature in transferring the patients' sensitive data, WBAN has both classical and specific security requirements. In this paper, we survey such requirements and propose a new security scheme for satisfying them in WBANs. The proposed scheme deals with the overall network architecture, including intra- and inter-WBAN tiers, and proposes two mutual authentication and key exchange... 

    A self-tuning controller for queuing delay regulation in TCP/AQM networks

    , Article Telecommunication Systems ; 2018 ; 10184864 (ISSN) Kahe, G ; Jahangir, A. H ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    AQM router aims primarily to control the network congestion through marking/dropping packets which are used as congestion feedback in traffic sources to balance their flow rate. However, stabilizing queuing delay and maximizing link utilization have been considered as the main control objectives, especially in media dominated networks. Usually, most of the AQM algorithms are designed for a nominal operating point. However, time-varying nature of network parameters frequently violates their robustness bounds. In this paper, a self-tuning compensated PID controller is proposed to address the time-varying nature of network conditions caused by parameter variations and unresponsive connections.... 

    An effective payload attribution scheme for cybercriminal detection using compressed bitmap index tables and traffic downsampling

    , Article IEEE Transactions on Information Forensics and Security ; Volume 13, Issue 4 , 2018 , Pages 850-860 ; 15566013 (ISSN) Hosseini, M ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Payload attribution systems (PAS) are one of the most important tools of network forensics for detecting an offender after the occurrence of a cybercrime. A PAS stores the network traffic history in order to detect the source and destination pair of a certain data stream in case a malicious activity occurs on the network. The huge volume of information that is daily transferred in the network means that the data stored by a PAS must be as compact and concise as possible. Moreover, the investigation of this large volume of data for a malicious data stream must be handled within a reasonable time. For this purpose, several techniques based on storing a digest of traffic using Bloom filters... 

    A self-tuning controller for queuing delay regulation in TCP/AQM networks

    , Article Telecommunication Systems ; Volume 71, Issue 2 , 2019 , Pages 215-229 ; 10184864 (ISSN) Kahe, G ; Jahangir, A. H ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    AQM router aims primarily to control the network congestion through marking/dropping packets which are used as congestion feedback in traffic sources to balance their flow rate. However, stabilizing queuing delay and maximizing link utilization have been considered as the main control objectives, especially in media dominated networks. Usually, most of the AQM algorithms are designed for a nominal operating point. However, time-varying nature of network parameters frequently violates their robustness bounds. In this paper, a self-tuning compensated PID controller is proposed to address the time-varying nature of network conditions caused by parameter variations and unresponsive connections.... 

    A Generic error-free AI-based encoding for FFT computation

    , Article Circuits, Systems, and Signal Processing ; Volume 38, Issue 2 , 2019 , Pages 699-715 ; 0278081X (ISSN) Moradi, M ; Jahangir, A. H ; Sharif University of Technology
    Birkhauser Boston  2019
    Abstract
    This paper studies the challenge of accurate FFT computation. A generic and error-free encoding is proposed based on the algebraic integers (AIs). A wise AI-based encoding may greatly decrease the error due to the non-trivial twiddle factors in the FFT computation. Further, a new method for predicting the well-pruned architecture is presented which helps designing an optimized and low-cost architecture when using the AI-based encoding. In order to examine the proposed AI-based FFT computation and also the procedure of designing an optimized architecture, a custom AI-based 16-point radix-2 2 FFT architecture has been designed and implemented using 180-nm CMOS technology. Experimental results... 

    A quantitative real-time model for multihop wireless sensor networks

    , Article 2007 3th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP, Melbourne, VIC, 3 December 2007 through 6 December 2007 ; 2007 , Pages 79-84 ; 1424415020 (ISBN); 9781424415021 (ISBN) Mizanian, K ; Jahangir, A. H ; Sharif University of Technology
    2007
    Abstract
    Wireless Sensor Network (WSN) should be capable of fulfilling its mission, in a timely manner. Therefore, we propose a quantitative real-time model for multihop WSN. "Real-time degree" describes the percentage of real-time data that the network can deliver on time from any source to its destination. Most of network properties are considered as random variables and a queuing-theory based model is derived. In this model, the effect of network load on the packets ' delay and the "real-timeliness" of the network are considered. Simulation results are used to validate the proposed model. The simulation results agree very well with the model. © 2007 IEEE  

    Voice quality measurement in a typical router-based network

    , Article 32nd IEEE Conference on Local Computer Networks, LCN 2007, Dublin, 15 October 2007 through 18 October 2007 ; 2007 , Pages 274-275 ; 0769530001 (ISBN); 9780769530000 (ISBN) Azarfar, A ; Jahangir, A. H ; Sharif University of Technology
    2007
    Abstract
    In this paper, we introduce novel mechanisms for measuring and evaluating the performance of a network and its devices, configured especially for Voice over IP (VoIP). We study the effects of different configurations on final voice quality by enabling or changing the related equipment features. In our study we quantify quality changes based on different router configurations and discuss precisely to what extent and how much this quality is improved versus features or special configurations of network devices. These results can be used for two purposes: compare and benchmark different routers in order to know which one is proper for a typical VoIP network, and select the best configurations.... 

