osi model Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Deep learning model for distributed denial of service (DDoS) detection

Distributed denial of service (DDoS) attacks is one of the serious threats in the domain of cybersecurity where it affects the availability of online services by disrupting access to its legitimate users. The consequences of such attacks could be millions of dollars in worth since all of the online services are relying on high availability. The magnitude of DDoS attacks is ever increasing as attackers are smart enough to innovate their attacking strategies to expose vulnerabilities in the intrusion detection models or mitigation mechanisms. The history of DDoS attacks reflects that network and transport layers of the OSI model were the initial target of the attackers, but the recent history from the cybersecurity domain proves that the attacking momentum has shifted toward the application layer of the OSI model which presents a high degree of difficulty distinguishing the attack and benign traffics that make the combat against application-layer DDoS attack a sophisticated task. Striding for high accuracy with high DDoS classification recall is key for any DDoS detection mechanism to keep the reliability and trustworthiness of such a system. In this paper, a deep learning approach for application-layer DDoS detection is proposed by using an autoencoder to perform the feature selection and Deep neural networks to perform the attack classification. A popular benchmark dataset CIC DoS 2017 is selected by extracting the most appealing features from the packet flows. The proposed model has achieved an accuracy of 99.83% with a detection rate of 99.84% while maintaining the false-negative rate of 0.17%, which has the heights accuracy rate among the literature reviewed so far.

PROJECT REPORT ON OSI MODEL

The OSI model has been virtually for 30 years and still plays a viable part in understanding how networks communicate. In fact, it is now part of the networking vernacular. The Organization International de Normalization (International Standards Organization, or ISO), which has been developing international standards since 1946.Adopted in 1984, the OSI Basic Reference Model defines a network tracery consisting of seven layers in the communications process. Each layer is having its own responsibilities.

Osi Model: The Basics Structure of Network Communication

In the present time, if we see around the world we can realize that information transfer through one place to another is very easy. A person lives in America easy do business with the person live far away from it. All this can be achieved by the phenomenon known as Networking. And the device through which the information are transferred are called interconnected device. As we know, in present time our need is not only transfer or sharing of information but in a secure way. So with the help of this we are not just transferring the information but in a secure manner To understand the whole phenomenon of this networking, the basic requirement is OSI LAYER Model. This is not just a model but a complete frame which gives us whole information of its working as well as link between them. So through this paper we give some basics concept building of OSI LAYER which help in understanding the Networking

OSI MODEL FOR ORGANIZING COMPUTER NETWORKS

The main stages of development of the cryptographic protocols ssl/tls and ipsec.

The paper discusses the main stages of development of cryptographic protocols from SSL 2.0 (Secure Socket Layer) to TLS 1.3 (Transport Layer Security), which ensure the protection of transport layer data in the OSI model. A brief description of the modification of the RuTLS protocol based on TLS 1.3 and their main differences is given. The development of IPsec, which provides cryptographic protection of communications at the network level of the OSI model, is considered using examples of the development of the three most commonly used protocols. These include IKE (Internet Key Exchange), AH (Authentication Header), and ESP (Encapsulation Security Payload). For the SSL/TLS and IPsec specifications, the basic handshake protocols and the main stages of their development are considered. The described handshakes include primary cryptographic information exchange cycles in the form of identifiers of interaction participants, one-time numbers, lists of supported cryptographic combinations. Authentication of participants based on certificates, shared symmetric keys, data exchange for establishing a shared Diffie — Hellman secret, development of key material for secret keys of communication sessions, message authentication, and other cryptographic parameters are presented. For different versions of SSL/TLS and IPsec, the logical structures of application data cryptographic protection functions are described.

Data Transmission Model with Lost Fragments Recovery Based on Application Layer ARQ

Wireless networks in difficult conditions of signal receiving are characterized by a high level of burst data losses, at which a large number of data fragments can be lost in a row. In this case, to recover the lost data, the use of forward error correction methods (FEC) in most cases does not give a sufficient effect. The use of standard data loss recovery methods based on automatic retransmission request (ARQ) at the data link and transport layers of the OSI model can lead to significant delays, which is often unacceptable for real-time streaming services. In such a case, it may be preferable to skip the piece of data rather than delay waiting for the piece to be delivered on retransmissions. The use of ARQ-based techniques on application layer of OSI model for data streaming allows for a more efficient recovery of lost data chunks in wireless networks with a high level of burst losses. The known models of a discrete channel for wireless networks allow for analytically assessing the probability of data loss, however, they do not take into account cases with retransmission of lost data. The study proposes a mathematical model of data transmission in a wireless communication channel based on the Gilbert model, which takes into account the loss recovery by the ARQ method and allows you to calculate the data loss ratio. To check the adequacy of the proposed model, a software was developed that ensures the transmission of data streaming in a wireless communication network with recovery of fragment losses at the application level, and a corresponding experimental study was carried out. It is shown that the mathematical model takes into account the burstiness of transmitted data losses and their recovery by the ARQ method.

