Loading...
Search for:
jahangir--amir-hossin
0.191 seconds
Total 1202 records
Network Traffic Generator with Scenario Attack Capabilities
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossin (Supervisor)
Abstract
Generating real traffic and attacks for network equipment and applications are not yet considered a clear straight forward subject. To overcome this issue, we produce real traffic and then add some vulnerability attacks to it. This is an important step towards achieving security tests or evaluation methods which let us examine or assess intrusion detection (IDSs) features of a system.In this dissertation, we generate legitimate and anomalous traffic beside some attacks. Our study yields an implementation which is tested in real environment. We introduce a substantial method to generate DDoS attack in network and transport layers. We develop a software tool for this purpose. The performance...
Analysis and Evaluation of Routing Protocols Conformance Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, one of the problems of network designers and users is the correctness of network equipment functionality. Since routers play an important role in information transfer between various networks and communicate with each other through a routing protocol, any violation of such protocol can result in the network's failure or defective transfer of data. Thus, being assured of the conformance of the implemented protocol in a router with what has been defined in the protocol's standard is of great significance. To this end, before using or exposing a router, network equipment testers should run protocol conformance tests on it and insure its correct functionality. This brings up the...
Network Traffic Analyzer
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In order to increase the network performance, to discover network security threats, to guarantee the quality of services, to simulate networks and develop new network protocols, network designers and operators need software tools to analyze the network traffic. The first step to do this analysis is network monitoring. This can be done by using various software and hardware tools.
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
In this research we developed a tool which analyzes the network traffic using appropriate statistical methods. The models which are analyzed in this application are: Poisson, Self-similar and Weibull. This application analyzes the network traffic based on this statistical models and calculates their parameters....
Analysis and Evaluation of Real Timeliness and Safety of VANET
,
M.Sc. Thesis
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
The increasing number of road accidents and fatalities have yielded the introduction of several solutions by related industries such as automobile manufacture. Proposed solutions can be classified into two categories: passive, such as airbags, and active such as ABS ad ITS-based technologies. Inter vehicles communication let the communication between vehicles(V2V) or between vehicles and road infrastructure (V2I) by relying on DSRC technology and standards. Intelligent Transportation System (ITS) has three main types of applications namely safety, traffic and commercial. Safety applications are the main goal of vehicular communication, and real time guarantee in safety applications is so...
An Efficient Approach for Improving the Performance of Real-time Flow Routing in SDN Controllers
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In real-time systems, jobs that miss their deadline are considered worthless or ineffective. Nowadays, real-time applications (such as multimedia) that communicate through software-defined networks (SDN) are widely used and will continue to expand in the future. SDN is an emerging network architecture in which control plane is separated from data plane to manage it directly. In this research, we make changes to the controller and the switch used in such network to deliver real time packets or real-time flows (such as video) on time, as much as possible. As missed deadline packets are worthless and they waste bandwidth, dropping them is a solution. Moreover, the controller can drop flows that...
Formability Study of Tailored Blanks with Different Thickness Ratios Welded by Friction Stir Welding
, M.Sc. Thesis Sharif University of Technology ; Kokabi, Amir Hossin (Supervisor) ; Akbarzadeh, Abbas (Supervisor)
Abstract
These days the usage of welded tailor blanks with sufficient stability and flexibility is accelerating rapidly in order to production of slighter parts and reduction of fuel consumption in transportation means. Therefore, the conjuncture of blanks by welding methods is highly considerable before forming and ultimate production. Friction Stir Welding is greatly appealing to industry as one of the newest methods of solid state welding in production of TWB blanks. In this research, the feasibility study of Friction Stir Welding of thin Al 1100 – H18 alloy blanks with 1.5, 2 and 2.5mm thickness has been evaluated first. After creation of sound welds with same thicknesses, Friction Stir Welding...
