• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Data Analysis of Network Parameters for Secure Implementations of SDN-Based Firewall

    2023-12-15 03:56:44RizwanIqbalRashidHussainSheerazArifNadiaMustaqimAnsariandTayyabAhmedShaikh
    Computers Materials&Continua 2023年11期

    Rizwan Iqbal,Rashid Hussain,Sheeraz Arif,Nadia Mustaqim Ansari and Tayyab Ahmed Shaikh

    1Department of Telecommunication Engineering,Dawood University of Engineering&Technology,Karachi,Pakistan

    2Faculty of Engineering Sciences and Technology,Hamdard University,Karachi,Pakistan

    3Faculty of Information Technology,Salim Habib University,Karachi,Pakistan

    4Department of Electronic Engineering,Dawood University of Engineering&Technology,Karachi,Pakistan

    ABSTRACT Software-Defined Networking(SDN)is a new network technology that uses programming to complement the data plane with a control plane.To enable safe connection,however,numerous security challenges must be addressed.Flooding attacks have been one of the most prominent risks on the internet for decades,and they are now becoming challenging difficulties in SDN networks.To solve these challenges,we proposed a unique firewall application built on multiple levels of packet filtering to provide a flooding attack prevention system and a layer-based packet detection system.This study offers a systematic strategy for wrapping up the examination of SDN operations.The Mininet simulator examines the effectiveness of SDN-based firewalls at various network tiers.The fundamental network characteristics that specify how SDN should operate.The three main analytical measures of the network are jitter,response time,and throughput.During regular operations,their behavior evaluates in the standard SDN conditions of Transmission Control Protocol(TCP)flooding and User Datagram Protocol(UDP)flooding with no SDN occurrences.Low Orbit Ion Cannon(LOIC)is applied to launch attacks on the transmission by the allocated server.Wireshark and MATLAB are used for the behavioral study to determine how sensitive the parameters are used in the SDN network and monitor the fluctuations of those parameters for different simulated scenarios.

    KEYWORDS Software defined networking;firewall;POX controller;open v switch;Mininet;OpenFlow

    1 Introduction

    Due to several claims that rely on data-driven and reliable facts-sharing paradigms,data networks are becoming more prevalent.The Industrial Internet of Things(IIoT)and the Internet of Things(IoT)are the most dominant.As they develop and are exposed to increasingly unequal dynamic behavioral changes,current network architectures still have a management complexity problem.Software-Defined Networking(SDN)addresses the difficulty of managing contemporary data networks[1,2].

    Recent studies have examined several significant new technologies,including edge/fog computing,Blockchain (BC),SDN,IIoT,5G,Machine Learning (ML),and Wireless Sensor Networks (WSN).All these technologies offer data confidentiality,integrity,and authenticity in their respective use cases(particularly in the business sector).SDN provides infrastructure flexibility,while BC safeguards the privacy of smart IIOT services[3].

    SDNs perform separate control,management,and forwarding planes [4].To aid with this endeavor,SDNs enable openness.Most modern data networks are open,programmable,and adaptable.In a typical SDN,operators can dynamically configure network—device programs to ensure the best possible resource distribution and usage.The SDN controller stores all network information like topology,protocols,applications,and security parameters.This architecture permits forwarding devices in SDNs to implement an integrated interface for data interchange with the SDN controller.They obtain the operational state of the network for network operations such as traffic engineering.Giving to the literature,the critical issue in modern SDN-based architecture with the enlarged coding,flexible environment,and scalable like IoT and IIoT networks.All mentioned reasons increased vulnerability and compromised security results in the Distributed Denial of Service(DDoS)flooding attacks[5].

    Conventionally,DDoS attacks are well-planned attacks from several hacked hosts.They are directed at network nodes or end-user devices to steal their share of the available bandwidth or entirely shut them down.Researchers have launched DDoS flooding attacks in previous years.They are considered the most hazardous means of traffic on the internet.Hence,these flooding attacks are well investigated in the current body of literature [6,7].According to numerous researchers in this field,there is no standard technique to handle these types of attacks.Typically,attackers use a botnet to launch attacks.Consequently,device node operators on attacked networks frequently ignore that attacks originate from their hardware and network addresses[8].

    Modern SDNs are being researched by analyzing data network performance indicators and the many types of DDoS flooding attacks.As discussed further in Section 2,it remains a relatively grey area [9-11].Throughput,jitter,and response time measurements have been used in several research projects to assess the effectiveness and performance of SDNs.They are,therefore,maybe the most well-known SDN performance measures.Network administrators can identify and differentiate DDoS attacks on SDN platforms by analyzing the behavior of SDN performance indicators under common SDN DDoS states.

    Consequently,more effective mitigation strategies,action plans,and response plans are devised to ensure the consistency and accessibility of current and expectations of SDNs.This study uses the emulated network’s jitter,latency,and throughput to assess how DDoS flooding attack scenarios affect SDN performance[12-14].

    A firewall monitors network traffic and decides whether to allow or deny traffic based on predefined rules.Through time,it has provided network security.It also analyses every outgoing and incoming message and blocks those not complying with a predetermined set of restrictions.It aids in overcoming issues caused by attackers by employing various forms of attacks [15].Types of firewalls include Stateful and Stateless firewalls.Packets that fit into tracked links can be passed through a stateful firewall using attributes such as source and destination IP addresses,port numbers,and sequence numbers.Identify the communication path during the transfer of the packet.Packet encryption is also an option[16].It is safer than a stateless firewall regarding security and throughput for significant traffic volumes.Similarly,using its ruleset,a stateless firewall verifies and forwards all incoming packets.By using distinct dynamic criteria,machine learning algorithms will improve the capacity of security solutions for protecting the upcoming 5G and future networks[17].

