• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • No language data
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Biologically-inspired Network Memory System for Smarter Networking

Mokhtar, Bassem Mahmoud Mohamed Ali 24 February 2014 (has links)
Current and emerging large-scale networks, for example the current Internet and the future Internet of Things, target supporting billions of networked entities to provide a wide variety of services and resources. Such complexity results in network-data from different sources with special characteristics, such as widely diverse users and services, multiple media (e.g., text, audio, video, etc.), high-dimensionality (i.e., large sets of attributes) and various dynamic concerns (e.g., time-sensitive data). With huge amounts of network data with such characteristics, there are significant challenges to a) recognize emergent and anomalous behavior in network traffic and b) make intelligent decisions for efficient and effective network operations. Fortunately, numerous analyses of Internet traffic have demonstrated that network traffic data exhibit multi-dimensional patterns that can be learned in order to enable discovery of data semantics. We claim that extracting and managing network semantics from traffic patterns and building conceptual models to be accessed on-demand would help in mitigating the aforementioned challenges. The current Internet, contemporary networking architectures and current tools for managing large network-data largely lack capabilities to 1) represent, manage and utilize the wealth of multi-dimensional traffic data patterns; 2) extract network semantics to support Internet intelligence through efficiently building conceptual models of Internet entities at different levels of granularity; and 3) predict future events (e.g., attacks) and behaviors (e.g., QoS of unfamiliar services) based on learned semantics. We depict the limited utilization of traffic semantics in networking operations as the “Internet Semantics Gap (ISG)”. We hypothesize that endowing the Internet and next generation networks with a “memory” system that provides data and semantics management would help resolve the ISG and enable “Internet Intelligence”. We seek to enable networked entities, at runtime and on-demand, to systematically: 1) learn and retrieve network semantics at different levels of granularity related to various Internet elements (e.g., services, protocols, resources, etc.); and 2) utilize extracted semantics to improve network operations and services in various aspects ranging from performance, to quality of service, to security and resilience. In this dissertation, we propose a distributed network memory management system, termed NetMem, for Internet intelligence. NetMem design is inspired by the functionalities of human memory to efficiently store Internet data and extract and utilize traffic data semantics in matching and prediction processes, and building dynamic network-concept ontology (DNCO) at different levels of granularity. The DNCO provides dynamic behavior models for various Internet elements. Analogous to human memory functionalities, NetMem has a memory system structure comprising short-term memory (StM) and long-term memory (LtM). StM maintains highly dynamic network data or data semantics with lower levels of abstraction for short time, while LtM keeps for long time slower varying semantics with higher levels of abstraction. Maintained data in NetMem can be accessed and learned at runtime and on-demand. From a system’s perspective, NetMem can be viewed as an overlay network of distributed “memory” agents, called NMemAgents, located at multiple levels targeting different levels of data abstraction and scalable operation. Our main contributions are as follows: • Biologically-inspired customizable application-agnostic distributed network memory management system with efficient processes for extracting and classifying high-level features and reasoning about rich semantics in order to resolve the ISG and target Internet intelligence. • Systematic methodology using monolithic and hybrid intelligence techniques for efficiently managing data semantics and building runtime-accessible dynamic ontology of correlated concept classes related to various Internet elements and at different levels of abstraction and granularity that would facilitate: ▪ Predicting future events and learning about new services; ▪ Recognizing and detecting of normal/abnormal and dynamic/emergent behavior of various Internet elements; ▪ Satisfying QoS requirements with better utilization of resources. We have evaluated the NetMem’s efficiency and effectiveness employing different semantics reasoning algorithms. We have evaluated NetMem operations over real Internet traffic data with and without using data dimensionality reduction techniques. We have demonstrated the scalability and efficiency of NetMem as a distributed multi-agent system using an analytical model. The effectiveness of NetMem has been evaluated through simulation using real offline data sets and also via the implementation of a small practical test-bed. Our results show the success of NetMem in learning and using data semantics for anomaly detection and enhancement of QoS satisfaction of running services. / Ph. D.
2

Theory and Applications of Network Structure of Complex Dynamical Systems

Chetty, Vasu Nephi 01 March 2017 (has links)
One of the most powerful properties of mathematical systems theory is the fact that interconnecting systems yields composites that are themselves systems. This property allows for the engineering of complex systems by aggregating simpler systems into intricate patterns. We call these interconnection patterns the "structure" of the system. Similarly, this property also enables the understanding of complex systems by decomposing them into simpler parts. We likewise call the relationship between these parts the "structure" of the system. At first glance, these may appear to represent identical views of structure of a system. However, further investigation invites the question: are these two notions of structure of a system the same? This dissertation answers this question by developing a theory of dynamical structure. The work begins be distinguishing notions of structure from their associated mathematical representations, or models, of a system. Focusing on linear time invariant (LTI) systems, the key technical contributions begin by extending the definition of the dynamical structure function to all LTI systems and proving essential invariance properties as well as extending necessary and sufficient conditions for the reconstruction of the dynamical structure function from data. Given these extensions, we then develop a framework for analyzing the structures associated with different representations of the same system and use this framework to show that interconnection (or subsystem) structures are not necessarily the same as decomposition (or signal) structures. We also show necessary and sufficient conditions for the reconstruction of the interconnection (or subsystem) structure for a class of systems. In addition to theoretical contributions, this work also makes key contributions to specific applications. In particular, network reconstruction algorithms are developed that extend the applicability of existing methods to general LTI systems while improving the computational complexity. Also, a passive reconstruction method was developed that enables reconstruction without actively probing the system. Finally, the structural theory developed here is used to analyze the vulnerability of a system to simultaneous attacks (coordinated or uncoordinated), enabling a novel approach to the security of cyber-physical-human systems.

Page generated in 0.0669 seconds