Microstructure and Wear Properties of WC/CuZnNi Compsite Surface Coating
, M.Sc. Thesis Sharif University of Technology ; Kokabi, Amir Hossein (Supervisor) ; Aashuri, Hossin (Supervisor)
Abstract
The microstructure and wear performance of WC/Cu-Zn-Ni composite surface coating has been investigated using a combination of microscopy, hardness, and wear testing. The oxidation behavior of tungsten carbide hard metal in the temperature range between 600 and 900 ◦C was also researched. The oxidation mass gain of WC correlated almost directly with temperature as well as time. The particle of hard metal is surrounded by the α Cu+β Zn phase in the surface coating. The size of hard metal is almost unchanged from its original one. There exists an inter-diffusion zone at the interface of the hard metals and Cu-based matrix. The wear volume of the WC/Cu-Zn-Ni composite surface coatings increased...
Packet Processing Acceleration for Virtualized Network Functions
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Network Function Virtualization (NFV) is a new paradigm in computer networks for implementing network functions on general-purpose common-of-the-shelf processors. The revolutionized NFV architecture has shown to be a suitable replacement for hardware middleboxes. NFV is in high demand because of its lower costs, increased flexibility, and more scalability. However, the ever-growing volume of network traffic and increased data transfer speed in computer networks have made achieving high performance the major issue in this area. With thousands of processing cores and high memory bandwidth, Graphical Processing Units (GPUs) are potentially an appropriate solution to accelerate network...
Reconfigurable Architecture For Cryptanalysis Applications
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Nowadays, the significance of securing data and information is undeniable. Cryptography is being used to provide data security. In addition, cryptanalysis is required to evaluate the effectiveness of cryptography methods, and hence, it is an essential concept for securing data. In general, the cryptography functions shall be designed in a way to impose a high load of time-intensive operations to prevent an adversary from accessing the main data from the encrypted data. As a result, cryptography and cryptanalysis algorithms need high performance computations. So far, a number of methods have been proposed to support the required performance. These methods include: distributed computing and...
Performance Ehancement of Congestion Control Algorithm Through Traffic Flow Istinction
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Congestion is an important issue in the network environment. To keep stable the perfor-mance of the network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important issues in the congestion control study. Active Queue Management (AQM) has been proposed for early detection of congestion inside the network. AQM mechanisms control the queue length in a router by dropping arriving packets. The Random Early Detection (RED) is the most popular AQM mechanism used in routers on the Intenet to allow network users to simultaneously achieve high throughput and low average delay. The RED algorithm may cause heavy oscillation of...
Modeling and Analysis of Real-time Behaviour of Wireless Sensor Networks
,
Ph.D. Dissertation
Sharif University of Technology
;
Jahangir, Amir Hossein
(Supervisor)
Abstract
Nowadays, information gathering based on wireless sensor network (WSN) has formed various applications and it also seems to be spreading more in future. Wireless sensor network, is a network composed of multiple nodes, without any infrastructure, each having one or more sensors, wireless communications unit, processing unit, memory, and power supply. Memory capacity, computation power, and power supply are usually considered as valuable resources and limited in nodes. Most of sensor nodes are located in a dense mode and they are susceptible to failure. Therefore network topology may vary dynamically. A sensor network can support real-time communications independent of its type of structure...
Suitable Architecture Selection for Protocol Identification
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Protocol identification and reverse engineering have recently received much attention due to their importance in many communication and security applications. In this field, the main challenges are: protocol identification, clustering unknown protocols, extracting protocol fields, and finding the protocol format based on these fields and their relations. Most of the proposed methods for the first two parts (protocol identification and clustering) use machine learning and AI techniques. For the last part, some bioinformatics techniques like sequence alignment algorithms are used. In this thesis, after reviewing different methods for protocol identification and reverse engineering, some...
Design of Realistic Network Traffic Generator and Traffic Anomalies
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Generating realistic network traffic serves capacity planning, traffic engineering, understanding internet service performance and anomaly detection. A useful traffic generator must generate characteristics in flows and packets, and add known internet anomalies to legitimate traffic. In this dissertation, we develop a tool for generating realistic and anomalous traffic. This generator can generate traffic in a scalable, reproducible and stochastic manner. Two methods are proposed for this purpose. In the first method, the traffic is generated according to statistical distribution of packets and flow charactristics. In the second method, traffic is generated by modeling the behavior of...