    The SDN model demonstrated it in the literature,and the related dataset was analyzed and evaluated by a representative of actual SDN and SDN scenarios.As a result,additional research was conducted on the SDN model,and different data was extracted to describe the findings by evaluating the performance parameters of the SDN network through TCP and UDP protocols in the presence of DDoS attacks.Jitter,latency,and throughput are common SDN performance indicators that have been the focus of behavioral research on SDN operations.Reliable SDN performance indicators,including jitter,response time,and throughput,were subjected to regression-based sensitivity analysis(RSA).Determine their pairwise relationships for practical SDN operations.Low-cost,inferencedriven characterization and evaluation of SDN processes in practice[18-20].

    Security is a major problem because it was not adequately considered in the original design of the SDN architecture.Therefore,it is crucial to construct a reliable security mechanism to safeguard the network from both inside and outside threats without compromising the SDN’s intended function.To put it another way,defense-in-depth is typically regarded as a good solution for networks with varying degrees of trust.Authors who aimed to improve network safety were inspired to work with SDN technology because of its logical and centralized management.

    2 Related Work

    DDoS attacks launch against an SDN network’s infrastructure,control,and application layers;the consequences can be significantly more severe than in conventional networks.Therefore,for the immediate or real-time detection and evaluation of problematic SDN activities,it is necessary to conduct an interactive analysis of the performance metrics that serve as the foundation for the proper operation of SDN.Network performance measurements typically investigate the potential quality of service enhancement strategies in SDN environments.Examples include anticipating packet scheduler actions for hierarchical token buckets(HTB),stochastic fairness queueing(SFQ),and random early detection using different metrics values like response time and throughput of the SDN.Consequently,the HTB and SFQ packet scheduler was superior to the other evaluated typical response time and throughput designs.Even though the work accurately illustrates a specific fraction of SDN for qualityof-service monitoring,a comprehensive behavioral investigation of the SDN metrics has not been done[21,22].According to the researcher’s analysis,new types of attacks occurred in cloud systems,such as flow table overloading DDoS attacks.Flow table sharing is the proposed method to encounter defined attacks [23].There are many possibilities to reduce the effect of DDoS attacks in cloud computing,but DDoS attacks are still creating problems for researchers and host resources.This paper proposed a low-overhead effective operation for handling DDoS attacks.The proposed mechanism is based on the entropy value between DDoS attacks and normal traffic [24].Researchers intended a protective activity to detect such attacks by analyzing entropy values.Then,according to entropy values,the SDN-cloud-enabled online social network(OSN)will block that port to combat DDoS attacks[25].

    Performance parameters like jitter,latency,throughput,and packet loss investigate to enhance the SDN network’s quality.In every instance,the QoS-aware routing method (QRS) suggested and chose a route with minimum jitter,end-to-end delay,and greater throughput [26].However,illative evaluations of how SDN performance metrics change between states do not outperform experimental designs.We utilized Mininet and GNS3 to simulate and characterize both an SDN and a traditional network.It is important to compare the metrics used to measure the stability of SDN designs with those used to measure the strength of conventional network topologies.No behavioral evaluation of network performance measures[27]was provided,even though experimental latency analysis showed that the SDN provides a mean latency around three times lower than the legacy system.

    The researchers have reported a local sensitivity study of throughput,reaction time,and jitter measurements in different SDN conditions.Due to widespread DDoS flooding attacks against the SDN,the SDN’s throughput,jitter,and reaction time measurements are statistically sensitive to the transition from normal to abnormal operations.Jitter is the most sensitive SDN metric or parameter.As a result,there is a need for a comprehensive analytical approach that can assess the whole distributions and tendencies of SDN parameters and metrics.This study follow-up confirmed that SDN states effectively map to their significant performance metrics (numerical or continuous variables).All the classifiers we looked at to determine SDN states[28,29].

    Depending on specified rules,a firewall monitors network traffic and decides whether to allow or deny traffic.Over time,it has offered network security.Additionally,it looks at each incoming and outgoing message to prohibit any that do not adhere to a set of rules or standards.Employing various attacks aids in solving the issues brought forth by the attackers[30].Two categories of firewalls exist: stateful and stateless.Attributes of packets,such as source and destination IP addresses,port numbers,and sequence numbers,are utilized within tracked connections.A stateful firewall monitors the link.It identifies the communication path during packet transmission.Encrypting messages is another method[31].

    It is more secure than a stateless firewall regarding security and speed for considerable traffic volumes.In a stateless firewall,all incoming packets are similarly examined and forwarded according to the ruleset.The link never traces,as opposed to a stateful firewall.Based on source and destination IP addresses,network traffic is analyzed without knowledge of the traffic pattern or data flow[32].

    The architecture of ML-based intrusion detection systems(IDSs)for a better comprehension of recent forms of intrusion detection in SDNs and to provide major hints for future research in this area[33].Machine learning methods can strengthen detection rates,decline false alarm rates,and realistic processing and transmission values[34].

    The Graph connectivity method and several trust-based routing principles are used for Crossfire attack detection and mitigation.The norms are applied in the SDN switches for better bandwidth utilization[35].

    Based on the works,most current works in accessible literature provide solutions for boosting the quality of service to detect and categorize the status of the SDN in the face of attacks.To illustrate and draw inferences regarding the SDN’s behavior under stress,the author employs exploratory data analysis and regression-based sensitivity analysis,such as DDoS attacks.It offers a new paradigm and understanding for safeguarding the SDN in the face of attacks like DDoS.

    3 Methodology and Implementations

    This paper discusses the implementation of a firewall on the SDN POX controller that admits or rejects data traffic,including the MAC address,IP address,and port address.As shown in Fig.1,SDN functional structure with a firewall based on the application,control,and data layer.The application layer consists of different applications like routing,security,and others.The control layer manages TCP and UDP traffic flows in real-time.After receiving the data flow,the payload decided their route from source to destination.The information regarding network connectivity,like IP and port addresses of incoming and outgoing packets,session management and packet sequence management examined to establish the connection.Firewall rules are applied to the traffic flow by using a state table.The occurrence of every event because of the firewall rule is recorded and updated in the session table.Flow-based scheduling decreases path selection method and bandwidth surety for flows and expands scalability.The data layer uses OpenFlow switches to create topologies.

    Figure 1:SDN functional structure with firewall[30]

    Create SDN-based custom topology using open v switch to implement firewall rules on network layers 2,3,and 4.TCP and UDP scenarios are used to validate the firewall rules.After that,evaluate the system by measuring the performance of network parameters like round trip time,bandwidth utilization,latency,and data loss.To check the proposed firewall in the normal and under flooding attack scenario with throughput,response time,and jitter values.LOIC is applied to launch attacks on the transmission by the allocated server.The efficiency of the recommended network was determined by measuring the network’s throughput,latency,and response time.Comparing the performance results revealed the firewall-enabled controller as an SDN network environment with great potential,as shown in Fig.2.

    Figure 2:Flow graph of the proposed system

    As depicted in Fig.3,the custom topology employs a 180 GB HDD,8 GB RAM,2.4 GHz processor,and Linux as the operating system.On Ubuntu 16.04 LTS,the Mininet emulator 2.3.0 and the POX controller are installed.The experiment design Python considers nine OpenFlow switches and sixty-four associated hosts or end nodes to define topology and firewall rules.

    Figure 3:SDN-based topology

    Table 1 shows the configuration of IP addresses,MAC addresses,and port numbers of the controller,switches,and hosts.

    Table 1: Configuration of network nodes

    The following procedures are used to generate SDN data with custom firewall rules.Table 2 shows firewall rules for layer 2.

    Table 2: Layer 2 firewall rules for multiple devices

    Table 3 shows firewall rules for layer 3.

    Table 4 shows firewall rules for layer 4.

    Table 4: Layer 4 firewall rules for multiple devices

    Verify network connectivity across hosts using the “ping” command.For example,host 2 established a connection with host 4 by implementing firewall rules from Table 2,as shown in Fig.4.

    Figure 4:Connectivity between h2 and h4

    In the above scenario,host 2 blocks all traffic for all hosts.So,when the h2 ping h4 command runs,no packets are received,and there is 100%packet loss.Similarly,when pinging h6 from h3,16 containers were transmitted,and all 16 packages were obtained with 0%packet loss,as shown in Fig.5.

    Figure 5:Connectivity between h3 and h6

    It concludes that there is connectivity between h3 and h6 and no connectivity between h2 and h4.So,the POX controller blocks only the link for the desired hosts by implementing the firewall on layer 2.

    1.Using the “iperf”command,make UDP and TCP servers that will listen on various network ports.

    For example,Fig.6a shows node h3 as a TCP server,and Fig.6b shows hosts h4,h5,h6,h7,h10,h11,h16,and h17 as a client.According to the predefined rule mentioned in table no.4,port no.80 of h3(10.0.0.3)block for all other devices.In Fig.6b,all clients want to access port no.80 of h3(10.0.0.3),but the port is blocked for all users;there is no transmission,which is confirmed by Fig.6a.The server cannot listen to any transmission request on port no.80.All traffic destined to process h3 at port 80 is blocked.No data was sent on port 80 by the server h3.

    Figure 6a:h3 working as a server

    Figure 6b:Different hosts try to access port number 80 of h3

    Similarly,Figs.7a and 7b show that clients h4,h5,h6,h7,h10,h11,h16,and h17 access server h3 10.0.0.3 on port 22,the connection on port 22 from server connection establish.All the nodes working as clients have successfully approached port 22 of the h3 for 10 s and transferred data because port 22 is not a blocked-in custom firewall.

    Similarly,Fig.8 shows that client h1 accessed UDP server h3 10.0.0.3 on port 22,and the connection on port 22 from the server connection establish.h1 working as a client,has successfully approached port 22 of the h3 for 15 s and transferred data because port 22 is not a blocked-in custom firewall.

    2.Using ping queries from a different host of TCP,and UDP servers,monitoring throughput,jitter,and response time.GNUPLOT is used to make a graphical representation of SDN data.Those data are retrieved by using the CAT command of Mininet.

    Figure 7a:h3 working as a server

    Figure 7b:Different hosts try to access port number 22 of h3(TCP server)

    Figure 8:h3 working as a UDP server and h1 as a client

    4 Evaluations

    To evaluate the competence of the proposed firewall by using the ping command.Ping command measures round trip time(RTT),packet transmits,packet received,and packet loss.The comparisons have been made among the proposed firewall module and l2_learning transfer,which is a part of making OpenFlow switches act as a kind of l2_learning switches.

    After the implementation of the firewall,the following parameters measure to evaluate the performance of the proposed firewall.

    4.1 Round Trip Time(RTT)Evaluation

    Established on layer 3 firewall rule set up on POX controller,host 3 can ping host 4.Figs.9 and 10 show that host 3 effectively sent 10 ICMP messages to host 4 and got responses.Each output shows the same test output of POX with the firewall and without the firewall running.RTT is almost the same:9172 ms with a firewall and 9170 ms without a firewall running.In that manner,parsing packets and matching regulations no longer influence performance.

    Figure 9:ICMP traffic permitted from host 3 to host 4 with a firewall

    Figure 10:ICMP traffic permitted from host 3 to host 4 without a firewall

    4.2 Bandwidth Utilization

    4.2.1 TCP Flow

    A GNUPLOT shows a graphical representation of bandwidth utilization to estimate the bandwidth.The values are extracted by using the iperf command.One node is used as a server,and another as a client.Generate TCP flows without a firewall at port 80,as shown in Fig.11.Similarly,the iperf command generates TCP traffic by implementing a firewall at port 80,as shown in Fig.12.

    Figure 11:Bandwidth vs.time without a firewall(TCP flow)

    As shown in Figs.11 and 12,the data traffic appears for almost 100 s on the x-axis by accessing different clients.Consume bandwidth in Gbps is shown on the y-axis.Hence,it concludes that after implementing the proposed firewall,there is no significant consumption in bandwidth as compared to without a firewall for a TCP flow.

    Figure 12:Bandwidth vs.time with a firewall(TCP flow)

    4.2.2 UDP Flow

    To estimate the bandwidth,GNUPLOT is used to show a graphical representation of bandwidth utilization.The values are extracted by using the iperf command.One node is used as a server,and another as a client.Generate UDP flows without a firewall at port 80,as shown in Fig.13.Similarly,the iperf command generates UDP traffic by implementing a firewall at port 80,as shown in Fig.14.

