The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A method based on information-flow tracking uses gate-level logic to detect hardware Trojans that violate the confidentiality and integrity properties of third-party IP cores. Experiments on trust-HUB benchmarks show that the method reveals Trojan behavior and unintentional design vulnerabilities that functional testing cannot pinpoint.
Compared with other methods, intrusion detection approaches based on temporal logics can deal with many complicated network attacks effectively. Mail bomb attacks, however, are unable to be detected by the above methods due to the lack of formalization models. Thus, we use Time Interval Temporal Logic (TITL) to create a model for this type of attacks. At first, the attack principle is analyzed, and...
ARP spoofing is a deception within the LAN caused by ARP protocol flaws, which could cause the whole network paralyzed and even worse users' important information stolen through spoofing. The features of ARP is introduced in detail, the update mechanism of ARP mapping table is summarized by ARP spoofing simulation experiment, and the process of ARP spoofing is analyzed. An effective solution which...
In part because of the limitations of the TCP/IPprotocols used by the current Internet, the Future Internet has become an attractive network research topic. Recently, several projects focused on the Future Internet have been launched around the globe based on the Open Flow platform, such as those that are part of the GENI project in the U.S., the OFELIA project of FP7 in the E.U., and the FIRST project...
Based on services-oriented architecture(SOA), perfSONAR is a web service infrastructure. The set of elementary functions have been isolated and can be provided by different services. A primary goal of perfSONAR is to make it easier to detect performance monitoring problems among different network domains. perfSONAR has been widely accepted as one of the web service standards by NRENs (National Research...
Network traffic demands grow explosively from multimedia, point-to-point, and E-Science applications. In order to meet such tremendous growth, optical networks has been introduced for exploring higher bandwidth and better QoS guarantee. Problems arise when integrating the whole new optical infrastructure with current IP backbone, including controlling data path and network management. In this paper,...
This paper puts forward a session-based mobility management in MANET which in an efficient manner meets the requirements of rapid deployment of the network with auto-configuration but no need of manual intervention in disaster-rescue situations. A new system called MMAH, which eliminates the otherwise restrictions of mobility management of Mobile IP in MANET, promises more extensive applications of...
In this paper, first, the technology of virtual private network (VPN) is presented, and a comparison of several tunnel technology is given. Secondly the structure of IPSec protocol is introduced, and FreeS/WAN software realization IPSec protocol based Linux is made a particular analysis. At last, the VPN gateway is realized by applying FreeS/WAN soft under Linux.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.