Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jens Myrup Pedersen is active.

Publication


Featured researches published by Jens Myrup Pedersen.


2012 International Conference on Computing, Networking and Communications (ICNC) | 2012

A method for classification of network traffic based on C5.0 Machine Learning Algorithm

Tomasz Bujlow; M. Tahir Riaz; Jens Myrup Pedersen

Monitoring of the network performance in highspeed Internet infrastructure is a challenging task, as the requirements for the given quality level are service-dependent. Backbone QoS monitoring and analysis in Multi-hop Networks requires therefore knowledge about types of applications forming current network traffic. To overcome the drawbacks of existing methods for traffic classification, usage of C5.0 Machine Learning Algorithm (MLA) was proposed. On the basis of statistical traffic information received from volunteers and C5.0 algorithm we constructed a boosted classifier, which was shown to have ability to distinguish between 7 different applications in test set of 76,632-1,622,710 unknown cases with average accuracy of 99.3-99.9%. This high accuracy was achieved by using high quality training data collected by our system, a unique set of parameters used for both training and classification, an algorithm for recognizing flow direction and the C5.0 itself. Classified applications include Skype, FTP, torrent, web browser traffic, web radio, interactive gaming and SSH. We performed subsequent tries using different sets of parameters and both training and classification options. This paper shows how we collected accurate traffic data, presents arguments used in classification process, introduces the C5.0 classifier and its options, and finally evaluates and compares the obtained results.


IEEE\/OSA Journal of Optical Communications and Networking | 2012

Converged optical network and data center virtual infrastructure planning

Konstantinos Georgakilas; Anna Tzanakaki; Markos P. Anastasopoulos; Jens Myrup Pedersen

This paper presents a detailed study of planning virtual infrastructures (VIs) over a physical infrastructure comprising integrated optical network and data center resources with the aim of enabling sharing of physical resources among several virtual operators and services. Through the planning process, the VI topology and virtual resources are identified and mapped to the physical resources. Our study assumes a practical VI demand model without any in advance global knowledge of the VI requests that are handled sequentially. Through detailed integer linear program modeling, two objective functions - one that minimizes the overall power consumption of the infrastructure and one that minimizes the wavelength utilization - are compared. Both are evaluated for the virtual wavelength path and wavelength path optical network architectures. The first objective results in power consumption savings and the two optical network architectures provide similar performances. However, the trend changes for higher load values, due to the inefficient wavelength utilization that the first objective leads to. Finally, we compare the virtual infrastructures created by the two objectives through online traffic provisioning simulations. The objective minimizing wavelength utilization results in VIs suffering higher request blocking compared to the VIs created by the objective minimizing the overall power consumption.


2014 International Conference on Computing, Networking and Communications (ICNC) | 2014

An efficient flow-based botnet detection using supervised machine learning

Matija Stevanovic; Jens Myrup Pedersen

Botnet detection represents one of the most crucial prerequisites of successful botnet neutralization. This paper explores how accurate and timely detection can be achieved by using supervised machine learning as the tool of inferring about malicious botnet traffic. In order to do so, the paper introduces a novel flow-based detection system that relies on supervised machine learning for identifying botnet network traffic. For use in the system we consider eight highly regarded machine learning algorithms, indicating the best performing one. Furthermore, the paper evaluates how much traffic needs to be observed per flow in order to capture the patterns of malicious traffic. The proposed system has been tested through the series of experiments using traffic traces originating from two well-known P2P botnets and diverse non-malicious applications. The results of experiments indicate that the system is able to accurately and timely detect botnet traffic using purely flow-based traffic analysis and supervised machine learning. Additionally, the results show that in order to achieve accurate detection traffic flows need to be monitored for only a limited time period and number of packets per flow. This indicates a strong potential of using the proposed approach within a future on-line detection framework.


international conference on advanced communication technology | 2004

Topological routing in large-scale networks

Jens Myrup Pedersen; Thomas Phillip Knudsen; Ole Brun Madsen

A new routing scheme, Topological Routing, for large-scale networks is proposed. It allows for efficient routing without large routing tables as known from traditional routing schemes. It presupposes a certain level of order in the networks, known from. Structural QoS. The main issues in applying Topological Routing to large-scale networks are discussed. Hierarchical extensions are presented along with schemes for shortest path routing, fault handling and path restoration. Further research in the area is discussed and perspectives on the prerequisites for practical deployment of Topological Routing in large-scale networks are given.