    Figure 13:Bandwidth vs.time without a firewall(UDP flow)

    Figure 14:Bandwidth vs.time with a firewall(UDP flow)

    As shown in Figs.13 and 14,the data traffic appears for almost 100 s on the x-axis by accessing different clients.Consume bandwidth in Gbps is shown on the y-axis.Hence it is concluded that after implementing the proposed firewall,the graph shows a relatively small change in bandwidth consumption.Still,it shows that the proposed firewall has no adverse effect on bandwidth for UDP flow compared to the implementation of the firewall.

    4.3 Latency(Jitter)

    Latency or jitter is the time-dependent delay of data transmitted from sender to receiver.The values are extracted by using the iperf command.One node is used as a server,and another as a client.Generate UDP flows without a firewall at port 80,as shown in Fig.15.Similarly,the iperf command generates UDP traffic by implementing a firewall at port 80,as shown in Fig.16.

    As shown in Figs.15 and 16,the data traffic appears for almost 100 s on the x-axis by accessing different clients.The appearing jitter in (ms) shows on the y-axis.Hence it is concluded that after implementing the proposed firewall,the graph shows better results regarding minimum jitter values.It is a noticeable change in jitter values as compared to firewall implementations.

    4.4 Data Loss

    It is possible to see in Fig.4 that the data loss is 100%.All the packets sent from h2 to h4 are unreachable.It is clear from Fig.5 that there is a 0%packet loss from h3 to h6.All packets were received without loss.It is mentioned in firewall rules that there is no connectivity of h2 to any destination,so it shows 100%packet loss.

    Figure 15:Jitter vs.time without a firewall

    Figure 16:Jitter vs.time with a firewall

    5 Performance Measure Metrics of SDN

    Fig.3 shows the suggested network design with 64 hosts and 10 OpenFlow switches for testing on 8 GB RAM and Linux.Ubuntu 16.04 LTS Mininet emulates the POX controller.Host-switch throughput is 100 Mbps.“iperf”and “ping”check network node connectivity and data traffic.Six infected hosts employed Low Orbit Ion Cannon (LOIC) to DDoS the network server.TCP and UDP-based DDoS flooding attacks lasted 35 min.These attacks were tested for performance metrics.Network performance measurements forecast and prevent downtime.Table 5 shows the conventional behavior of performance parameters regarding different scenarios,i.e.,normal and attack in an SDN environment.

    Table 5: Conventional SDN setup

    Table 6 shows statistics of different network parameters in normal scenarios and attack scenarios.Changes in network parameters because of attacks indicate that the SDN is evolving.Therefore,the methodology described in Section 6 uses data analysis techniques in their behavioral investigation.

    Table 6: Statistics for Stp,Srt,and Sjt(over 2000 samples)for different operating scenarios

    6 Analysis&Discussion

    This section uses univariate,multivariate,and graphical methods to display and analyze the network parameters mentioned in Section 5.Data Science is the primary technique for data analysis.Using data analysis techniques,generate descriptive statistics and histograms for visualization and interpretation.Using a linear regression model to recognize and statistically for the pairwise relations between the Jitter (Sjt),the response time (Srt),and throughput (Stp) parameters of the emulated Scenario of SDN.For operating normally histogram shows a“Normal TCP Scenario”,“TCP attack scenario”,and“UDP Attack Scenario”.

    Throughput has shown in Fig.17 for“Normal TCP Scenario”,“TCP Attack Scenario”,“Normal UDP Scenario”,and “UDP Attack Scenario”.It impacts SDN DDoS flooding attacks.When the SDN was under a TCP attack,most metrics were spread around 0,compared to a range of 5 to 55 when it usually worked or under a UDP flooding attack.Stpdistribution did not alter under the SDNexposed UDP attack scenario.Stpis more vulnerable to TCP and UDP attacks since they flood the target server with repeated connection requests,using its network resources and DDoS valid requests.The UDP attack scenario,in which the targeted server checks and responds to every UDP packet,including spoofed ones,may not affectStp.

    Figure 17: (Continued)

    Figure 17:Stp metrics for various SDN scenarios

    Fig.18 shows jitter implications.It controls the“Normal TCP Scenario”,“TCP Attack Scenario”,“Normal UDP Scenario”,and “UDP Attack Scenario”.SDN TCP flooding did not affect jitter distribution.Instead of-0.6 to 0.6,most measurements are-4 to 8 in the“Normal UDP Scenario”and“UDP Attack Scenario”.Jitter is about timing and packet sequence in a typical SDN or a TCP flooding attack.The jitter will be considerable if packets arrive in intermittent or out-of-order clusters.UDP DDoS flooding attacks are more effective against jitter.

    Fig.19 shows response time conclusions.It controls the“Normal TCP Scenario”,“TCP Attack Scenario”,and altered response time distribution.TCP flooding attacks 0.02 to 0.16 against-40 to 40 in regular SDN operation.Hence,response time is a crucial network monitoring parameter,and DDoS flooding attacks can severely impact it,notably when packets must be acknowledged before being sent again.

    Figure 18: (Continued)

    Figure 18:Sjt metrics for various SDN scenarios

    Figure 19:Srt metrics for various SDN scenarios

    These recommendations may be incomplete,but it is anticipated that they will be enough to educate.As research and visualization of the indicators to show the performance of SDN,administrators,and operators are informed about similar attacks on the SDN.As discussed above,it can be the most recent studies extracted from the literature to provide methods for advancing the quality of service,identifying and categorizing the status of the SDN in the face of an attack like a DDoS flooding attack.Apply Regression-based sensitivity analysis in this work.The following sections are based on a more thorough inferential assessment of the network,a description to secure the network when anomalous state changes or transitions because of attacks like DDoS flooding.

