- Software-Defined Networks and 5G
- Caching and Content Delivery
- Network Packet Processing and Optimization
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Opportunistic and Delay-Tolerant Networks
- Internet Traffic Analysis and Secure E-voting
- Cooperative Communication and Network Coding
- Cloud Computing and Resource Management
- Advanced Malware Detection Techniques
- Carbon and Quantum Dots Applications
- Advanced Data Storage Technologies
- Interconnection Networks and Systems
- Advanced Optical Network Technologies
- Software System Performance and Reliability
- IoT Networks and Protocols
- Covalent Organic Framework Applications
- Privacy-Preserving Technologies in Data
- Mobile Ad Hoc Networks
- Microgrid Control and Optimization
- Electrocatalysts for Energy Conversion
- Anomaly Detection Techniques and Applications
- Blockchain Technology Applications and Security
- Privacy, Security, and Data Protection
- Advanced Photonic Communication Systems
Fairleigh Dickinson University
2019-2021
Clarkson University
2014-2019
University of Memphis
2009-2013
The rapid growth of global routing tables has raised concerns among many Internet Service Providers. most immediate concern regarding scalability is the size Forwarding Information Base (FIB), which seems to be growing at a faster pace than router hardware can support. This paper focuses on one potential solution this problem - FIB aggregation, i.e., aggregating entries without affecting forwarding paths taken by data traffic. Compared with alternative solutions problem, aggregation...
This paper proposed an optimal planning model for locational distributed Internet data centers' (IDCs) computing and power supply infrastructures-IDC microgrids. The objective is to determine the IDC sites, microgrid types (i.e., ac, dc, or Hybrid), server (ac dc) capacities, as well onsite energy resource capacities of each site be built, under a single decision criterion - economics. overall cost including investment cost, operation reliability associated with installation minimized. Both...
Internet routing tables have been growing rapidly due to factors such as edge-site multihoming, traffic engineering, and disjoint address allocations. To the scalability problems caused by this rapid growth, we propose an evolutionary approach that is incrementally deployable provides immediate benefits any adopting ASes. The basic premise of route aggregation removes from unnecessary topological details about remote portions Internet. We demonstrate can be applied starting local scopes...
The size of the global Routing Information Base (RIB) has been increasing at an alarming rate. This directly leads to rapid growth Forwarding (FIB) size, which raises serious concerns for ISPs as FIB memory in line cards is much more expensive than regular modules and it very costly increase this capacity frequently all routers ISP. One potential solution install only most popular entries into fast (i.e., a cache), while storing complete slow memory. In paper, we propose effective caching...
The fast growth of global routing table size has been causing concerns that the Forwarding Information Base (FIB) will not be able to fit in existing routers' expensive line-card memory, and upgrades lead higher cost for network operators customers. FIB Aggregation, a technique merges multiple entries into one, is probably most practical solution since it software local router, does require any changes protocols or operations. While previous work on aggregation mostly focuses reducing size,...
Biometrics have been used increasingly heavily for identity authentication in many critical public services, such as border passes or security check points. However, traditional biometrics-based management systems collect and store personal biometrical data a centralized server database, an individual has no control over how her biometrics will be what purpose. Such kind of can result serious privacy issues sensitive data. In this paper, we design novel approach to leveraging...
The global routing table size has been increasing rapidly, outpacing the upgrade cycle of router hardware. Recently aggregating Forwarding Information Base (FIB) emerges as a promising solution since it reduces FIB significantly in short term and is compatible with any long-term architectural solutions.Because entries change dynamically updates, an important component aggregation scheme to handle updates efficiently while shrinking much possible. In this paper, we first propose two...
The ability to accurately determine the geographic location of an arbitrary IP address has potential in many applications. Previous methods based on observing relationship between network delay and physical distance are inaccurate. Methods similarity more accurate, but inefficient because they need information a large number landmark nodes near destination be collected maintained. We propose method that can overcome both problems. Our maintains stable collection observers covers target area....
Named Data Networking (NDN) is a newly proposed content-centric network architecture that naturally supports efficient content distribution by routing data names instead of conventional IP prefixes. Taking advantage the unique feature-adaptive forwarding in NDN and centralized management control Software Defined (SDN), we design develop SDAR, Intra-Domain Routing Control Platform NDN, can manage network-wide routers various dynamics effectively. To best our knowledge, it first time combine...
Internet of Things (IoT) is becoming an increasingly attractive target for cybercriminals. We observe that many attacks to IoTs are launched in a collusive way, such as brute-force hacking usernames and passwords, at particular victim. However, most the time our defending mechanisms kind carried out individually independently, which leads ineffective weak defense. To this end, we propose leverage Software Defined Networks (SDN) enable cooperative security legacy IP-based IoT devices. SDN...
