The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a framework for a firewall to analyze and block BitTorrent file-sharing protocol using Traffic Analysis (TA) methods. BitTorrent traffic can be a concern of network administrators and is a valuable target for TA based investigation. In this work, the ability of a TA based classifier to identify the existence of BitTorrent traffic is tested under the condition that it is not only...
CCN (Content Centric Networking) is a new network architecture, which is optimized for content distribution by introducing route cache and request aggregation. However, current CCN is still similar to traditional Client/Server network architecture, with limited cache space, and the request aggregation policy is suitable for live streaming media rather than streaming media on demand. The main reason...
This paper presents a mechanism to use Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. The key idea is to probe encrypted and tunneled video streaming traffic at a client-side firewall so that the firewall can identify the traffic source using traffic analysis, and block or throttle traffic from that particular source. The key contribution in this paper is to evaluate...
This paper presents the concept and characterization of Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. Such identification can be used in enterprise firewalls for blocking unauthorized viewing of tunneled video. We attempt to characterize and evaluate the impacts of the primary TA-influencing factors, namely, streaming protocol, codec, and the actual video content...
Detecting access to video streaming websites is the first step for an organization to regulate unwanted accesses to such sites by its employees. Adversaries often adopt circumvention techniques using proxy servers and Virtual Private Networks (VPNs) in order to avoid such detection. This paper presents a traffic analysis based technique that can detect such tunneled traffic at an organization's firewall...
This paper presents mechanisms for identification of web traffic masqueraded behind encrypted Virtual Private Network (VPN) tunnels. Website identification using Traffic Analysis (TA) has many administrative applications including preventing access to forbidden websites and site-specific Quality of Service (QoS) provisioning. Previous works in this area mainly looked at the problem of identifying...
Energy Crisis is currently a common problem all over the world. Building energy consumption takes a significant part of energy consumption, so data collection and analysis is of great importance to the design of rational energy-saving strategy, the improvement of energy-utilizing efficiency, the implementation of energy conservation and emission reduction, and so on. Sensors are the basic components...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.