    7 Conclusion

    This study analyzes the performance evaluation of firewalls by applying it to different network layers.Creating topology through the POX controller using four nodes and one OpenFlow switch on a Mininet simulation tool is highly significant for SDN research.We extract results in graphical form by using a GNUPLOT.After extensive simulation study has evaluated the bandwidth of TCP flow with and without firewall implementation,the bandwidth of UDP flows with and without firewall implementation,latency,roundtrip time (RTT),and packet loss parameters.Work demonstrates that the proposed firewall significantly influences bandwidth,roundtrip time,jitter,and packet loss.The findings give SDNs operator inference-based evaluation guidelines.Even if these rules are not exhaustive,they anticipate adequate notification of SDNs operators regarding the possibility of an SDN attack based on the study and analysis of SDN performance indicators.In the future,different other controllers like RYU,Floodlight,and NOX will be used.Also,generate application layer firewall rules.Real-world,real-time SDN data will validate the investigations and findings presented in this work and serve as the foundation for creating comprehensive guidelines for SDN administrators and operators.

    Acknowledgement:This work is an expanded version of“Towards Secure Implementations of SDNBased Firewall,”which appeared in the Journal of Independent Studies and Research Computing,20(2),40-47,2022.This research supported by Akinsolu,M.O.,Sangodoyin,A.O.,and Uyoata,U.E.,“Behavioral Investigation of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis,”Mathematics,10(14),2536.This research is part of the author’s Ph.D.dissertation at Hamdard University.The results were implemented on the MININET emulator from the GitHub Community Forum and online-accessible functions and procedures for the initial implementation.

    Funding Statement:This research is supported in part by the Research Committee of Hamdard University Karachi Pakistan(www.hamdard.edu.pk)and the Office of Research Innovation&Commercialization(ORIC)of Dawood University of Engineering&Technology Karachi Pakistan(www.duet.edu.pk).