Named Data Networking (NDN) recently arises as a promising technology to support connected vehicle (CV) applications due the match between their characteristics. However, fast mobility and vast number of vehicles raise great challenges in designing scalable efficient NDN network for CV applications. Therefore, this paper, we develop an based application framework that handles challenge through innovations two aspects. First, propose hierarchical hyperbolic backbone architecture (H2NDN)....
As Internet of Things (IoT) applications become more prevalent and grow in their use, a limited number ofwireless communication methods may be unable to enable dependable, robust delivery information. It is necessary adaptive interoperability over variety wireless media meet the requirements large-scale IoT applications. This paper utilizes Named Data Networking (NDN), an up-and-coming Information-Centric Network architecture, interconnect differing links via network layer, implements...
Ternary Content-Addressable Memory (TCAM) chips are used to store Forwarding Information Bases (FIB) in modern routers. TCAM provides next-hop lookup for IP packets at the line-rate. However, is expensive and energy-consuming; addition, constant FIB growth may lead overflow problem. Yet only a small portion of entries carries most network traffic. Thus, caching, namely, installing popular fast memory, e.g., TCAM, significantly minimize usage. To date, caching architecture has not been widely...
While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient provide all hosts in the network with heavy-duty defense systems software firewalls. In this work, we leverage a new concept of programmable data planes, directly react alerts raised by victim and prevent further whole blocking attack at edge.
Ternary Content-Addressable Memory (TCAM) chips are used to store Forwarding Information Bases (FIB) in modern routers. TCAM provides next hop lookup for IP packets at the line-rate. However, is expensive and energy-consuming; addition, constant FIB growth may lead overflow problem. Yet only a small portion of entries carries most network traffic. Thus, caching, namely, installing popular fast memory, e.g., TCAM, significantly minimize usage. In this work, we leverage concept programmable...
Several cloud service and data center providers have announced plans to transition towards environmental-friendly green computing. From a computer networking perspective, such requires novel routing approaches over traditional protocols, more specifically, end-host-driven load balancing. For example, an end-host may issue request change its load, based on current CPU or energy availability. Our solution, iLoad, collects requests from end-hosts computes the routes entirely in plane, providing...
While there are various methods to detect application layer attacks or intrusion attempts on an individual end host, it is not efficient provide all hosts in the network with heavy-duty defense systems software firewalls. In this work, we leverage a new concept of programmable data planes, directly react alerts raised by victim and prevent further whole blocking attack at edge. We call our design LAMP, Layer 7 Attack Mitigation Programmable planes. implemented LAMP using P4 plane programming...
The rapid increase in routers forwarding table size is raising serious concerns for ISPs. In particular, it exhausts the hardware capacity, leading to more frequent upgrades and higher cost. this article, we present development of a virtual network framework based on open source software that demonstrates how solutions impending problem can be implemented studied. system capable emulating an operational environment with intradomain inter-domain routing protocols as well real-world Internet...
Due to network practices such as traffic engineering and multi-homing, the number of routes---also known IP prefixes---in global forwarding tables has been increasing significantly in last decade continues growing a super linear trend. One most promising solutions is use smart Forwarding Information Base (FIB) aggregation algorithms aggregate prefixes convert large table into small one. Doing so poses research question, however, i.e., how can we quickly verify that original yields same...
This work leverages Named Data Networks (NDN), an emerging information-centric network architecture, to interconnect diverse wireless links at the layer and implements flexible routing forwarding strategies for efficient information dissemination. The system focuses on implementing interface between NDN LoRaWAN, interconnecting LoRaWAN WiFi via Forwarding Daemon (NFD) into a ubiquitous ad hoc network, which bears very longrange multi-hop capabilities Device-to-Device (D2D) communication....
Named Data Networking is one of the most promising future Internet architectures with many advanced characteristics that are lacking in existing TCP/IP-based architecture. NDN features named content, built-in security, in-network caching, adaptive traffic routing, and multi-path forwarding. can be used to mitigate congestion prioritize critical messages both wired wireless networks. It has particular advantages deliver over a disrupted highly dynamic network environment because its...
In the era of high-performance cloud computations, networks need to ensure fast packet forwarding. This task is carried by TCAM forwarding chips that perform line-rate Longest Prefix Matches in a Forwarding Information Base (FIB). However, with increasing number prefixes IPv4 and IPv6 routing tables price increases as well. this work, we present novel FIB compression technique adding an aggregation layer into caching architecture. Combined Caching Aggregation (CFCA), cache-hit ratio...
The transition to renewable energy sources for data centers has become a popular trend in the IT industry. However, volatility of energy, such as solar and wind power, impedes operation green centers. In this work, we leverage Software Defined Networking (SDN) build GRASP, platform that schedules job requests distributed according amount available at each site. GRASP can be re-configured with different scheduling algorithms address diverse factors amounts instantly power CPU load We utilize...