Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2019
DOI: 10.3390/electronics9010040
|View full text |Cite
|
Sign up to set email alerts
|

A Cost-Efficient Software Based Router and Traffic Generator for Simulation and Testing of IP Network

Abstract: The development was carried out using the Qt5.2 integrated development environment, which uses the programming language C++. The main advantage of this environment is that the code written in it can be compiled to different platforms (for example, Windows, Linux, Mac OS). A software router based on a modular architecture has been developed. It uses the socket technology, which allows forming a program-oriented packet network with any topology, including full-coupled topology. A network traffic generator to tes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 54 publications
0
17
0
1
Order By: Relevance
“…The K-Means [48][49][50] algorithm uses distance as the classification criterion. The smaller the distance between two samples, the more similar they are.…”
Section: Obtaining the Optimal Anchor Boxesmentioning
confidence: 99%
“…The K-Means [48][49][50] algorithm uses distance as the classification criterion. The smaller the distance between two samples, the more similar they are.…”
Section: Obtaining the Optimal Anchor Boxesmentioning
confidence: 99%
“…The scheme of the experimental stand consists of the following basic elements: end devices (IoT camera, laptop, and computer) that generate legitimate traffic; the generator of non-legitimate traffic (network attack), which is a conventional computer on the corporate network [84]; network devices on the corporate network (switch and router), and the object of attack, which is a standard web server on the Internet and installed before the router software DPI system.…”
Section: Test Bed For Network Traffic Analysis and Anomaly Detectionmentioning
confidence: 99%
“…The network traffic analysis and anomaly detection scheme using the SolarWinds DPI system is depicted in Figure 20 and the scheme using the proposed DPI system is depicted in Figure 21. (network attack), which is a conventional computer on the corporate network [84]; network devices on the corporate network (switch and router), and the object of attack, which is a standard web server on the Internet and installed before the router software DPI system. The network traffic analysis and anomaly detection scheme using the SolarWinds DPI system is depicted in Figure 20 and the scheme using the proposed DPI system is depicted in Figure 21.…”
Section: Test Bed For Network Traffic Analysis and Anomaly Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this simulation program, seven types of electronic services that can be transmitted by the network are selected: VoIP (voice over Internet Protocol), data transfer, interactive data, IPTV Internet Protocol Television, service packets, videoconferencing, video on demand [40].…”
Section:  Packets Generation By Customer Devicesmentioning
confidence: 99%