    Author Contributions:The author’s contribution to the paper is as follows: study conception and design:R.Iqbal and R.Hussain;data collection:R.Iqbal and R.Hussain;analysis and interpretation of results:R.Iqbal,S.Arif and N.M.Ansari;draft manuscript preparation:R.Iqbal,N.M.Ansari and T.A.Shaikh.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:This research is part of the author’s Ph.D.dissertation at Hamdard University.Due to the nature of this research,participants of this study did not agree for their data to be shared publicly and only available upon reasonable request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    97超级碰碰碰精品色视频在线观看| 午夜a级毛片| 亚洲自拍偷在线| 日韩 欧美 亚洲 中文字幕| 美女午夜性视频免费| 日韩欧美三级三区| 90打野战视频偷拍视频| 国产成人影院久久av| 国产精品美女特级片免费视频播放器 | 男女做爰动态图高潮gif福利片| 99热只有精品国产| 国产精品久久久久久人妻精品电影| 后天国语完整版免费观看| 99久久国产精品久久久| 亚洲天堂国产精品一区在线| 91九色精品人成在线观看| 少妇 在线观看| av天堂在线播放| 1024香蕉在线观看| 黄频高清免费视频| 母亲3免费完整高清在线观看| 在线观看免费日韩欧美大片| 熟女少妇亚洲综合色aaa.| 夜夜躁狠狠躁天天躁| 国产精品亚洲美女久久久| 欧美亚洲日本最大视频资源| 91麻豆精品激情在线观看国产| 亚洲九九香蕉| 国产成人一区二区三区免费视频网站| 日韩大尺度精品在线看网址| 国产亚洲精品久久久久久毛片| 精品久久久久久,| 哪里可以看免费的av片| 又大又爽又粗| 中出人妻视频一区二区| 国产成+人综合+亚洲专区| 一进一出抽搐gif免费好疼| 日本 av在线| 丝袜美腿诱惑在线| 精品久久蜜臀av无| 亚洲精品一卡2卡三卡4卡5卡| 男人舔女人下体高潮全视频| 午夜福利在线观看吧| 国产97色在线日韩免费| 黄色毛片三级朝国网站| 丝袜在线中文字幕| 一二三四社区在线视频社区8| 亚洲国产精品成人综合色| 午夜激情福利司机影院| 黄色丝袜av网址大全| 香蕉久久夜色| 最好的美女福利视频网| 国产一区二区三区在线臀色熟女| 嫁个100分男人电影在线观看| 中出人妻视频一区二区| 欧美日韩瑟瑟在线播放| 亚洲成人久久性| 少妇粗大呻吟视频| 变态另类丝袜制服| 1024手机看黄色片| 亚洲精品国产一区二区精华液| 欧美日本视频| 成人国产一区最新在线观看| 久久香蕉国产精品| 黄色片一级片一级黄色片| 中文字幕最新亚洲高清| 757午夜福利合集在线观看| www.自偷自拍.com| 亚洲久久久国产精品| 最近最新中文字幕大全免费视频| 久久精品国产99精品国产亚洲性色| 色播在线永久视频| 免费看a级黄色片| 成人免费观看视频高清| 亚洲人成电影免费在线| 麻豆一二三区av精品| 侵犯人妻中文字幕一二三四区| 国产亚洲精品第一综合不卡| 一夜夜www| 日韩一卡2卡3卡4卡2021年| 国产成人av激情在线播放| 婷婷精品国产亚洲av| 亚洲欧美日韩无卡精品| 欧美zozozo另类| 欧美中文日本在线观看视频| 亚洲一区二区三区不卡视频| 亚洲自拍偷在线| 亚洲中文av在线| 欧美成狂野欧美在线观看| www.熟女人妻精品国产| 黄网站色视频无遮挡免费观看| 久久欧美精品欧美久久欧美| 国产黄a三级三级三级人| 一区二区三区精品91| 国产成人啪精品午夜网站| 岛国在线观看网站| 日韩精品免费视频一区二区三区| 中亚洲国语对白在线视频| 色综合欧美亚洲国产小说| 女人爽到高潮嗷嗷叫在线视频| 国内少妇人妻偷人精品xxx网站 | 成人18禁高潮啪啪吃奶动态图| 免费在线观看视频国产中文字幕亚洲| 日本免费一区二区三区高清不卡| 亚洲精品美女久久av网站| 91国产中文字幕| 久久草成人影院| 黑人操中国人逼视频| 日韩免费av在线播放| 国产主播在线观看一区二区| 精品国产乱码久久久久久男人| 老司机福利观看| 一级黄色大片毛片| 女性生殖器流出的白浆| 亚洲一区高清亚洲精品| 一级黄色大片毛片| 一个人免费在线观看的高清视频| 亚洲精品国产一区二区精华液| 亚洲人成网站在线播放欧美日韩| 嫩草影院精品99| 可以免费在线观看a视频的电影网站| 美女国产高潮福利片在线看| 天堂动漫精品| 国产单亲对白刺激| 一边摸一边做爽爽视频免费| 天天添夜夜摸| 中文在线观看免费www的网站 | 在线永久观看黄色视频| 中文字幕精品亚洲无线码一区 | 亚洲精品粉嫩美女一区| 精品午夜福利视频在线观看一区| 久热爱精品视频在线9| 88av欧美| 成年女人毛片免费观看观看9| 手机成人av网站| 国产片内射在线| 国产成人av激情在线播放| 成人国产一区最新在线观看| 国产黄色小视频在线观看| 99热这里只有精品一区 | 非洲黑人性xxxx精品又粗又长| 欧美另类亚洲清纯唯美| 99久久久亚洲精品蜜臀av| 午夜a级毛片| 国产成人精品无人区| 中文字幕最新亚洲高清| 女人高潮潮喷娇喘18禁视频| 免费看十八禁软件| 看黄色毛片网站| 亚洲精品一区av在线观看| 男女视频在线观看网站免费 | 一区二区三区激情视频| 99在线人妻在线中文字幕| 免费在线观看亚洲国产| 午夜两性在线视频| 叶爱在线成人免费视频播放| 老司机福利观看| 亚洲五月色婷婷综合| 久久国产精品男人的天堂亚洲| 国产1区2区3区精品| 亚洲国产欧美网| 亚洲中文字幕一区二区三区有码在线看 | 国产一级毛片七仙女欲春2 | 最近最新中文字幕大全电影3 | 国产色视频综合| 色播在线永久视频| 日韩欧美三级三区| 国产v大片淫在线免费观看| 少妇 在线观看| 国产午夜精品久久久久久| 久久久久久亚洲精品国产蜜桃av| 一区二区三区激情视频| а√天堂www在线а√下载| 