Academia.eduAcademia.edu

Flash crowds

description237 papers
group0 followers
lightbulbAbout this topic
Flash crowds refer to sudden, large gatherings of people in a specific location, often triggered by a viral event or online communication. This phenomenon is characterized by rapid influxes of participants, leading to challenges in crowd management, safety, and infrastructure, and is studied in fields such as sociology, urban planning, and information technology.
lightbulbAbout this topic
Flash crowds refer to sudden, large gatherings of people in a specific location, often triggered by a viral event or online communication. This phenomenon is characterized by rapid influxes of participants, leading to challenges in crowd management, safety, and infrastructure, and is studied in fields such as sociology, urban planning, and information technology.
MotusNet is a content network in which the addressable objects, contents, are decoupled from the physical nodes that carry them. The content names in MotusNet are hierarchical, so that they can be aggregated in the routing tables to... more
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able... more
We live in a world submerged with more information than ever before. We express information or data mathematically and it is growing faster than ever. If the data is imperfect, out of context or otherwise contaminated, it can lead to... more
Proxy technology is commonly used a t boundaries of ISPs (Internet Service Providers) to reduce the bandwidth requirement in the backbone WAN. By caching portions of a video in a video proxy closed to clients, the video playback quality... more
Recent denial of service attacks are mounted by professionals using Botnets of tens of thousands of compromised machines. To circumvent detection, attackers are increasingly moving away from bandwidth floods to attacks that mimic the Web... more
Deriving analytical performance models requires intimate knowledge of the architecture and behavior of the computer system being modeled. In autonomic computing environments, this detailed knowledge may not be readily available (or it may... more
Allocating Applications in Distributed Computing W e can use grid computing 1 and virtualization 2 to distribute computing applications on the Internet, letting a collection of interconnected servers host a set of applications to balance... more
Caches are a critical element of web-based information systems. Understanding the expected behaviour of cache policies is especially important for achieving good quality of service. Existing works have suggested that the behaviour of the... more
At present, response surface methodology (RSM) is the most preferred method for fermentation media optimization. However, in the last two decades, artificial intelligence algorithm has become one of the most efficient methods for... more
Attribute reduction is one important part researched in rough set theory. A reduct from a decision table is a minimal subset of the conditional attributes which provide the same information for classification purposes as the entire set of... more
Recently there has been an increasing deployment of content distribution networks (CDNs) that offer hosting services to Web content providers. In this paper, we first compare the uncooperative pulling of Web contents used by commercial... more
Recently there has been an increasing deployment of content distribution networks (CDNs) that offer hosting services to Web content providers. In this paper, we first compare the uncooperative pulling of Web contents used by commercial... more
In the present age of Internet, data is accumulated at a dramatic pace. The accumulated huge data has no relevance, unless it provides certain useful information pertaining to the interest of the organization. But the real challenge lies... more
World Wide Web (WWW) requests have continued to grow at an exponential rate for the reason that it, already, constitutes the dominant workload component for internet traffic (Wang 1999). The main implications related to this fact are the... more
One major challenge in communication networks is the problem of dynamically distributing load in the presence of bursty and hard to predict changes in traffic demands. Current traffic engineering operates on time scales of several hours... more
Computer systems are becoming extremely complex due to the large number and heterogeneity of their hardware and software components, the multi-layered architecture used in their design, and the unpredictable nature of their workloads.... more
Large data centers host several application environments (AEs) that are subject to workloads whose intensity varies widely and unpredictably. Therefore, the servers of the data center may need to be dynamically redeployed among the... more
A model of granular computing (GrC) is proposed by reformulating, re-interpreting, and combining results from rough sets, quotient space theory, and belief functions. Two operations, called zoomingin and zooming-out operations, are used... more
Though many hierarchical structures have been proposed to analyze the finer or coarser relationships between two granulation spaces, these structures can only be used to compare the single granulation spaces. However, it should be noticed... more
A human heart is represented by graph theory and has many topological formulations. The main purpose of the article is to introduce a special class of neighborhood systems, called $1$-neighborhood systems ($\NS$s for short), as tools to... more
The present paper is devoted to discussion of extended covering rough sets from the relations point of view. In fact, we give new definitions to the lower and the upper approximations using a binary general relation. Moreover, our... more
DDoS attack is one of the hardest attacks to detect and mitigate in the computer world. This paper introduces two quantitative models, which use the client puzzling to detect and thwart application DDoS attacks. We simulated the models to... more
Abstract--This paper develops simple cost models for provisioning content distribution networks that use the simple and highly scalable bandwidth skimming protocol for streaming. New insight is obtained into (1) how cost-effective proxy... more
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Data pre-processing is a major difficulty in the knowledge discovery process, especially feature selection on a large amount of data. In literature, various approaches have been suggested to overcome this difficulty. Unlike most... more
In this paper, we propose to construct mitigation of large scale of DDoS attacks based on "Weight Deficit" flow scheduling mechanism to improve the network maximize throughput and minimize the network congestion for mitigating DDoS... more
Instant Messaging (IM) is a useful communication and work collaboration tool between individuals, groups, or enterprises. Unfortunately, most IM systems lack the needed security mechanism capable of ensuring the secure communications of... more
In this paper, we introduce the concept of set-valued homomorphism of a lattice which is the generalization of ordinary lattice homomorphism. We construct generalized rough lower and upper approximations operators, by means of a... more
In this article, we introduce a new technique for roughness of a set based on (α, β)indiscernibility, that is, objects are indiscernible up to certain degrees α and β. For this purpose, a bipolar fuzzy tolerance relation has been used.... more
Modeling system performance and workload characteristics has become essential for efficiently provisioning Internet services and for accurately predicting future resource requirements on anticipated workloads. The accuracy of these models... more
World Wide Web (WWW) requests have continued to grow at an exponential rate for the reason that it, already, constitutes the dominant workload component for internet traffic (Wang 1999). The main implications related to this fact are the... more
A flash crowd is a surge in traffic to a particular Web site that causes the site to be virtually unreachable. We present a model of flash crowd events and evaluate the performance of various multi-level caching techniques suitable for... more
Pre-Congestion Notification (PCN) builds on the concepts of RFC 3168, "The addition of Explicit Congestion Notification to IP". However, Pre-Congestion Notification aims at providing notification before any congestion actually occurs.... more
The proliferation of Content Delivery Networks (CDN) reveals that existing content networks are owned and operated by individual companies. As a consequence, closed delivery networks are evolved which do not cooperate with other CDNs and... more
In the paper, information table for network traffic data is discretized by supervised learning using WEKA and from this discretized data, three different algorithms for calculation of rules are applied, genetic algorithm, covering... more
Numerous works have been done for load balancing of web servers in grid environment. Reason for popularity of grid environment is to allow accessing distributed resources which are located at remote locations. For effective utilization,... more
Web caching has been widely used to alleviate Internet traffic congestion in World Wide Web (WWW) services. To reduce download throughput, an effective strategy on web cache management is needed to exploit web usage information in order... more
Recently, the concept of a soft rough fuzzy covering (briefly, SRFC) by means of soft neighborhoods was defined and their properties were studied by Zhan’s model. As a generalization of Zhan’s method and in order to increase the lower... more
Crowd events or flash crowds are meant to be a voluminous access to media or web assets due to a popular event. Even though the crowd event accesses are benign, the problem of distinguishing them from Distributed Denial of Service (DDoS)... more
This paper presents an adaptive framework for managing dynamic replication of Web services in a distributed environment including the Service-Oriented Architecture (SOA) environment. The framework aims to improve the web services... more
This paper presents an adaptive framework for managing dynamic replication of Web services in a distributed environment including the Service-Oriented Architecture (SOA) environment. The framework aims to improve the web services... more
Online Internet applications see dynamic workloads that fluctuate over multiple time scales. This paper argues that the non-stationarity in Internet application workloads, which causes the request mix to change over time, can have a... more
Content Distribution Network (CDN) technology has been proposed to deliver content from content nodes placed at strategic locations on the Internet. However, only companies or organizations, who can pay for the services of CDNs, have the... more
Online Internet applications see dynamic workloads that fluctuate over multiple time scales. This paper argues that the non-stationarity in Internet application workloads, which causes the request mix to change over time, can have a... more
Content Delivery Networks for multimedia contents are typically managed by a dedicated company. However, there are cases where an enterprise already investing in a dedicated network infrastructure wants to deploy its own private CDN. This... more
The traditional approach to managing complex computer systems is to use a cadre of skilled IT professionals who use monitoring tools in order to detect when problems arise. They are then able to use their skills and experience to... more
This paper studies the Coremelt attack, a linkflooding Distributed Denial of Service attack that exhausts the bandwidth at a core network link using low-intensity traffic flows between subverted machines. A dynamical system model is... more
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client machines. The focus of our paper is the design,... more
In the paper, information table for network traffic data is discretized by supervised learning using WEKA and from this discretized data, three different algorithms for calculation of rules are applied, genetic algorithm, covering... more
Download research papers for free!