The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. However, the majority of past research has failed to indicate how long or how many packets it takes for the monitor to detect a stepping stone....
Stepping stone attacks are often used by network intruders to hide their identities. The Round Trip Times (RTT) between the send packets and corresponding echo packets for the connection chains of stepping stones are critical for detecting such attacks. In this paper, we propose a novel real-time RTT getting algorithm for stepping stones which is based on the estimation of the current RTT value. Our...
In this paper, we first propose an adaptation scheme at each source for adjusting send rates and channel code ratios of all flows at each source by using a joint source and channel coding based approach. Sufficient conditions are derived for formulating such a challenging problem as a convex optimization problem. A simple algorithm is provided to solve this problem. We then design a simple scheduling...
Stream-media technology is a hotspot of research these days. The performance of stream-media service provided by the Internet based on TCP/IP protocol is always changing with the variation of network and is easily affected by the network parameters. During the developing of stream media, service performance Measurement is very important. This paper proposes parameter definitions to measure performance,...
We propose a novel approach using active probingand learning techniques to track minimum delay pathsfor real-time applications in service overlay networks.Stochastic automata are used to probe paths in a decentralized,scalable manner. We propose four variationson active probing and learning strategies. It canbe proved that our approach converges to the user equilibriumfor minimum delay routing. The...
In VoIP (Voice over Internet Protocol) applications, packet loss affects the received speech quality greatly. PCM (Pulse Code Modulation) coders are often used for VoIP and also face such problems. In this paper a side information based packet loss recovery algorithm is proposed, which introduces a small part of corrective information to provide an enhanced reconstruction of the lost packets. A virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.