Browsing by Author "Tello Oquendo, Luis Patricio"
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Publication A diffusive propagation model for molecular communications: analysis and implementation in NS-3(Springer, Cham, 2021) Calderón Calderón, José Paúl; Zúñiga Gómez, Eddy Andrés; Tello Oquendo, Luis Patricio; Astudillo Salinas, Darwin Fabián; Tello Oquendo, Luis PatricioIn this research, the analysis and implementation of a diffusive propagation model for molecular communications are performed in NS-3. The work is based on the IEEE 1906.1-2015 standard recommendation, which seeks to create a reference framework for molecular communications. The standard provides a simulation module in NS-3, which contains only the components of the general structure of molecular communication and their interaction between them. The components mentioned are Message Carrier, Motion, Field, Perturbation, and Specificity. The transmitter uses CSK modulation. In the medium, Brownian motion (BM) with and without drift is used for the motion of the molecules, and intersymbol interference is considered. In the receiver, amplitude detection is used. The whole process is applied in four scenarios: Free BM, BM with drift, free BM bounded by the medium, and BM with drift bounded by the medium are considered. As a result, the pulse train of the mean concentration of molecules as a function of time at the receiver is obtained. In addition, the obtained results are compared with an investigation performed in N3Sim to validate the results. Finally, it is validated that the mean concentration at the receiver using the diffusive propagation model implemented complies with the mathematical model established by Fick’s second law.Item Análisis de algoritmos de aprendizaje máquina aplicados a la asignación de recursos en la red de acceso para redes 5G con segmentación(Universidad de Cuenca, 2023-09-26) Carabajo Avila, Sthefany Paola; Chimbo Vega, Michelle Giovanna; Astudillo Salinas, Darwin Fabián; Tello Oquendo, Luis PatricioThis degree project focuses on the study and improvement of the random access method in 5G networks, applying two approaches for the dynamic management of preambles. In this context, users request uplink resources by transmitting preambles, which are characterized by being orthogonal signatures. However, one problem that arises is the possible congestion and network collapse when multiple identical signa- tures are transmitted in a short period of time. The first method consists of the use of supervised learning by training a neural network using a set of data that contains in- formation about the preambles that have previously benefited the system during tests carried out. The neural network processes this information and generates outputs that indicate which preambles are best suited to avoid crashes and improve the probability of successful access to uplink resources. The second proposed method involves the use of reinforcement learning, which implements a policy for preamble management based on Q-learning. In this approach, a function called Q is used that evaluates ac- tions taken in specific states of the system. The system continually feeds itself back, reinforcing those choices that benefit the system’s performance and punishing those that harm it. In this way, the random access system can learn to allocate preambles more intelligently and effectively, adapting to network conditions and optimizing the utilization of available resources.Item Análisis e implementación en NS3 de un modelo de propagación difusivo para comunicaciones moleculares(Universidad de Cuenca, 2021-04-27) Calderón Calderón, José Paúl; Zúñiga Gómez, Eddy Andrés; Astudillo Salinas, Darwin Fabián; Tello Oquendo, Luis PatricioIn this research, analysis and implementation of a MPD for MCs are performed in NS-3. The work is based on the IEEE 1906.1-2015 standard recommendation, which seeks to create a reference framework for MCs. The standard provides a simulation module in NS-3, which contains only the general structure components of MC and their interaction. The components mentioned are Message Carrier, Motion, Field, Perturbation and Specifity. The research is focused on four aspects: Modulation, Molecules movement, Inter Symbol Interference, and Demodulation. For modulation, the Perturbation component is modified, and the CSK modulation is implemented, which releases a certain number of molecules depending on the transmitted bit. Concerning the molecules movement, the Brownian mathematical model is implemented within the motion component. Also, two types of BM are considered: simple and drifting. The former refers to a free molecular motion, and the latter refers to a motion influenced by the direction of the fluid in which it moves. On the other hand, the fundamental element in the simulation is the medium, which manages the components motion and field. Within the medium the ISI is implemented. This interference considers molecules that remain moving in the medium and arrive at the receiver out of time. Finally, for the demodulation, the receiver has been modified to use the amplitude-based molecule detection technique. This technique demodulates the information depending on the number of molecules that have arrived at a determined time. Free BM, BM with drift, free BM bounded by the medium, and BM with drift bounded by the medium are considered. In addition to the modifications made, a data collection model was implemented to analyze the results, where the movement of the molecules is captured and, if they reach the receptor, the time is recorded. As a result, the pulse train of the concentration of molecules as a function of time at the receiver is obtained. Also, the delay time, the amplitude of the number of molecules, the pulse width, and the channel capacity as a function of distance at the receiver are evaluated. Besides, the obtained results are validated with an investigation performed in N3Sim. Finally, it is corroborated that the receiver’s concentration using the MPD implemented complies with the mathematical model established by Fick’s second lawItem Implementación y evaluación de algoritmos de detección de botnets basados en técnicas DGA en la red de comunicación de un Instituto de Educación Superior (IES)(Universidad de Cuenca, 2023-08-03) Fernández Orellana, Erick Adrián; Quizhpe Quezada, Linder Flavio; Astudillo Salinas, Darwin Fabián; Tello Oquendo, Luis PatricioWith the constant evolution of telecommunications networks and the exponential increase in Internet traffic, it is necessary to prevent increasingly sophisticated cyberattacks. DGAs is a technique that allows for the automatic and covert generation of malicious domains to control Bots and execute these attacks. It is proposed to implement two Botnets detection algorithms based on DGAs: MaldomDetector and masked N-grams. These algorithms use supervised machine learning and rely on the extraction of lexical and statistical features from domain names. To carry out the detection of mAGDs, the BNDF framework will be used as a base. However, as BNDF does not provide real-time results, an early detection module was developed to optimize the framework’s operation based on the selected detection algorithms. Different test scenarios were designed in controlled environments and on a real network. In the controlled scenarios, various evaluation metrics were used to determine the detection performance of the algorithms. In real network tests, DNS requests were analyzed alongside the predictions made by the algorithms, with the aim of evaluating the accuracy of the predictions. Finally, the computational resource usage required by each algorithm was evaluated. Masked N-grams demonstrated excellent performance in terms of classification, achieving a value of 85.09 % in all metrics. MaldomDetector showed a better processing time with 1.38 ms per domain, making it the best option for networks with limited resources.Publication The Zero-day attack: deployment and evolution(2021) Merchán Lima, Jorge Luis; Tello Oquendo, Luis Patricio; Astudillo Salinas, Darwin Fabián; Riofrío Machado, Xavier FernandoIn cybersecurity and computer science, the term “zero-day” is commonly related to troubles, threats, and hazards due to the lack of knowledge, experience, or misunderstanding. A zero-day attack is generally considered a new vulnerability with no defense; thus, the possible attack will have a highrisk probability, and a critical impact. Unfortunately, only a few surveys on the topic are available that would help understand these threats, which are not enough to construct new solutions to detect, prevent, and mitigate them. In this paper, it is conducted a review of the zero-day attack, how to understand its real impact, and a few different accessible solutions nowadays. This study introduces a useful reference that provides researchers with knowledge to understand the current problem concerning zero- days attacks; hence they could develop solutions for facing them.
