The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IP geolocation services are playing an increasingly important role in Web applications. Landmark-based IP geolocation can gain better IP geolocation performance. However, the accuracy of landmarks is still an urgent issue to address. The paper proposes a filtering landmark mechanism to guarantee the accuracy of landmarks. First, a Ping-Delay Coarse Filtering Landmark algorithm (PCFL) is proposed to...
In this paper, we describe a path-based intrinsic monitoring protocol that can efficiently associate SNMP based MIB information to a network path within a single administrative domain. Our method is based on intrinsic monitoring, a lightweight metric collection protocol that makes use of the IPv6 Router Alert hop-by-hop option. The main advantage of our approach is that operators can rapidly associate...
At present, many studies focus on the efficiency of handoff among different networks, while research on how to maintain the safety during registration process of handoff is not enough. Unfortunately, mobile node is vulnerable to various security threats and attacks when handover for being lack of protection. A security scheme based on the IPSec protocol which was combined with fast handoff signaling...
A fundamental challenge of efficient network planning and traffic engineering is being able to directly relate traffic flows to network paths. In this paper we propose a new approach for network monitoring which has the ability of directly relating traffic flows to network paths, termed Intrinsic Monitoring. The approach advocates storing node and link related metrics within the packet header structure...
The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need then to be updated. These updates may cause transient loops and link overflow, if they are not performed in an appropriate order. While existing proposals achieve loop-free updates, transient link overflow is still a problem...
Anycast paradigm has been widely adopted by Internet application to find nearby resources. The current IP anycast implementation suffers from poor scalability. To overcome that, this paper proposes Proxima, a network coordinates (NC) based application layer infrastructure, which is capable to provide lightweight and flexible anycast service. Proxima accurately chooses the best receiver from a group...
DNS amplification attacks utilize IP address spoofing and large numbers of open recursive DNS servers to perform the bandwidth consumption attack. During an attack, it ceaselessly fabricates DNS queries to the exploited open recursive DNS servers, and all the responses, often with larger size than the query messages, are reflected to the single victim due to the source IP address spoofing. While it...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.