The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the important role of packets in the network management and security applications, many researches have been applied to network packet. How to record and store the packets in an efficient structure is a problem in this field. This paper focuses on the study of network packet tagging technique. Based on existing research, this paper presents a tagging method using the attributes of data stream...
Network vulnerability assessment has carried out a certain degree of research work in relative field. The common method for vulnerability assessment is hierarchical asset vulnerability assessment, in which vulnerability value is fixed and the weight of service is subjective. Thus the accuracy of calculation depends on experience and judgment. In this paper, according to CVSS (Common Vulnerability...
This paper proposed an ARM-CPD scheme that is a simple but fast and effective approach to detect SYN flooding attacks. Instead of managing all real time ongoing traffic on the network, ARM-CPD only monitors the SYN packet and use it to predict the SYN packet in the near future to detect the SYN flooding attacks. To get the prediction SYN traffic, the autoregressive integrated moving average model...
Network risk assessment is an important method to monitor and forecast the security status of the network. The risk calculation is the key step and the result is the direct reference of the risk assessment. This paper prompts a service-based risk quantitative calculation method - SRQC of NGN. SRQC method includes a service-based layered risk calculation model, the quantitative process of assets, vulnerabilities...
The quality of service management-QoSM is a new conception from NGN service layer. To evaluate QoSM efficiently, it is necessary and elementary to define an evaluation metrics and find an evaluation method. First, the evaluation metrics for QoSM based on SLA service management contents is proposed. Then a fuzzy evaluating method to evaluate QoSM based on SLA-oriented service management metrics is...
This paper introduces a new domain-oriented distributed vulnerability scanning mechanism based on the studies of other vulnerability scanning systems, which have difficulties on dealing with network crossing, interceptor crossing and bottleneck effect, etc. After giving some description about domain-oriented distributed architecture, this paper introduces a SOA-like service providing mode. Following...
Service management is becoming more and more complicated in next generation network - NGN along with the fast NGN services' development. Present service management models can not satisfy the clear separation between service delivery and network provision. This paper proposes a novel universal NGN service layer management model - USMM, which is independent of network layer. USMM includes network state...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.