Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Efficient data capturing for network forensics in cognitive radio networks
Chen S., Zeng K., Mohapatra P. IEEE/ACM Transactions on Networking22 (6):1988-2000,2014.Type:Article
Date Reviewed: Apr 23 2015

Law enforcement agencies need effective cognitive radio networks (CRNs) for pursuing forensics data essential to disentangling cybercrimes. The currently expensive traditional wireless networks obligate individual monitors to capture data from each of several channels. How should several monitors be efficiently slated to probe channels and capture packets in CRNs with robustly shifting operations? Chen and colleagues offer a solution that makes use of a smaller number of monitors than the available channels on a CRN to effectively capture packets.

The authors propose a packet arrival time prediction algorithm based on the familiar support vector regression model [1]. The algorithm allows monitors, contingent on their current workloads and not co-locations, to receive the arrival times of successive packets and to forecast the next packet arrival times at any channel. The greedy monitor scheduling algorithm selects the most available monitor to capture the appropriate packets.

Extensive simulation experiments were performed to assess the reliability of the traffic arrivals and the accuracy of scheduling monitors to channels. Traces of file transfer protocol (FTP), voice over Internet Protocol (VoIP), and web browsing traffic were investigated. The targeted packets ought to originate from the FTP and VoIP traffic. The results reveal that the proposed algorithm is more accurate in forecasting the packet arrival times of FTP and VoIP traffic than the web browsing and Internet control message protocol (ICMP) traffic. The proposed algorithm for switching monitors among channels significantly outperformed any random method. Other than the failure to recognize the types and characteristics of the packets flowing into the channels by different applications, the authors offer great insights into the optimal scheduling of limited monitors to channels, to capture packets in CRNs. This paper offers abundant insights into catching encrypted and unencrypted packets for forensics data analysis and investigation.

Reviewer:  Amos Olagunju Review #: CR143382 (1507-0587)
1) Vapnik, V.; Golowich, S.; Smola, A. Support vector method for function approximation, regression estimation, and signal processing. In Advances in neural information processing systems. Edited by Mozer, M.; Jordan, M.; Petsche, T. MIT Press, Cambridge, MA, 1996, 281–287.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Communications (C.2.0 ... )
 
 
Performance of Systems (C.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Communications": Date
Communications formulas & algorithms for systems analysis and design
Rorabaugh C., McGraw-Hill, Inc., New York, NY, 1990. Type: Book (9780070536449)
Feb 1 1992
Telecommunications for management
Meadow C. (ed), Tedesco A., McGraw-Hill, Inc., New York, NY, 1984. Type: Book (9780070411982)
Jan 1 1985
After the breakup
Crandall R., The Brookings Institution, Washington, DC, 1991. Type: Book (9780815716068)
Jun 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy