The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Analyzing massive network and security logs that record network events is crucial for diagnosing network anomalies in large-scale network environments. Extracting log message formats is an important and necessary step to achieve the goal. However, it is time-consuming and costly to automatically and efficiently extract log message formats from massive network and security logs of many different types,...
Distributed beamforming is an energy-efficient wireless communication technique that allows cooperative nodes to transmit a common message to a receiver. This paper investigates carrier synchronization for distributed beamforming in large-scale wireless networks. In order to pursue less timeslots for synchronization, we present a time-slotted round-trip carrier synchronization protocol exploiting...
With the rapid developments of information technology, various industries become much more dependent on networks. Driven by economic interests and the game between countries reflected by growing cyberspace confrontations, evasive network attacks on information infrastructures with high-tech, high concealment and long-term sustainability become severe threats to national security. In this paper, we...
Extracting the protocol message format specifications of unknown applications from network traces is important for a variety of applications such as application protocol parsing, vulnerability discovery, and system integration. In this paper, we propose ProDecoder, a network trace based protocol message format inference system that exploits the semantics of protocol messages without the executable...
The paper proposes a section-partition-based method for packet partitioning and restructuring, aiming at meeting the rigorous requirement of transmitting a great abundance of data reliably and real-timely in some specific situation in that the traditional UDP protocol has high efficiency but poor reliability. The time limit can be reset by adaptive congestion control algorithm of MIRD ( Multiplicative...
In this paper we investigate the cooperative beamforming in cognitive radio network (CRN) composed of a primary network (PN) and a secondary network (SN). In the SN, the transmitter has to communicate with the receiver with the help of the hybrid relays which use cooperative beamforming to retransmit data. The relays will select amplify-and-forward (AF) or decode-and-forward (DF) according to the...
with the worldwide increasing of Internet censorship, censorship-resistance technology has attracted more and more attentions, some famous systems, such as Tor and JAP, have been deployed to provide public service for censorship-resistance. However, these systems all rely on dedicated infrastructure and entry points for service accessibility. The network infrastructure and entry points may become...
Xunlei [1] is a new P2P content distribution system which is popular in China. It composes traditional HTTP/FTP downloading and P2P content distribution features which attract many people including researchers. Xunlei's network is Bit Torrent-like and the measurement is more difficult than other P2P networks [2]. There are many constrains on Xunlei tracker, so we can not obtain information from tracker...
Application-level protocol specifications are helpful for network security management, including intrusion detection and intrusion prevention which rely on monitoring technologies such as deep packet inspection. Moreover, detailed knowledge of protocol specifications is also an effective way of detecting malicious code. However, current methods for obtaining unknown and proprietary protocol message...
The network community always pays its attention to find better methods for traffic classification, which is crucial for Internet Service Providers (ISPs) to provide better QoS for users. Prior works on traffic classification mainly focus their attentions on dividing Internet traffic into different categories based on application layer protocols (such as HTTP, Bit Torrent etc.). Making traffic classification...
Geo-information network service has become more and more popular; however the practical application of vector data service is rare used. The main reasons are as follows: firstly, with the variety of vector data formats, the general format conversion cannot be applied data shared services; Secondly, Existing vector data service interface standard (such as WFS) is too simple, which doesn't meet the...
Traffic classification is important to many network applications, such as network monitoring. The classic way to identify flows, e.g., examining the port numbers in the packet headers, becomes ineffective. In this context, deep packet inspection technology, which does not only inspect the packet headers but also the packet payloads, plays a more important role in traffic classification. Meanwhile...
Different operating systems have different network share techniques or protocols. Centralizing files and printers not only simplifies administration, it helps maintain consistency of shared resources. To realize resources sharing between different network flats, we analyzed concerned protocol, such as TCP/IP protocol, SMB protocol, IPX/SPX protocol, NFS protocol and FTP protocol. We also confirmed...
The current economic architecture of the Internet resembles more an Oligopoly-with several very large organisations dominating-than the idealised free market that many thought the Internet's characteristics-high non-local connectivity and low technical barriers to entry would enable. Internet-based individual and SME entrepreneur ship, as well as peer-to-peer markets, remain a poorly supported and...
Power consumption is critical to the performance of EPC Gen2 RFID tags. System clock frequency of tags should be as low as possible to reduce the power consumption and still conform to the protocol. This paper analyses the impact of different clock strategies on digital circuits of EPC Gen2 tag. An error shift approach is proposed to reduce the backscatter link frequency (BLF) errors. A dual-clock...
The usage of economics in grid systems designs has been very popular recently and a large number of system designers have attempted to use economic concepts to engineer the grid market mechanism that would enable an efficient allocation of resources. However, only few of these designs have been actually implemented and, in fact, very few, if any, have been successfully adopted by end users. The argument...
Network traffic analysis based on flows plays an important role in network monitoring and P2P identification. They are all grounded in flow counting and differ in how to count. Timeout detecting is a major strategy to identify termination of flows and can influence the validity of flow counting. The algorithms for counting flow based on Hash method can't deal with timeout problems perfectly. In this...
With the increase of network bandwidth, high performance protocol processing has shown its importance in network systems. Experimental results show that some advances in computer architecture, such as faster processors and larger cache, are not enough for TCP/IP processing (Markatos, 2002). In this paper, we present a formal analysis on I-cache behavior of batch protocol processing. We prove that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.