Artigos de Conferência, Publicação

A Model of Signaling for Establishing of LSPs for Multicast Communication over GMPLS Networks

Label switching, which in IP networks is exemplified by MPLS and its extensions MPLambdaS and GMPLS, appears as one of the best alternatives to offer a reliable and flexible control plane for WDM networks, since it allows the integration of the IP Protocol with WDM technology, when lambdas are associated with labels, implements powerful traffic-engineering mechanisms, and provides several alternative schemes for fault-tolerance, as well as support for quality of service (QoS). However, almost all the definitions and standardizations for MPLS are restricted to unicast communication, leaving support for multicast communication for future work. In the specific case of the triggering problem for LSPs (Label Switched Paths), there is still no consensus about the best strategy for multicast communication. This paper proposes an algorithm for traffic-driven triggering of LSPs, based on MFCs (Multicast Forwarding Caches), and has the advantage of being a schema which is compatible with several multicast routing protocols. To validate the proposed algorithm we carry out simulation studies using the NS-2 (Network Simulator) simulation platform.

Artigos de Conferência, Publicação

Log analysis based mechanism for network security incidents identification

The increasing use and importance that networks have acquired in today’s economics and social context also brought an increase in the number of malicious activities that violate privacy and security policies of institutional networks. There are several approaches that aim to detect such activities, for instance the usage of intrusion detection systems. The goal of this paper is to present an alternative malicious activity detection approach based on querying and correlation of the events registered in system logs. The purpose of this approach is to identify the hosts causing such malicious activities. Experiments carried at the Brazilian National Research and Educational Network’s Point of Presence at State of Pará have showed that this proposal was able to detect the hosts responsible for malicious activities accurately and demanding low computational resources.