精品久久久久久久久久久久久 | 十八禁人妻一区二区| 一进一出抽搐动态| 亚洲精品一卡2卡三卡4卡5卡| 日本精品一区二区三区蜜桃| 成人亚洲精品av一区二区| 999久久久精品免费观看国产| 90打野战视频偷拍视频| 国产人伦9x9x在线观看| 亚洲国产精品999在线| 桃红色精品国产亚洲av| 国产成+人综合+亚洲专区| 宅男免费午夜| 成人国语在线视频| 婷婷精品国产亚洲av| 亚洲精品国产精品久久久不卡| 国产单亲对白刺激| 亚洲全国av大片| 满18在线观看网站| 黄色毛片三级朝国网站| 一进一出好大好爽视频| www国产在线视频色| 精品少妇一区二区三区视频日本电影| 叶爱在线成人免费视频播放| 99精品在免费线老司机午夜| 色综合亚洲欧美另类图片| 久久久精品国产亚洲av高清涩受| 777久久人妻少妇嫩草av网站| 在线天堂中文资源库| 婷婷丁香在线五月| 亚洲av成人不卡在线观看播放网| av超薄肉色丝袜交足视频| 国产精品电影一区二区三区| 亚洲片人在线观看| 首页视频小说图片口味搜索| 久久久久久九九精品二区国产 | 日韩欧美在线二视频| 午夜福利高清视频| 禁无遮挡网站| av免费在线观看网站| 久久久久久国产a免费观看| 特大巨黑吊av在线直播 | 十分钟在线观看高清视频www| 麻豆成人av在线观看| 成人亚洲精品一区在线观看| 人人澡人人妻人| 一级a爱片免费观看的视频| 两性夫妻黄色片| 欧美国产精品va在线观看不卡| 久久精品影院6| 精品欧美一区二区三区在线| 亚洲专区中文字幕在线| 日韩大码丰满熟妇| 成人国产综合亚洲| 琪琪午夜伦伦电影理论片6080| www.精华液| 国产精品综合久久久久久久免费| 国产精品久久久久久人妻精品电影| 精品久久久久久久人妻蜜臀av| 欧美黑人精品巨大| 国产区一区二久久| 999久久久国产精品视频| a级毛片在线看网站| 午夜日韩欧美国产| 老汉色av国产亚洲站长工具| 久久久久精品国产欧美久久久| 自线自在国产av| 久久天躁狠狠躁夜夜2o2o| 99久久99久久久精品蜜桃| 亚洲,欧美精品.| 成人国语在线视频| 99国产极品粉嫩在线观看| 嫁个100分男人电影在线观看| 欧美绝顶高潮抽搐喷水| 19禁男女啪啪无遮挡网站| 欧美另类亚洲清纯唯美| 午夜免费成人在线视频| 女警被强在线播放| 亚洲中文字幕一区二区三区有码在线看 | 亚洲最大成人中文| av有码第一页| 法律面前人人平等表现在哪些方面| 天天躁夜夜躁狠狠躁躁| 欧美成狂野欧美在线观看| 欧美日韩瑟瑟在线播放| 国产精品日韩av在线免费观看| 国产精品永久免费网站| 亚洲国产看品久久| 久久久国产成人精品二区| 999精品在线视频| 国产黄色小视频在线观看| 99热这里只有精品一区 | 欧美乱码精品一区二区三区| 久久久久久久午夜电影| 淫妇啪啪啪对白视频| 国产一区在线观看成人免费| 亚洲成a人片在线一区二区| 国产午夜福利久久久久久| 日日干狠狠操夜夜爽| 黄色毛片三级朝国网站| 在线天堂中文资源库| 亚洲第一电影网av| 午夜福利欧美成人| 亚洲一区高清亚洲精品| 一区二区三区高清视频在线| 69av精品久久久久久| 亚洲中文日韩欧美视频| 欧美午夜高清在线| 欧美国产日韩亚洲一区| 午夜a级毛片| 两人在一起打扑克的视频| 一级黄色大片毛片| 亚洲中文av在线| 国产97色在线日韩免费| 欧美又色又爽又黄视频| 啪啪无遮挡十八禁网站| 淫妇啪啪啪对白视频| 丰满的人妻完整版| 精品久久久久久成人av| 在线观看一区二区三区| 亚洲第一欧美日韩一区二区三区| 天天躁狠狠躁夜夜躁狠狠躁| 日本撒尿小便嘘嘘汇集6| 亚洲中文字幕一区二区三区有码在线看 | 日韩 欧美 亚洲 中文字幕| 97超级碰碰碰精品色视频在线观看| 亚洲成人久久性| 十八禁人妻一区二区| 欧美不卡视频在线免费观看 | 婷婷丁香在线五月| 18禁黄网站禁片免费观看直播| 99久久国产精品久久久| 国产精品1区2区在线观看.| 日韩三级视频一区二区三区| xxxwww97欧美| 精品久久久久久久人妻蜜臀av| 亚洲av成人不卡在线观看播放网| 嫁个100分男人电影在线观看| 白带黄色成豆腐渣| а√天堂www在线а√下载| 久久精品国产综合久久久| 亚洲熟妇熟女久久| 一级毛片精品| 国产一区二区激情短视频| 我的亚洲天堂| 免费高清视频大片| 久久青草综合色| 国产私拍福利视频在线观看| 亚洲精品国产一区二区精华液| 天天躁狠狠躁夜夜躁狠狠躁| www国产在线视频色| 人人妻人人澡欧美一区二区| 三级毛片av免费| 老熟妇仑乱视频hdxx| 国产亚洲av嫩草精品影院| 变态另类成人亚洲欧美熟女| av超薄肉色丝袜交足视频| 又黄又爽又免费观看的视频| 亚洲国产精品成人综合色| 亚洲最大成人中文| 免费人成视频x8x8入口观看| 777久久人妻少妇嫩草av网站| 国产成人精品无人区| 天堂影院成人在线观看| 午夜福利一区二区在线看| 91麻豆av在线| 亚洲国产看品久久| 亚洲国产精品久久男人天堂| 国产精品久久久人人做人人爽| 成人三级做爰电影| 国产主播在线观看一区二区| 美女扒开内裤让男人捅视频| 久久精品国产亚洲av香蕉五月| 精品午夜福利视频在线观看一区| av在线播放免费不卡| 欧美一级毛片孕妇| 亚洲片人在线观看| 精品久久久久久久久久久久久 | 国产成人av教育| 欧美一区二区精品小视频在线| 俺也久久电影网| 两性午夜刺激爽爽歪歪视频在线观看 | av在线天堂中文字幕| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品一区av在线观看| 国产精品精品国产色婷婷| 黑人欧美特级aaaaaa片| 亚洲国产看品久久| 嫁个100分男人电影在线观看| 91九色精品人成在线观看| 宅男免费午夜| 亚洲男人天堂网一区| 香蕉丝袜av| 麻豆一二三区av精品| 久久99热这里只有精品18| 两人在一起打扑克的视频| 国产99白浆流出| 香蕉丝袜av| 久久午夜综合久久蜜桃| 亚洲欧美日韩无卡精品| 成人手机av| 亚洲国产日韩欧美精品在线观看 | 久久久久久久午夜电影| 人人澡人人妻人| 国产精品久久久久久精品电影 | 日本成人三级电影网站| 久久久久久久午夜电影| 国产激情久久老熟女| 男人舔女人的私密视频| av超薄肉色丝袜交足视频| 色播在线永久视频| 亚洲成人国产一区在线观看| 亚洲成国产人片在线观看| 一区二区三区精品91| 岛国在线观看网站| 色综合站精品国产| 亚洲天堂国产精品一区在线| 国产精品久久久av美女十八| 别揉我奶头~嗯~啊~动态视频| 女性被躁到高潮视频| 精品久久久久久久毛片微露脸| 91大片在线观看| 巨乳人妻的诱惑在线观看| 久久香蕉激情| av免费在线观看网站| 免费观看人在逋| 亚洲 欧美一区二区三区| 久久精品aⅴ一区二区三区四区| 国产亚洲欧美98| 久久婷婷成人综合色麻豆| 欧美日韩乱码在线| 午夜免费鲁丝| 黄色女人牲交| 国产麻豆成人av免费视频| 欧美成人午夜精品| 精品国产乱码久久久久久男人| 成人18禁高潮啪啪吃奶动态图| 村上凉子中文字幕在线| 久久久国产成人免费| 国产精品一区二区精品视频观看| 欧美性猛交╳xxx乱大交人| 高潮久久久久久久久久久不卡| 99re在线观看精品视频| 久久这里只有精品19| 999精品在线视频| 久久精品成人免费网站| 欧美性长视频在线观看| av有码第一页| 欧美久久黑人一区二区| 亚洲精品久久成人aⅴ小说| 国产日本99.