Network security in OSI model

Defining networks with the osi model, the architectural dynamics of encapsulated botnet detection (edm).

Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed to solve the divergent approach but the method of taking over servers and client systems is unabated. To solve this, we first identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its role in data exchange using OSI model was carried out. This further gave the needed proposal to the development of a High level architecture representing the structural mechanism and the defensive mechanism within network server so as to control the botnet trend. Finally, the architecture was designed to respond in a proactive state when scanning and synergizing the double data verification modules in an encapsulation manner within server system.

Analysis of Seven Layered Architecture of Osi Model

Export citation format, share document.

5G Security Challenges and Solutions: A Review by OSI Layers

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

research papers osi model

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center
  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Save to Library
  • Jadwal Semester Gasal Follow Following
  • Digital Library Follow Following
  • International Relations Follow Following
  • Business Follow Following
  • Neural Networks Follow Following
  • Redes y Telecomunicaciones Follow Following
  • Fuzzy Logic Follow Following
  • Moscow Follow Following
  • CCNA 4 Follow Following
  • Power System Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Publishing
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IMAGES

  1. OSI Model Reference Guide (With Examples)

    research papers osi model

  2. OSI Model Reference Guide (With Examples)

    research papers osi model

  3. The OSI model explained and how to easily remember its 7 layers

    research papers osi model

  4. 🌱 Osi model research paper. Osi Model Essay Example. 2022-11-09

    research papers osi model

  5. What is the OSI model and how it works?

    research papers osi model

  6. (PDF) THE OSI MODEL: OVERVIEW ON THE SEVEN LAYERS OF COMPUTER NETWORKS

    research papers osi model

VIDEO

  1. Never Kill These Eggs

  2. Pta nhi tha ki Desh ke liye khele ge 🔥😯 || Ft. @RanveerAllahbadia || #shorts #ranveerallahbadia

  3. LOVE IS ALL by Yanni

  4. Episodic Pivots Opportunity in Earnings Season

  5. रेलवे भर्ती परीक्षा पर रेल मंत्री का जवाब आया। Railway New Vacancy 2024

  6. GenAI Trends in 2024

COMMENTS

  1. The OSI reference model

    The OSI Reference Model is the highest level of abstraction in the OSI scheme. The paper first describes the basic building blocks used to construct the network model. Then the particular seven-layer model used by OSI is briefly described, followed by a discussion of outstanding issues and future extensions for the model.

  2. Open Systems Interconnect (OSI) Model

    This model of a framework for the development of an open communication system standard was adapted in 1984 and is known as the Open Systems Interconnect (OSI) Model. To establish this concept of sub-tasks for open system standard development, the idea of layering was used. Each small problem to solve, sub-task, was represented by a layer on a ...

  3. (PDF) The OSI reference model

    In 1977, the International Standards Organization (ISO) initiated work on Open Systems Interconnection (OSI) to address these requirements. This paper briefly describes the OSI Reference Model ...

  4. An Introduction of Open System Interconnection (OSI) Model and its

    The analytical model proposed in this paper aims at predicting the performance of software implementations which would be built according to the OSI basic reference model, The model uses the peer ...

  5. (PDF) Comparative Analysis of OSI and TCP/IP Models in Network

    Research Paper . Comparative Analysis of OSI and T CP/IP Models in Network . ... The OSI Model is a logical and conceptual model that defi nes network communication used by systems .

  6. Research based on OSI model

    OSI is an open access system interconnection reference model, is a very good agreement defined protocol specifications. OSI model has seven layers; each layer can have several sub-layers. According to the comparison of OSI and TCP/IP, and research based on the OSI model implementation models and protocols of the Internet, and the OSI model of data transmission between the layers.

  7. Analysis of Seven Layered Architecture of Osi Model

    OSI is an open access system interconnection reference model, is a generally excellent arrangement characterized protocol determinations. OSI model has seven layers; each layer can have a few sub-layers. Network reference models were created to address these difficulties. Two helpful reference models are Open System Interconnection (OSI).

  8. The OSI Model: An Overview

    The OSI Model: An Overview. This paper provides an overview of the Open Systems Interconnection (OSI) reference model which defines a hierarchical architecture that logically partitions the functions required to support system-to-system communication and has served as the most basic elements of computer networking since the... By. Rachelle Miller.

