The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Typosquatting becomes a speculative and serious phenomenon for both Internet users and brand owners of popular websites. Typosquatters register similar domain names of popular websites to profit from displaying advertisements, redirecting traffic to third-party pages, deploying phishing sites, or serving malware. Thus, much work have been done on measuring typosquatting in distribution, monetization...
Technology prospecting is a process to evaluate the potential business values of high tech companies from the technology perspective. In this paper, we provide a new view-angle to understand technology prospecting by studying the evolving distributions of technologies in the companies. Specifically, we first exploit topic models to learn technological context in the form of probabilistic distributions...
Nowadays, the problem of Internet services accessibility has become a hot topic with more and more cyber attacks and censorship. This has prompted the rapid development of jamming-resistance infrastructure consisting of multiple dynamic access points such as proxies, anonymous communication nodes and covert communication nodes. However, the channel between user and access point has become an emerging...
Adult image detection plays an important role in Internet pornographic information detection and filtering. By analyzing the shortcomings of existing pornographic image detection algorithms depending only on image content or keywords of text, a new adult image detection algorithm fusing image semantic features and image-correspondent text information is proposed. Based on Bag-of-Visual-Words model,...
with the worldwide increasing of Internet censorship, censorship-resistance technology has attracted more and more attentions, some famous systems, such as Tor and JAP, have been deployed to provide public service for censorship-resistance. However, these systems all rely on dedicated infrastructure and entry points for service accessibility. The network infrastructure and entry points may become...
The network community always pays its attention to find better methods for traffic classification, which is crucial for Internet Service Providers (ISPs) to provide better QoS for users. Prior works on traffic classification mainly focus their attentions on dividing Internet traffic into different categories based on application layer protocols (such as HTTP, Bit Torrent etc.). Making traffic classification...
Xunlei is a P2P file sharing application that is popular in China. The performance of previous P2P applications is limited by the selfishness of peers and the widely use of firewall. Xunlei applies implicit uploading strategy and firewall bypassing technologies to conquer above drawbacks. To evaluate the effects of above solutions, we perform a series of measurements on Xunlei and BitTorrent networks...
The AQM (Active Queue Management) Algorithm such as RED, PI, REM have too long respond time and some other problems. Though it makes some enhancement, the PID (Proportional Integral Differential) active queue management algorithm can not make the queue length converge to expectation with longer delay. Because of self-adapt control of BP (back-propagation) neural network, this issue bring forward a...
Recently, DoS (Denial of Service) detection has become more and more important in web security. In this paper, we argue that DoS attack can be taken as continuous data streams, and thus can be detected by using stream data mining methods. More specifically, we propose a new Weighted Ensemble learning model to detect the DoS attacks. The Weighted Ensemble model first trains base classifiers using different...
Fast-flux based service network is first introduced as a technique used to improve the reliability and quality of a service system. But recently, this technique is also adopted by cyber-criminals and Internet miscreants to evade identification and to frustrate law enforcement and anticrime efforts aimed at locating and shutting down the illegal service. Previous work on this topic focuses mostly on...
Cloud computing has attracted great interest from both academic and industrial communities. Different paradigms, architectures and applications have emerged. However, to the best of our knowledge, only few efforts have been devoted to study the architecture as well as implementation details for building up a cloud computing system. In this paper, we present our design and implementation of\textit{Imperial...
Load balancing is critical to the performance of parallel processing systems. It is more difficult for network systems such as NIDS and Web Servers, because they must preserve flow order. But traditional flow-based load balancing schemes of network parallel processing systems, such as LLF, cost much resource and introduce lots of communication overhead. With the rapid popularization of multi-core...
The current economic architecture of the Internet resembles more an Oligopoly-with several very large organisations dominating-than the idealised free market that many thought the Internet's characteristics-high non-local connectivity and low technical barriers to entry would enable. Internet-based individual and SME entrepreneur ship, as well as peer-to-peer markets, remain a poorly supported and...
While the number of consumer online shopping increase in Mainland China, research on the profile of Internet shoppers and non-shoppers has been inadequate. One research model is proposed in this study to examine factors of Internet usage including online experience, computer capacity, and Web-used-related lifestyle and their influence on consumers' behavior for online shopping. Data from 917 respondents...
Template detection technique is important for many applications. Most template detection methods utilize content repetition as a hint to detect template blocks that lots of Web pages are required as input. So they usually process Web pages in batches that a newly crawled page can not be processed until enough pages are collected. This consumes large storage consumption to cache Web pages and results...
Spam filtering is a great problem nowadays. The conventional spam filtering techniques still result in high false positives and false negatives. This paper proposes a novel online spam filter based on URLs and maximum entropy model. The filter identifies spam by classifying the e-mails with the pre-trained classifier based on the maximum entropy model and filters the spam online in terms of the characteristics...
As more and more spam emails are continually increasing exponentially, both the Internet service providers (ISP) and the end users are suffering. Spam filtering is a classic puzzle in the field of network security. In this paper, we present a novel anti-spam technique standing at a unique point of view, which includes novel users' feedback mechanism, user-oriented classifier based on improved naive...
Tremendous increases in spam traffic have made an imperative to develop effective techniques that can filter Internet spam traffic for using in network operation and security management. In this paper, we propose a more effective scheme called improved bulk mail traffic classification (IBMTC) for filtering spam from bulk delivery E-mails traffic. Based on our earlier designed scheme, we further address...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.