The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel quality-of-service (QoS) management system for SDN networks with the feature of distributing bandwidth for applications in different slicing networks. Thus, the applications in different sliced networks (different divisions of an enterprise) can have different bandwidth management policies. The proposed system is also integrated into a vCPE framework to achieve network...
Network performance evaluation tools play important roles in network researches. However, most tools will cause highly CPU utilization and high monetary cost. Moreover, it is not easy to set up a test environment anytime and anywhere. To solve this problem, we build a lightweight network performance evaluation tool, SDNort, through the OpenFlow architecture. Through our evaluation tool, users can...
Zero-day attack is a critical network attack. The zero-day attack period (ZDAP) is the period from the release of malware/exploit until a patch becomes available. IDS/IPS cannot effectively block zero-day attacks because they use pattern-based signatures in general. This paper proposes a Prophetic Defender (PD) by which ZDAP can be minimized. Prior to actual attack, hackers scan networks to identify...
HTTP is the main protocol of the Internet and many network applications rely on it. Malware also utilizes it as a covert channel through which to evade the firewall (FW) or network intrusion detection system (NIDS). We recognize a malware, which employs HTTP to communicate as the HTTP-like Botnet. Some parts of the network traffic of an HTTP-like Botnet are different from normal HTTP applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.