The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is difficult to promote the use of existing methods of DDoS attack source trace-back. Source IP address forgery is an important technology that DDoS attackers commonly use. Combined with the characteristics of the datagram and the traditional virtual circuit, orientable complete path (OCP) is put forward. OCP can be used to solve the problem of source IP address forgery, to track attack source,...
Malicious intrusion is the behavior that threats a large number of computers; therefore, recent research has focused on devising new techniques to detect and control internet intrusion with high efficiency and low cost. Unfortunately some anomaly detection system (ADS) over machine learning may get some false alarms if the results of machine learning cannot cover all the normal or abnormal data. In...
In this paper, we analyze the problems of existing Service Computing model and propose a closed-loop mechanism for service evaluating and discovering on the Internet which is not only compatible with the basic principles of Service Computing--loosely coupled, protocol independent and location transparent, but also can rank, classify and recommend services based on their real-time performance. This...
Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In this paper we address this issue by investigating effective solutions to automatically identify compromised machines in a network. Given that spamming provides a key economic incentive for attackers to recruit the large number...
Recent attacks demonstrated that network intrusions have become a major threat to Internet. Systems are employed to detect internet anomaly play a vital role in Internet security. To solve this problem, a technique called frequent episode rules (FERs) base on data mining has been introduced into anomaly detection system (ADS). These episode rules are used to distinguish anomalous sequences of TCP,...
In recent years, the explicit semantic analysis (ESA) method has got a good performance in computing semantic relatedness (SR). However, ESA method has failed to consider the given context of the word-pair, and generates the same semantic concepts for one word in different word-pairs. It canpsilat exactly determine the intended sense of an ambiguous word. In this paper, we propose an improved method...
This paper develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the stability of the BGP-based inter-domain routing system. TIDR is designed based on two important Internet properties-the Internet access non-uniformity and the prevalence of transient failures. In TIDR, a network prefix is classified at an AS as either significant or insignificant from...
P2P applications are among the most popular Internet applications and constitute a majority of Internet traffic today. From the perspective of network management, a thorough understanding of the stochastic properties of P2P traffic is thus crucial to designing better traffic/resource control algorithms. However, previous work on measuring and analyzing P2P traffic focuses either on a specific type...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.