The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content Delivery Networks (CDNs) are able to improve user-oriented application performance through caching and anycast routing or DNS-based user mapping mechanism. With the fact that BGP is widely used for inter autonomous system (AS) routing for CDNs, there is a middle mile bottleneck problem, which cause by the nature limitation of BGP. To solve this problem, we propose an SDN-based tunnel multi-path...
Covert channel in network protocols has been an area absorbing great interests for many years in secret transmission. Recently, covert channels based on packet length have become a new preference among researchers in this field because of their excellent performance in simulating statistical features of network packets in real world. However, few approaches which can embed secret information with...
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted...
The intelligent agricultural environment monitoring system is one of the applications of wireless sensor networks (WSNs), which has an extensive application and bright foreground. In the intelligent monitoring system, the gateway is important equipment for realizing the interconnection between WSNs and internet freely. For this purpose, this paper proposes designs and implements a kind of embedded...
The research and elimination of perceived risks by customers shopping online in groups furthers the development of the business model. With the review and summary of perceived risks by customers in traditional e-commerce environment, special risks resulted from online group buying ware discovered by interviews with customers and experts in order to develop initial scale of perceived risks by online...
In recent years, many IPv6 networks have been deployed, and the security issues of which arouse more and more public concern. It is commonly believed that IPv6 provides greater security against random-scanning worms by virtue of a very large address space. However, a clever worm can develop a more intelligent scanning strategy to find target hosts. This paper presents a worm which uses the p2p-based...
The propagation model of P2P worms can reflect the worm behaviors and identify weakness in the worm propagation which gives guidelines to worm detection and defense. To improve the security of P2P network, a mathematical model is proposed which combines dynamic quarantine and P2P churn. The SIQRW model departs from previous P2P worm models in that considering the dynamic quarantine methods and the...
Three solutions to the common problem of print in the MIS of B/S mode are put forward: use the page printing function of IE to print reports; use control such as Crystal Report to print reports and certificates; use XML to print reports in B/S mode. These methods provide a feasible project about print based on B/S mode. It will be helpful for creation of printable documents based on Web.
In order to support more value-added services and a larger space for IP addresses, the Internet requries to classify IPv6 packets into flows for specific requirements. High performance IPv6 packet classification (PC) algorithms are therefore in high demand. This paper proposes a new IPv6 PC algorithm based on flow label (FL), called FLIN (Flow Label Initial Noticed). FLIN is fast and scalable with...
Recently, the significantly increased IPv6 address length has posed a greater challenge on wire-speed router for packet classification (PC). Most conventional IPv4-based PC algorithms are no longer suitable for IPv6 PC. The performance and capacity of many IPv6 algorithms and classification devices depend upon properties of the IPv6 classifiers. However, there are no publicly available IPv6 real classifiers...
To achieve automation in ITS (Intelligent Transportation System) environments, integrations for existing traffic management systems as well as various vehicle-centered systems need to be done without modification. This is in particular essential for an automated emergency vehicle preemption system, where traffic signal preemption should be more accurate, smooth, and secure. Current researches for...
Text-steganography plays an increasingly significant role in covert-communication on Internet. Compared with study on text-steganography, research on text-steganalysis is in its infancy. In this paper, we present a statistical analysis of a kind of word-shift text-steganography by using neighbor difference (length difference of two consecutive spaces). We classify nature PDF documents into two cases...
With more and more worms plunge into the Internet, worm-anti-worm (WAW) becomes a new active countermeasure. In this paper, a new P2P-based anti-worm is proposed. To illustrate the propagation of worms and anti-worms, TF-SEI (two-factor-SEI) model is given. By comparing our model with the traditional anti-worm model, we observe that the worm-infected hosts can approach to zero with shorter time in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.