  9. PDF The OSI Model: Understanding the Seven Layers of Computer Networks

    Since the discussion of networking often includes talk of "extra layers",this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model. Although TCP/IP has been used for network communications before the adoption of the OSI model, it supports

  10. The OSI Model: An Overview

    This paper provides an overview of the Open Systems Interconnection (OSI) reference model which defines a hierarchical architecture that logically partitions the functions required to support system-to-system communication and has served as the most basic elements of computer networking since the... By. Rachelle Miller. September 13, 2001 ...

  11. (PDF) OSI Model

    2.1 OSI Model Architectur e. The model OSI or Open System Interconnection defines a networking environment for the pro . tocols to be implemented in seven levels. Control is transferred from one ...

  12. The Osi Model: Overview on The Seven Layers of Computer Networks

    ISSN 2348-1196 (print) International Journal of Computer Science and Information Technology Research ISSN 2348-120X (online) Vol. 2, Issue 3, pp: (461-466), Month: July - September 2014, Available at: www.researchpublish.com THE OSI MODEL: OVERVIEW ON THE SEVEN LAYERS OF COMPUTER NETWORKS Sumit Kumar, Sumit Dalal, Vivek Dixit Dept. of Computer Science Engineering, Dronacharya Collage of ...

  13. PDF Comparative Analysis of OSI and TCP/IP Models in Network Communication

    Table 3:COMPARISON BETWEEN OSI MODEL AND TCP/IP MODEL OSI Model TCP/IP Model It is developed by ISO (International Standard Organization) It is developed by ARPANET (Advanced Research Project Agency Network). OSI model provides a clear distinction between interfaces, services, and protocols. TCP/IP doesn't have any clear distinguishing points

  14. (PDF) The OSI Model: Understanding the Seven Layers of Computer

    OSI model is the basic fundamental to networking and computer science as a whole. It gives light to anyone dealing on computer science, whether a software developer or network administrator. The knowledge of OSI model helps in troubleshooting, and understanding how packets are being transferred from one layer to another and from one client to ...

  15. osi model Latest Research Papers

    The Organization International de Normalization (International Standards Organization, or ISO), which has been developing international standards since 1946.Adopted in 1984, the OSI Basic Reference Model defines a network tracery consisting of seven layers in the communications process. Each layer is having its own responsibilities.

  16. 5G Security Challenges and Solutions: A Review by OSI Layers

    In this paper, we provide an objective overview of 5G security issues and the existing and newly proposed technologies designed to secure the 5G environment. ... (OSI) layers and, for each layer, we discuss vulnerabilities, threats, security solutions, challenges, gaps and open research issues. While we discuss all seven OSI layers, the most ...

  17. Computer Networking Layers Based on the OSI Model

    Published by: The Mattingley Publishing Co., Inc. Layers of the OSI Model. 1. Physical Layer. → Enables physical devices for transmission and reception of data. → Establishment of a connection ...

  18. PDF Review of the OSI Model and TCP/IP Protocol Suite on Modern Network

    International Journal of Current Science Research and Review ISSN: 2581-8341 Volume 07 Issue 02 February 2024 DOI: 10.47191/ijcsrr/V7-i2-41, Impact Factor: 7.943 ... The four-layer Protocol Stack used by TCP/IP and the seven-layer OSI model are both examples of layered protocols. If you break the rules, it will be hard to talk to each other.

  19. Research based on OSI model

    The comparison of OSI and TCP/IP, and research based on theOSI model implementation models and protocols of the Internet, and the OSI model of data transmission between the layers. OSI is an open access system interconnection reference model, is a very good agreement defined protocol specifications. OSI model has seven layers; each layer can have several sub-layers.

  20. PDF THE OSI MODEL: OVERVIEW ON THE SEVEN LAYERS OF ...

    Although the OSI model was designed to replace all previous computer communications standards, it is no longer viewed as such a replacement. Rather, the OSI model has succeeded as a tool for describing and defining how heterogeneous network systems communicate. The OSI model is based on a widely accepted structuring technique called layering.

  21. Research based on OSI model

    According to the comparison of OSI and TCP/IP, and research based on the OSI model implementation models and protocols of the Internet, and the OSI model of data transmission between the layers [6 ...

  22. Osi Model Research Papers

    In this paper, it is pointed out that possible troubles on the related layer vary and possible troubles on each layer are categorized for functional network administration and they are standardized in an eligible way. The proposed model for network trouble shooting was developed considering the OSI model.