MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA


Abstract

The successful functioning of telecommunication networks largely depends on the effectiveness of algorithms for detection and protection against overloads. The article describes the main differences that arise when forecasting, monitoring and managing congestion at the node level and at the channel level. An algorithm for detecting congestion by estimating the entropy of time distributions of traffic parameters is proposed. The entropy measures of data sets for various types of model distribution, in particular for the Pareto distribution, which optimally describes the behavior of self-similar random processes, were calculated and analyzed. The advantages of this approach include scalability, sensitivity to changes in distributions of traffic characteristics and ease of implementation and accessible interpretation.


Keywords

telecommunication systems; self-similarity factor of network traffic; congestion detection

Airehrour D., Gutierrez J. A., Ray S. K.: SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems 93, 2019, 860–876 [http://doi.org/10.1016/j.future.2018.03.021]. DOI: https://doi.org/10.1016/j.future.2018.03.021

Alashhab A. A., Zahid M. S. M., Azim M. A., Daha M. Y., Isyaku B., Ali S.: A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry 14, 2022, 1563 [http://doi.org/10.3390/sym14081563]. DOI: https://doi.org/10.3390/sym14081563

Bakhovskyy P. et al.: Stages of the Virtual Technical Functions Concept Networks Development. Cagáˇnová et al. (eds.): Advances in Industrial Internet of Things, Engineering and Management. EAI/Springer Innovations in Communication and Computing, 2021, 119–135 [http://doi.org/10.1007/978-3-030-69705-1_7]. DOI: https://doi.org/10.1007/978-3-030-69705-1_7

Bedin A., Chiariotti F., Kucera S., Zanella A.: Optimal Latency-Oriented Coding and Scheduling in Parallel Queuing Systems. IEEE Transactions on Communications 70(10), 2022, 6471–6488 [http://doi.org/10.1109/TCOMM.2022.3200105]. DOI: https://doi.org/10.1109/TCOMM.2022.3200105

Chughtai O., Badruddin N., Rehan M., Khan A.: Congestion Detection and Alleviation in Multihop Wireless Sensor Networks. Wireless Communications and Mobile Computing 2017, 9243019 [http://doi.org/10.1155/2017/9243019]. DOI: https://doi.org/10.1155/2017/9243019

Desai R. M., Patil B. P., Sharma D. P.: Learning based route management in mobile ad hoc networks. Indonesian Journal of Electrical Engineering and Computer Science 7(3), 2017, 718–723 [http://doi.org/10.11591/ijeecs.v7.i3.pp718-723]. DOI: https://doi.org/10.11591/ijeecs.v7.i3.pp718-723

Desmoulins N., Fouque P.A., Onete C., Sanders O.: Pattern Matching on Encrypted Streams. ASIACRYPT 2018. Lecture Notes in Computer Science 11272, Springer, Cham. [http://doi.org/10.1007/978-3-030-03326-2_5]. DOI: https://doi.org/10.1007/978-3-030-03326-2_5

Divitskyi A., Salnyk S., Hol V., Sydorkin P., Storchak A.: Development of a model of a subsystem for forecasting changes in data transmission routes in special purpose mobile radio networks. Eastern-European Journal of Enterprise Technologies 3(9), 2021, 116–125 [http://doi.org/10.15587/1729-4061.2021.235609]. DOI: https://doi.org/10.15587/1729-4061.2021.235609

Dobkach L.: Analysis of methods for recognizing computer attacks. Legal informatics 1, 2020, 67–75 [http://doi.org/10/21681/1944-1404-2020-1-67-75].

Durairaj M., Hirudhaya Mary Asha J.: The Internet of Things (IoT) Routing Security – A Study. International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering 637. Springer, Singapore 2020 [http://doi.org/10.1007/978-981-15-2612-1_58]. DOI: https://doi.org/10.1007/978-981-15-2612-1_58

Hasan N., Mishra A, Ray A. K.: Fuzzy logic based cross-layer design to improve Quality of Service in Mobile ad-hoc networks for Next-gen Cyber Physical System. Engineering Science and Technology, an International Journal 35, 2022, 101099 [http://doi.org/10.1016/j.jestch.2022.101099]. DOI: https://doi.org/10.1016/j.jestch.2022.101099

Hui W., Zijian C., Bo H.: A Network Intrusion Detection System Based on Convolutional Neural Network. Journal of Intelligent & Fuzzy Systems 38(6), 2020, 7623–7637 [http://doi.org/10.3233/JIFS-179833]. DOI: https://doi.org/10.3233/JIFS-179833

Mangelkar S., Dhage S., Nimkar A.: A comparative study on RPL attacks and security solutions. International Conference on Intelligent Computing and Control (I2C2), 2017, 1–6 [http://doi.org/10.1109/I2C2.2017.8321851]. DOI: https://doi.org/10.1109/I2C2.2017.8321851

Moroz S., Tkachuk A., Khvyshchun M., Prystupa S., Yevsiuk M.: Methods for Ensuring Data Security in Mobile Standards. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 12(1), 2022, 4–9 [http://doi.org/10.35784/iapgos.2877]. DOI: https://doi.org/10.35784/iapgos.2877

Myneni S., Chowdhary A., Huang D., Alshamrani A.: A distributed deep defense against DDoS attacks with edge computing. Computer Networks 209, 2022, 108874 [http://doi.org/10.1016/j.comnet.2022.108874]. DOI: https://doi.org/10.1016/j.comnet.2022.108874

Priyadarshini R., Rabindra K.: A deep learning based intelligent framework to mitigate DDoS attack in fog environment. Journal of King Saud University – Computer and Information Sciences 34(3), 2022, 825–831 [http://doi.org/10.1016/j.jksuci.2019.04.010]. DOI: https://doi.org/10.1016/j.jksuci.2019.04.010

Rafe V., Mohammady S., Cuevas E.: Using Bayesian optimization algorithm for model-based integration testing. Soft Comput 26, 2022, 3503–3525 [http://doi.org/10.1007/s00500-021-06476-9]. DOI: https://doi.org/10.1007/s00500-021-06476-9

Showail A., Tahir R., Zaffar M. F., Noor M. H., Al-Khatib M.: An internet of secure and private things: A service-oriented architecture. Computers & Security 120, 2022, 102776 [http://doi.org/10.1016/j.cose.2022.102776]. DOI: https://doi.org/10.1016/j.cose.2022.102776

Tkachuk A. et al.: Basic Stations Work Optimization in Cellular Communication Network. Advances in Industrial Internet of Things, Engineering and Management, EAI. Springer Innovations in Communication and Computing, 2021, 1–19 [http://doi.org/10.1007/978-3-030-69705-1_1]. DOI: https://doi.org/10.1007/978-3-030-69705-1_1

Toroshanko Y., Selepyna Y., Yakymchuk N., Cherevyk V.: Control of traffic streams with the multi-rate token bucket, in International Conference on Advanced Information and Communications Technologies AICT 2019, 2019, 352–355 [http://doi.org/10.1109/AIACT.2019.8847860]. DOI: https://doi.org/10.1109/AIACT.2019.8847860

Verma A., Ranga V.: Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks. TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), 2019, 552–557 [http://doi.org/10.1109/TENCON.2019.8929409]. DOI: https://doi.org/10.1109/TENCON.2019.8929409

Yin C., Wang H., Yin X. et al.: Improved deep packet inspection in data stream detection. J Supercomput 75, 2019, 4295–4308 [http://doi.org/10.1007/s11227-018-2685-y]. DOI: https://doi.org/10.1007/s11227-018-2685-y

Yungaicela-Naula N., Vargas-Rosales C., Pérez-Díaz J., Carrera D.: A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning. Journal of Network and Computer Applications 205, 2022, 103444 [http://doi.org/10.1016/j.jnca.2022.103444]. DOI: https://doi.org/10.1016/j.jnca.2022.103444

Zheng C., Li X., Liu Q., Sun Y., Fang B.: Hashing Incomplete and Unordered Network Streams. Advances in Digital Forensics XIV. DigitalForensics 2018. IFIP Advances in Information and Communication Technology 532. Springer, Cham. 2018 [https://doi.org/10.1007/978-3-319-99277-8_12]. DOI: https://doi.org/10.1007/978-3-319-99277-8_12

Download

Published : 2022-12-30


Yakymchuk, N., Selepyna, Y., Yevsiuk, M., Prystupa, S., & Moroz, S. (2022). MONITORING OF LINK-LEVEL CONGESTION IN TELECOMMUNICATION SYSTEMS USING INFORMATION CRITERIA. Informatyka, Automatyka, Pomiary W Gospodarce I Ochronie Środowiska, 12(4), 26-30. https://doi.org/10.35784/iapgos.3076

Natalia Yakymchuk  n.yakymchuk@lntu.edu.ua
Lutsk National Technical University  Kazakhstan
http://orcid.org/0000-0002-8173-449X
Yosyp Selepyna 
Lutsk National Technical University  Ukraine
http://orcid.org/0000-0002-2421-1844
Mykola Yevsiuk 
Lutsk National Technical University  Ukraine
http://orcid.org/0000-0002-3768-8959
Stanislav Prystupa 
Lutsk National Technical University  Ukraine
http://orcid.org/0000-0003-3705-1541
Serhii Moroz 
Lutsk National Technical University  Ukraine
http://orcid.org/0000-0003-4677-5170