The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid developments of information technology, various industries become much more dependent on networks. Driven by economic interests and the game between countries reflected by growing cyberspace confrontations, evasive network attacks on information infrastructures with high-tech, high concealment and long-term sustainability become severe threats to national security. In this paper, we...
Xunlei [1] is a new P2P content distribution system which is popular in China. It composes traditional HTTP/FTP downloading and P2P content distribution features which attract many people including researchers. Xunlei's network is Bit Torrent-like and the measurement is more difficult than other P2P networks [2]. There are many constrains on Xunlei tracker, so we can not obtain information from tracker...
Scanning activities are usually conducted by infected hosts to discover other vulnerable hosts or by a motivated adversary to gather information, and are typically precursor to most of the cyber attacks. There are many scan detection approaches at present; however, most of them focus on enterprise-level network where the traffic volume is low, bi-directional and packet-level information are available...
Bot nicknames within one IRC-based botnet must have uniform structure, because they are generated by the same bot fixedly. In this paper, the similarity of nicknames in the same channel is defined by the term dasiachannel distancepsila. And a novel algorithm based on channel distance is proposed to detect IRC-based botnets. The most significant contribution of this algorithm is that it can detect...
Many peer-to-peer anonymity protocols have been proposed in recent years. One of the key challenges in designing such protocols is peer discovery, especially in decentralized unstructured peer-to-peer systems. In this paper, we propose a gossip algorithm for peer discovery based upon node local in-degree (GPDL), using only limited knowledge of the network topology. Our goal is try to discover peers...
With the increase of network bandwidth, high performance protocol processing has shown its importance in network systems. Experimental results show that some advances in computer architecture, such as faster processors and larger cache, are not enough for TCP/IP processing (Markatos, 2002). In this paper, we present a formal analysis on I-cache behavior of batch protocol processing. We prove that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.