    Two-phase prediction of L1 data cache misses

    , Article IEE Proceedings: Computers and Digital Techniques ; Volume 153, Issue 6 , 2006 , Pages 381-388 ; 13502387 (ISSN) Mahjur, A ; Jahangir, A. H ; Sharif University of Technology
    2006
    Abstract
    Hardware prefetching schemes which divide the misses into streams are generally preferred to other hardware based schemes. But, as they do not know when the next miss of a stream happens, they cannot prefetch a block in appropriate time. Some of them use a substantial amount of hardware storage to keep the predicted miss blocks from all streams. The other approaches follow the program flow and prefetch all target addresses including those blocks which already exist in the L1 data cache. The approach presented predicts the stream of next miss and then prefetches only the next miss address of the stream. It offers a general prefetching framework, two-phase prediction algorithm (TPP), that lets... 

    A new delay attack detection algorithm for PTP network in power substation

    , Article International Journal of Electrical Power and Energy Systems ; Volume 133 , 2021 ; 01420615 (ISSN) Moradi, M ; Jahangir, A. H ; Sharif University of Technology
    Elsevier Ltd  2021
    Abstract
    Time synchronization is one of the main issues for guaranteeing the correctness of actions depending on the time of measured data or detected events by electronic devices across industrial networks. According to the accuracy needed in different applications and networks, several synchronization protocols or algorithms have been proposed so far. The Precision Time Protocol, PTP, is one of the most accurate synchronization protocols introduced for automation applications. It has also been used in power grids and digital substations. However, due to the variety of cyber-attacks in electrical power systems in recent years, its security should be considered and evaluated as other substation... 

    R2T-DSDN: reliable real-time distributed controller-based SDN

    , Article Journal of Supercomputing ; Volume 77, Issue 11 , 2021 , Pages 12420-12457 ; 09208542 (ISSN) Sedaghat, S ; Jahangir, A. H ; Sharif University of Technology
    Springer  2021
    Abstract
    Software-defined network (SDN) is an emerging network architecture in which the network control task is separated from packet forwarding. This architecture can be considered as a suitable infrastructure for fifth-generation mobile network (5G) and Internet of things due to its flexibility and dynamism. In real-time networks, time-sensitive packets that miss their deadlines are considered useless or less worthy. As with traditional networks, SDN is expected to support real-time communications and handle a variety of failures (including local controller, switch, and link failures) simultaneously. This study focuses on real-time communication of time-sensitive applications that operate on... 

    RT-TelSurg: Real time telesurgery using SDN, Fog, and cloud as infrastructures

    , Article IEEE Access ; Volume 9 , 2021 , Pages 52238-52251 ; 21693536 (ISSN) Sedaghat, S ; Jahangir, A. H ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    This paper proposes a novel and efficient real time network architecture, named RT-TelSurg, for one of the most appealing tactile Internet applications, i.e., Telesurgery. In telesurgery, the patient's vital signs and status and the required robotic commands during the surgery should be received on time. Otherwise, the life of the patient or the safety of the operation is endangered. Hence, transmitted packets should meet their respective relative deadlines. Software-defined networking is a relatively new architecture for computer and telecommunications networks in which the network control plane is separated from the data plane. One way to achieve real time telesurgery is to employ cloud... 

    FRT-SDN: an effective firm real time routing for SDN by early removal of late packets

    , Article Telecommunication Systems ; Volume 80, Issue 3 , 2022 , Pages 359-382 ; 10184864 (ISSN) Sedaghat, S ; Jahangir, A. H ; Sharif University of Technology
    Springer  2022
    Abstract
    On-time delivery of network flows is crucial to ensure the quality of service of deadline-constrained applications. Today, real time applications have various uses in multimedia communications, the Internet of Things (IoT), and 5G (5th generation mobile network) technology. In Software Defined Network (SDN) architecture, the controller has a global view of the network. Hence, it is possible to enrich the features of the controller and/or forwarding devices to support real time communication. In this paper, we propose a firm real time software-defined approach (FRT-SDN) for real time communication and present a novel solution for the real time forwarding/routing of time-sensitive applications...