The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The last few years have seen a great number of new network applications. Many of these applications are characterized by their multipoint features and by their needs of high bandwidth. To allow the deployment of these applications at a large scale in the Internet without running the risk of network implosion, an adapted congestion control mechanism has to be used. In this paper we propose to use the...
The last few years have seen a great number of new network applications. Many of these applications are characterized by their multipoint features and by their needs of high bandwidth. To allow the deployment of these applications at a large scale in the Internet without running the risk of network implosion, an adapted congestion control mechanism has to be used. In this paper we propose to use the...
In recent years, vehicular networks has drawn special attention as it has significant potential to play an important role in future smart city to improve the traffic efficiency and guarantee the road safety. Safety in vehicular networks is crucial because that it affects the life of humans. It is essential like that the vital information cannot be modified or deleted by an attacker and must be also...
This paper presents a Bayesian statistical analysis applied to the spam problem. In most anti-spam related research, generally it is assumed that the probability of a spam occurrence is equal to 0.5, which is in our opinion unrealistic. It is also assumed that in the spam message, words are considered as an independent family of words. This makes us look at how the posterior probability behaves when...
BitTorrent is probably the most famous file-sharing protocol used in the Internet currently. It represents more than half of the P2P traffic. Various applications are using BitTorrent-like protocols to deliver the resource and implement techniques to perform a reliable data transmission. Forward Error Correction (FEC) is an efficient mechanism used for this goal. This paper proposes a performance...
BitTorrent occupies actually a dominant part of the Internet traffic for various applications. The protocol provides an efficient transport level but is devoid of real management and control layers. In this paper we propose a Service Provider network architecture based on BitTorrent protocol where Peer-to-Peer (P2P) peering traffic is reduced and P2P data transfer is sped up. We first add a Control/Management...
HTTP (hypertext transfer protocol) is a stateless protocol widely used in Internet World Wide Web. The idea behind a stateless design is to simplify the server conception because there is no need to dynamically allocate storage to deal with conversations in progress. If a client dies in mid-transaction, no part of the system needs to be responsible for cleaning the present state of the server. However,...
Current authentications with a secret key are based on the Challenge-Response paradigm. This mechanism avoids the clear transmission of the password in the network. Most protocols in Internet applications integrate this mechanism to authenticate a client before providing a service. Unfortunately this method in the protocol design increases the protocolar exchanges. This contribution is equivalent...
Current authentication and security protocols provide authentication services using either shared secret keys or certificates and public key infrastructures. They usually involve using random values and nonce to prohibit replay attacks and to generate fresh keys per each session. The Challenge-Response authentication mechanisms are the predominant access method for authentication and access control...
JXTA is an interoperable and platform independent peer-to-peer computing infrastructure. It is designed in a manner to address the needs of the widest possible set of P2P applications. In this paper, we propose SOS: a Service Oriented Architecture based on JXTA with semantic support. This contribution in regards to the existing platforms can be identified at three main levels: The architectural, resource...
The session initiation protocol (SIP) is rapidly becoming the dominant signalling protocol for calls over the Internet. It has quickly made large inroads into the voice over IP (VoIP) market. SIP is an application-layer control operating on top of a transport protocol and allows to create, modify, and terminate sessions with one or more participants. With security considerations, these operations...
Availability is one of the main characteristics of Internet security and hence attacks against networks increase trying to stop services on servers. Distributed denial of service attacks are very dangerous for computer networks and services availability. Various defense systems were proposed. Unfortunately, until now, there is no efficient solution. This paper presents a decentralized architecture...
Despite various hurdles, such as copyright issues, legality matters, and security concerns, the Peer-to-Peer (P2P) traffic still grows and appears somehow daunting for network providers. In fact, P2P networks lay over the Internet network, which is composed of tens of thousands smaller networks called Autonomous Systems (AS) and belonging to various administrative entities: network providers, universities,...
Nowadays, we are witnessing an important increase in attacks among which distributed denial-of-service (DDoS) that easily flood the victims using multiple paths. Intrusion detection and filtering are necessary mechanisms to combat against these attacks and secure networks. However, the existing detection techniques for DDoS attacks have their entities work in isolation. In this paper, we propose an...
Due to their two main applications, instant messaging and file sharing, peer-to-peer (P2P) systems are gaining more and more attention. JXTA, an interoperable and platform independent peer-to-peer computing infrastructure, has been adopted in an increasing number of network applications providing cooperative services and more specifically a file-sharing service through the CMS layer (content manager...
Peer-to-Peer (P2P) networks, like other overlays, do neither follow ISPpsilas policies nor their infrastructure. In fact, in P2P networks, routing tasks are distributed across all system peers in an autonomous and spontaneous way without taking the underlying IP network into account. Otherwise, the Internet is organized in several Autonomous Systems (AS) belonging to various administrative entities...
Although peer-to-peer (P2P) and programmable networks have their particularities, both work with distributed systems. In this article, a new concept looks for the integration among P2P and programmable networks. The originality of this work lives in the total convergence of networks P2P and programmable networks, with the objective of rendering service providers the ability to quickly create and provide...
IP traceback is one of the main challenges that face the security of today's Internet. Many techniques were proposed, including in-band messaging and out-of-band messaging; each of them has pros and cons. In this paper, we propose a new traceback scheme that mixes these two techniques in order to achieve the best of the two worlds. Our hybrid messaging scheme uses packet marking (an in-band messaging...
Active networks have been researched for years and many studies have been done in the active node architecture, the active networks protocols and the needed functionalities. However, some of these functionalities do not achieve satisfactory results. The deployment of services in active nodes still remains a challenge, and consequently inhibits the widespread use of such networks. In this paper, a...
Active networks are an approach in which the nodes of the network perform customized computations on the messages flowing through them. Peer-to-peer networks may be characterized by the capacity of the participants to share their own hardware resources (CPU, memory, bandwidth, printers). Combining the technologies of P2P and active networks, this paper presents an innovative concept, the use of a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.