免费观看| 久久婷婷成人综合色麻豆| 久久精品成人免费网站| 国产精品国产高清国产av| 久久久精品欧美日韩精品| 欧美最黄视频在线播放免费| 国产免费av片在线观看野外av| 老司机福利观看| 日韩成人在线观看一区二区三区| 国产亚洲欧美98| 中文字幕人成人乱码亚洲影| 午夜久久久久精精品| 又黄又爽又免费观看的视频| 免费人成视频x8x8入口观看| 久久久久久免费高清国产稀缺| 国产欧美日韩一区二区精品| 午夜免费成人在线视频| 亚洲avbb在线观看| 日本精品一区二区三区蜜桃| netflix在线观看网站| 亚洲熟妇中文字幕五十中出| 香蕉国产在线看| 精品熟女少妇八av免费久了| 一级a爱视频在线免费观看| 狠狠狠狠99中文字幕| 久久久久久久久中文| 天堂动漫精品| 国产精品永久免费网站| av欧美777| 国产成人欧美在线观看| 男人舔奶头视频| 一区二区三区精品91| 激情在线观看视频在线高清| 免费高清在线观看日韩| 成人一区二区视频在线观看| 日韩欧美三级三区| 欧美国产日韩亚洲一区| 在线视频色国产色| 国产极品粉嫩免费观看在线| 国产99白浆流出| 久久久久九九精品影院| 国产精品99久久99久久久不卡| 日本a在线网址| 国产伦在线观看视频一区| a级毛片a级免费在线| 国产激情偷乱视频一区二区| 天堂动漫精品| 国产在线精品亚洲第一网站| 午夜免费观看网址| 国产97色在线日韩免费| 日韩 欧美 亚洲 中文字幕| 国产aⅴ精品一区二区三区波| 久久精品影院6| 欧美乱码精品一区二区三区| 色精品久久人妻99蜜桃| 精品电影一区二区在线| 成人国语在线视频| 亚洲第一青青草原| 亚洲第一青青草原| 9191精品国产免费久久| 国产精品久久久久久人妻精品电影| 国产午夜福利久久久久久| 中文字幕人妻熟女乱码| www日本黄色视频网| 亚洲欧洲精品一区二区精品久久久| 变态另类丝袜制服| 欧美精品啪啪一区二区三区| 大香蕉久久成人网| 亚洲av成人不卡在线观看播放网| 日韩欧美在线二视频| 国产av不卡久久| 久久久久免费精品人妻一区二区 | 国产又黄又爽又无遮挡在线| 久久久精品欧美日韩精品| 国产精品99久久99久久久不卡| 99在线视频只有这里精品首页| 久久人人精品亚洲av| 国产精品永久免费网站| 女性生殖器流出的白浆| 777久久人妻少妇嫩草av网站| 麻豆成人午夜福利视频| 美女午夜性视频免费| 淫妇啪啪啪对白视频| 丝袜美腿诱惑在线| 成人特级黄色片久久久久久久| 免费在线观看成人毛片| 婷婷六月久久综合丁香| 精品高清国产在线一区| 国产精品久久视频播放| 欧美+亚洲+日韩+国产| www.精华液| 国产一区二区激情短视频| 亚洲一区中文字幕在线| 麻豆国产av国片精品| 亚洲成人精品中文字幕电影| 九色国产91popny在线| 一个人免费在线观看的高清视频| 国产精品99久久99久久久不卡| 欧美日韩福利视频一区二区| 午夜福利欧美成人| 日日摸夜夜添夜夜添小说| 欧美在线一区亚洲| 色哟哟哟哟哟哟| 91麻豆av在线| 国产av不卡久久| 欧美激情久久久久久爽电影| 国产欧美日韩一区二区精品| 精品久久久久久,| 久久久久久久久免费视频了| 叶爱在线成人免费视频播放| 动漫黄色视频在线观看| 久久草成人影院| 国产欧美日韩精品亚洲av| 天天一区二区日本电影三级| 精品欧美国产一区二区三| 亚洲精品一区av在线观看| 国产又黄又爽又无遮挡在线| 中文字幕另类日韩欧美亚洲嫩草| 日韩中文字幕欧美一区二区| 在线看三级毛片| 久久中文看片网| 女人爽到高潮嗷嗷叫在线视频| 嫁个100分男人电影在线观看| 亚洲美女黄片视频| 夜夜躁狠狠躁天天躁| 两个人视频免费观看高清| 少妇粗大呻吟视频| 欧洲精品卡2卡3卡4卡5卡区| 久久久久久久午夜电影| 少妇 在线观看| 两人在一起打扑克的视频| 欧美黄色片欧美黄色片| 两性午夜刺激爽爽歪歪视频在线观看 | 免费看美女性在线毛片视频| 搡老熟女国产l中国老女人| 久久人妻福利社区极品人妻图片| 久久精品亚洲精品国产色婷小说| 日本a在线网址| 侵犯人妻中文字幕一二三四区| 欧美成狂野欧美在线观看| 日韩欧美国产一区二区入口| 国产亚洲欧美98| 久久国产精品男人的天堂亚洲| 亚洲欧洲精品一区二区精品久久久| 日韩视频一区二区在线观看| 熟女电影av网| aaaaa片日本免费| 岛国视频午夜一区免费看| 在线十欧美十亚洲十日本专区| 麻豆av在线久日| 村上凉子中文字幕在线| 一级毛片女人18水好多| 母亲3免费完整高清在线观看| 欧美又色又爽又黄视频| 两个人看的免费小视频| 51午夜福利影视在线观看| 亚洲专区国产一区二区| 十分钟在线观看高清视频www| 十八禁网站免费在线| 亚洲色图av天堂| 日本撒尿小便嘘嘘汇集6| 亚洲成av片中文字幕在线观看| 国产精品国产高清国产av| 欧美成狂野欧美在线观看| av在线播放免费不卡| 亚洲av成人一区二区三| 亚洲成av人片免费观看| 久久精品夜夜夜夜夜久久蜜豆 | 国产99久久九九免费精品| 国产精品自产拍在线观看55亚洲| 亚洲午夜精品一区,二区,三区| 大香蕉久久成人网| 精品电影一区二区在线| 两性午夜刺激爽爽歪歪视频在线观看 | 久久久国产成人免费| 两个人免费观看高清视频| 国产伦一二天堂av在线观看| 国产欧美日韩一区二区精品| 久久99热这里只有精品18| 中文字幕精品免费在线观看视频| 欧美日韩福利视频一区二区| 国产91精品成人一区二区三区| 一本大道久久a久久精品| 久99久视频精品免费| 久久精品国产清高在天天线| 成人永久免费在线观看视频| 精品熟女少妇八av免费久了| 国产私拍福利视频在线观看| 亚洲国产精品合色在线| 日韩一卡2卡3卡4卡2021年| 天堂√8在线中文| 亚洲五月色婷婷综合|