Gamilla, Anazel P.
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

A discernment of round-robin vs SD-WAN load-balancing performance for campus area network Gamilla, Anazel P.; Tolentino, Anjela C.; Payongayong, Reina T.
Bulletin of Electrical Engineering and Informatics Vol 13, No 3: June 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i3.5945

Abstract

Efficient load balancing is crucial for optimizing network performance and ensuring seamless connectivity in modern campus area networks (CANs). With the proliferation of data-intensive applications and the increasing reliance on cloud-based services, organizations are seeking effective load-balancing solutions to distribute network traffic evenly across available resources. The continuous improvement of devices, tools, and techniques to cater a large amount of network traffic, started to be employed on different campuses. Understanding the best approach to maximize the utilization of the network resources is crucial in order to stabilize and maintain the network. The study aims to discern the round-robin and software defined-wide area network (SD-WAN) techniques based on defined metrics and conducted with a predefined payload for commonly used application conditions. The analysis shows that SD-WAN delivers a much superior performance than round-robin based on the criteria. The local area network (LAN) test shows difference between the two types of technology for the three given metrics. The WAN test shows that the round-robin has higher packet loss, latency, and jitter than the SD-WAN technology. While round-robin may suffice for small-scale deployments with relatively homogeneous traffic patterns, SD-WAN offers more sophisticated capabilities for larger CANs with diverse application workloads and distributed locations.
Probing the depths: assessing the efficacy of the two-tier deception-driven security model Gamilla, Anazel P.; Palaoag, Thelma D.; Naagas, Marlon A.
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1631-1639

Abstract

In the age characterized by relentless cyber threats, the need for innovative and proactive security measures has never been more important. Deception is defined as the deliberate structure of tricks, traps, and false information to mislead and discourage threats, while providing timely warning signals and useful information to defenders. The two-tier deception-driven security model's implementation focuses on applying deception security techniques to deceive potential attackers and protect network resources, with an emphasis on a proactive defense approach. The study emphasized the deployment and deep testing of the model, which aims to assess its efficacy and feasibility in real-time practice. The study shows that the two-layered approach effectively defends the network within the multiple layers using a combination of decoys, honeypots, and deceptive network segments. The deception security model effectively prevents and confuses potential threats, improving the network's overall resilience and threat defense capabilities. The findings suggest that integrating deception techniques into cybersecurity frameworks can provide a robust layer of protection against evolving cyber threats. Furthermore, this research contributes to the ongoing discourse on proactive cybersecurity strategies and offers practical insights for improving network defense mechanisms.