Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the omnipresence of the Internet of Things and poorly secured devices with it in combination with high bandwidth networks, Distributed Denial of Service (DDoS) attacks have become one of the biggest threats for network security. With high bandwidth attacks flooding network infrastructure, the pressure to secure the attack targets shifts more and more to the network operators. Often without direct...
Since radio links in wireless body area networks (WBANs) commonly experience highly time-varying attenuation due to topology instability, communication protocols with fixed transmission power cannot produce a very good performance in terms of energy consumption, interference range, and communication reliability. We explain that how channel behaviourcan be modelled using Markov Chain. Then, a power-adaptive...
The worldwide distribution of IPv4 addresses is highly non-uniform. The factors that contribute to IPv4 address resources owned by a country remain unknown. In this paper, we systematically study the relationship between the number of allocated IPv4 addresses and 30 factors extracted from political, economic, ecological, social, and cultural dimensions. We observe that GDP has the largest influence...
Segment Routing (SR) can be used as a traffic engineering strategy to counteract increasing loads on networks like Internet Service Provider (ISP) backbones. Many SR approaches, however, optimize traffic flows that were measured in the past. This paper introduces a new tunnel training architecture. It aims to show that the results of these strategies can still be beneficial for routing new traffic...
The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially susceptible to denial-of-service (DoS) attacks. Due to the wireless communication medium, it is difficult to prevent attacks such as jamming. Hence, mechanisms to detect attacks during operation are required. The current generation of intrusion detection systems are still rather heavyweight, as some form...
Millimeter wave communication shows promise in realizing next generation wireless sensor networks for bandwidth demanding applications. Despite its support of multi Gbps data rates, MmWaves requires unobstructed line-of-sight and suffers from heavy path losses. Overcoming these in complex 3D environments requires sectored antenna arrays with narrow beam widths and adaptive beamforming. Therefore,...
Human activity patterns such as communication and cooperation rely in large parts on smartphone-based interaction. Day-to-day available communication means are taken for granted. But in scenarios where communication infrastructure is broken, such as in the aftermath of a disaster, communication establishment becomes crucial. In those post-disaster conditions ubiquitous mobile devices carried by humans...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
Communication overWireless Nanosensor Networks (WNSNs) is envisioned to experience different challenges due to having unique features such as specialized nano-antenna behavior, short transmission range, limited operating capabilities, etc. Among all these features, nano-antenna behavior plays a noteworthy role on overall network-level performance. To the best of our knowledge, the role is yet to be...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
Increasing use of online backup services, as well as the popularity of user-generated content, has increased the demand for bandwidth. However, traffic generated by these applications can impact on the responsiveness of delay-sensitive applications if they receive a 'fair-share' of the available bandwidth. Less-than-Best-Effort TCP congestion control mechanisms aim to allow lower-priority applications...
While many DDoS mitigation approaches utilize the flexibility of software-defined infrastructures in a decentralized fashion, most of them assume that the infrastructure as a whole is willing and capable of mitigating all incoming packets of an attack. Those approaches cannot be used out of the box, if the attack overburdens the infrastructure or the monetary budget for mitigation is limited. Therefore...
As a shared economy platform, Airbnb provides collaborative practices for customers and guides them to match with hosts' rooms. Based on the records and ratings, there is great significance attached to inferring the satisfaction between users and rooms. Several essential problems arise when evaluating satisfaction and matching. Data confidence and prediction bias influence the inference performance...
Prefix hijacking is a serious threat in the Internet routing landscape. The Border Gateway Protocol has no origin authentication by design. Countermeasures, e.g. on-top authentication as implemented by R-PKI infrastructures, are not yet deployed on a very large scale. Being victim of prefix hijacking is a difficult situation with few options. Not only the owner of a prefix is victim but all the networks...
Bonus point systems are widely used for rewarding customer loyalty in both traditional and electronic commerce scenarios. Merchants aim to additionally increase revenue by targeted advertising using customer data. At the same time, customers wish to protect their privacy of what they purchase. Common systems neither provide sufficient protection of privacy, nor protect the customers' identities. Anonymity...
The software-defined networking (SDN) paradigm promises greater control and understanding of enterprise network activities, particularly for management applications that need awareness of network-wide behavior. However, the current focus on switch-based SDNs raises concerns about data-plane scalability, especially when using fine-grained flows. Further, these switch-centric approaches lack visibility...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.