Computer Communications | 2006

Applying 4-regular grid structures in large-scale access networks

Jens Myrup Pedersen; Ahmed Patel; Thomas Phillip Knudsen; Ole Brun Madsen

4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together with a straightforward planar layout. These qualities are to an increasing extent demanded also in large-scale access networks, but concerning protection and restoration these demands have been met only to a limited extent by the commonly used ring and tree structures. To deal with the fact that classical 4-regular grid structures are not directly applicable in such networks, this paper proposes a number of extensions concerning restoration, protection, scalability, embeddability, flexibility, and cost. The extensions are presented as a tool case, which can be used for implementing semi-automatic and in the longer term full automatic network planning tools.


telecommunications forum | 2011

Volunteer-based system for classification of traffic in computer networks

Tomasz Bujlow; Kartheepan Balachandran; M. Tahir Riaz; Jens Myrup Pedersen

To overcome the drawbacks of existing methods for traffic classification (by ports, Deep Packet Inspection, statistical classification) a new system was developed, in which the data are collected from client machines. This paper presents design of the system, implementation, initial runs and obtained results. Furthermore, it proves that the system is feasible in terms of uptime and resource usage, assesses its performance and proposes future enhancements.


applied sciences on biomedical and communication technologies | 2009

Strategies for the next generation green ICT infrastructure

M. Tahir Riaz; Jose M. Gutierrez; Jens Myrup Pedersen

Today, the global society is facing serious challenges in improving environmental performance, particularly with global warming, and resource management. Where the information and communication technology (ICT) industry is contributing to the global economy coupling with innovation and development of almost all the aspect of human life, but it also responsible for global CO2 emissions. In this paper, we provide a short survey of the challenges faced today of global warming by C02 emission related to global ICT infrastructure. The paper provides a number of strategies for greening ICT lead by the discussion and overall analysis.


2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015

Analysis of Malware behavior: Type classification using machine learning

Radu-Stefan Pirscoveanu; Steven Strandlund Hansen; Thor Mark Tampus Larsen; Matija Stevanovic; Jens Myrup Pedersen; Alexandre Czech

Malicious software has become a major threat to modern society, not only due to the increased complexity of the malware itself but also due to the exponential increase of new malware each day. This study tackles the problem of analyzing and classifying a high amount of malware in a scalable and automatized manner. We have developed a distributed malware testing environment by extending Cuckoo Sandbox that was used to test an extensive number of malware samples and trace their behavioral data. The extracted data was used for the development of a novel type classification approach based on supervised machine learning. The proposed classification approach employs a novel combination of features that achieves a high classification rate with a weighted average AUC value of 0.98 using Random Forests classifier. The approach has been extensively tested on a total of 42,000 malware samples. Based on the above results it is believed that the developed system can be used to pre-filter novel from known malware in a future malware analysis system.


2016 International Conference on Computing, Networking and Communications (ICNC) | 2016

An approach for detection and family classification of malware based on behavioral analysis

Steven Strandlund Hansen; Thor Mark Tampus Larsen; Matija Stevanovic; Jens Myrup Pedersen

Malware, i.e., malicious software, represents one of the main cyber security threats today. Over the last decade malware has been evolving in terms of the complexity of malicious software and the diversity of attack vectors. As a result modern malware is characterized by sophisticated obfuscation techniques, which hinder the classical static analysis approach. Furthermore, the increased amount of malware that emerges every day, renders a manual approach inefficient. This study tackles the problem of analyzing, detecting and classifying the vast amount of malware in a scalable, efficient and accurate manner. We propose a novel approach for detecting malware and classifying it to either known or novel, i.e., previously unseen malware family. The approach relies on Random Forests classifier for performing both malware detection and family classification. Furthermore, the proposed approach employs novel feature representations for malware classification, that significantly reduces the feature space, while achieving encouraging predictive performance. The approach was evaluated using behavioral traces of over 270,000 malware samples and 837 samples of benign software. The behavioral traces were obtained using a modified version of Cuckoo sandbox, that was able to harvest behavioral traces of the analyzed samples in a time-efficient manner. The proposed system achieves high malware detection rate and promising predictive performance in the family classification, opening the possibility of coping with the use of obfuscation and the growing number of malware.


ieee international conference on dependable, autonomic and secure computing | 2011

Assessing Measurements of QoS for Global Cloud Computing Services

Jens Myrup Pedersen; M. Tahir Riaz; Joaquim Celestino Júnior; Bozydar Dubalski; Damian Ledziński; Ahmed Patel

Many global distributed cloud computing applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of Quality of Service (QoS) in order to deliver and give a sufficiently smooth user experience. This would be essential for real-time streaming multimedia applications like online gaming and watching movies on a pay as you use basis hosted in a cloud computing environment. However, guaranteeing or even predicting QoS in global and diverse networks supporting complex hosting of application services is a very challenging issue that needs a stepwise refinement approach to be solved as the technology of cloud computing matures. In this paper, we investigate if latency in terms of simple Ping measurements can be used as an indicator for other QoS parameters such as jitter and throughput. The experiments were carried out on a global scale, between servers placed in universities in Denmark, Poland, Brazil and Malaysia. The results show some correlation between latency and throughput, and between latency and jitter, even though the results are not completely consistent. As a side result, we were able to monitor the changes in QoS parameters during a number of 24-hour periods. This is also a first step towards defining QoS parameters to be included in Service Level Agreements for cloud computing in the foreseeable future.

Collaboration


Dive into the Jens Myrup Pedersen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bozydar Dubalski

University of Technology and Life Sciences in Bydgoszcz

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge