The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the growing popularity of cloud-leveraged infrastructure and services, the creation and operation of multiple virtualized boxes over a single physical box is increasing rapidly. It is however becoming difficult to maintain transport performance and security with an increasing number of inter-connections among them. To address this issue, in this paper, we utilize the eBPF-based packet tracing...
In this paper, we describe the concept of utilizing packet tracing and collection for 3rd-party packet-precise inspection to assist the secure operation of SDN-enabled multisite cloud environment. The proposed packet tracing and collection is designed and prototyped by utilizing open-source IO Visor project's tools. To verify its feasibility for remotely distributed multiple boxes, we apply it to...
Cloud computing paradigm has been driving the cloud-leveraged refactoring of existing ICT services including VoIP. In this paper, we design and prototype secured mobile VoIP services with open-source Asterisk PBX software by employing Docker lightweight virtualization for mobile devices. We also experimentally verify the quality of secured voice and the associated communication delay over distributed...
In this paper, we discuss about a futuristic design for multi-level connectivity that plays the pivotal role in enabling IoT services employing the hyper-convergent SmartX Boxes.
We propose a scalable intrusion detection system (IDS) architecture on a software-defined networking (SDN) environment implemented using a virtualization infrastructure called a Kernel-based Virtual Machine (KVM). In this virtual environment, virtual machines running IDSs, the SDN controller, and network attack software are connected with each other through OpenFlow-enabled software switches. This...
As an alternative solution to solve the tussles between the network operators and the peer-to-peer (P2P) applications, an informed peer selection (IPS) scheme like P4P is proposed. In IPS, each network operator installs a server that provides their network information to the peers as a guidance for peer selection and each peer chooses its communicating partner based on the guidance. Most existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.