The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an Internet-scale network topology information (NTI) service named WIND for localizing P2P traffic. Central to WIND are the two simple ideas: 1) obtaining NTI directly from routing infrastructures, and 2) leveraging existing, widely deployed DNS caches for NTI delivery. WIND fulfills the fidelity, flexibility and scalability requirement of an effective NTI service. WIND is deployed in CERNET...
It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase. However, most existing network-based signatures are specific to exploit and can be easily evaded. In this paper, we propose generating vulnerability-driven signatures at network level without any host-level analysis of worm...
Our understanding of IPv6 usage is quite limited. In this paper, we carry out a detailed analysis of Netflow records collected from a China Tier-1 ISP. Many aspects related to traffic attributes and deployment issues are investigated: application types, transitional technologies, interface identifier assignment schemes, etc. Dominating of video streaming and P2P traffic as well as the widely use of...
Due to the complicated and ever-changing characteristics of Internet, network traffic prediction is a very complex and difficult issue in the network management and design. This paper shows a model with a new algorithm (MLSL), which updates the model parameters and improves the adaptive ability of the model. Generating self-similar series to simulate the network traffic and do some test, the experimental...
Network traffic anomaly detection is a difficult problem in network management. This paper presents a wavelet generalized likelihood ratio (WGLR) algorithm and an error performance detection (EPD) algorithm to solve this problem. WGLR algorithm combines generalized likelihood ratio (GLR) algorithm and wavelet transform method, and captures the failure point in real time. Error performance detection...
Current Internet research suffers from limited information available from public network traffic traces due to the privacy concern of ISP and lack of effective trace distribution systems. In this paper, we present our SANTT (sharing anonymized network traces) system to share valuable network traffic traces safely and widely. SANTT employs a novel prefix-preserving anonymization method to sanitize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.