Estimation of Network Parameters for use in Congestion Control Algorithm
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Many congestion control protocols proposed so far to alleviate the problems encountered by TCP protocol in high-speed networks and wireless links have to estimate the parameters of the network. For example, the TCP WESTWOOD congestion window is adjusted based on available bandwidth estimation, or TCP Vegas detects the congestion status based on RTT (Round Trip Time) estimation, and XCP protocol operates according to network traffic load. In this paper, we proposed a novel estimation algorithm that is based on burst identification techniques in router. we show through analysis and simulation that during burst periods this method can estimate the congestion window size of the specific flow...
A New Algorithm for Partitioning Problem in Hardware/Software Codesign
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
We use an abstract model to perform hardware/software partitioning for embedded systems. The complexity of partitioning problem in the model is studied and we use a scheme to overcome its NP-Hardness. Partitioning problem can be considered as the main phase of high level synthesis. As it suffers from complexity, heuristic search methods are generally used to overcome its complexity. In this thesis we present a heuristic method (named Tendency algorithm) to increase the performance of heuristic searches, and use it in parallel with other tuning methods. We defind suitable initial point(s) for heuristic searches instead of tuning heuristic parameters. The thesis justifies the logic behind...
Distinguishing DDoS Attacks from Flash Crowds
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Distributed Denial of Service attacks are threats that target availability of network resources. One feature of this type of attacks is high volume of traffic or service request from huge number of illegitimate attackers that organize botnets together, which cause performance decrease of network. Nowadays, distinguishing huge number of legitimate users during Flash Crowd is one of the most challenging issues for network security experts. Most of proposed methods so far, did not have enough performance or were only applicable in short term, due to increasing attackers’ knowledge in mimicking legitimate users behavior. Methods based on extracting statistic features usually, have better...
Enhancing Scalability in Software-defined Networks
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Software Defined Networking (SDN) is an emerging paradigm which makes the network programmable by separating the control plane from data plane and makes both planes to work independently. There is a centralized controller and a programmable data plane in these networks architecture and forwarding data packets is realized by programming the data plane via an open interface called OpenFlow. OpenFlow is a communication protocol between control and data planes. The centralized architecture of these networks provides a global view of the underlying network to upper applications and brings numerous advantages such as routing, traffic engineering and QoS control. Despite these advantages there are...
Analysis and Evaluation of Intrusion Detection Systems Test Methods
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
Intrusion detection systems’ test and evaluation is an active research area on which many researchers have been working for years. A complete and comprehensive test methodology that can be applied in reasonable time and cost is important and useful both to evaluate a newly designed system and to compare two or more existing systems to select an appropriate system for a particular network. In this research, we first determine the critical features of an IDS and then inspect methods and effective parameters that may influence the test process and propose a method for testing intrusion detection systems. In the proposed test methodology we only examine critical features which lake of them cause...
Design of a High Speed Processor for Network Equipment Test
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
The visible growth in usage of computer networks in daily human life has significantly increased the importance of their correct and flawless operation. Various solutions have been offered to evaluate the operation correctness of network equipment. One of the most important issues in this context is evaluating the performance of such equipment. Due to the increase in speed of network ports, design and implementation of performance evaluation tools have become a challenging issue in terms of parameters such as speed, time accuracy, power consumption and cost. In this thesis, a hardware-based system for testing network equipment with 10 Gbps ports has been designed and implemented. This system...
Design and Implementation of Hardware Accelerator for Domain Name Service
, M.Sc. Thesis Sharif University of Technology ; Jahangir, Amir Hossein (Supervisor)
Abstract
In this project we have designed & implemented a hardware accelerator for domain name service. This hardware accelerator is compatible with existing designs and it could be used standalone as an authoritative DNS server or a hardware accelerator in series of an existing DNS server facility. Two goals, are achieved in this thesis: increasing total DNS throughput and decreasing its response time.In this project, we have surveyed about domain name service, its scientific measurements, theory of caching and its effectiveness, name lookup methods and finally some of the similar designs. Domain name lookup in memory is one of the most challenging operations in every DNS server. We have researched...