The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the invention of the first telephone by Alexander Graham Bell in 1869, network telephony technology did not stop evolving: from circuit switching to packet switching, from fixed network to wireless network. Several new architectures were created which combines the transport of voice, data and image in the same data network. The nature of these open networks has an impact on the voice in terms...
In this paper we propose SEMAFOR, a Web based platform for protecting adaptive multimedia content delivery in heterogeneous environments. It aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while allowing content adaptation by intermediary proxies between the content transmitter and the final users. Adaptation and authentication management are done...
The goal of this paper is very specific, provide a guide to build a technical infrastructure for a computer security incident response team (CSIRT) work, it does not cover the complete process of creating a CSIRT. This paper provides guidance for people interested to build a CSIRT team, who wants acknowledgement of the necessities, equipment used, tools, mechanisms, and costs implied. It also provides...
A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background 'noise' on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misconfiguration...
The paper studies performance of a SIP signaling network in an overload condition. The main interest is to find a preferable queuing structure of a SIP proxy server to protect from performance degradation. In the study, two types of queuing structure, which are a simple single FIFO queue and a two class priority queue, are considered. Using the network simulator (ns-2), the paper evaluates a throughput...
This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks. Such applications utilise anomaly detection techniques which can be applied for transaction authentication and intrusion detection within Internet banking security architectures. Such fraud 'detection' strategies have the potential to significantly limit present levels of financial...
The generalized survivable network (GSN) was introduced to guarantee full survivability against link failures for dynamic demand networks. The GSN planning methodology is deterministic and easy to specify - requiring only the specification of input and output capacity of all the nodes. Here we demonstrate that the GSN planning framework can result in 2%-19% cost saving when compared with the tree-based...
Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to realize. The SIM card used in mobile phones is a tamper resistant device that contains strong authentication mechanisms, and if Internet services could use...
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University of Washington campus network found that file-sharing accounted for more than treble the volume of Web...
In this paper, we introduce a probabilistic modeling approach for addressing the problem of Web robot detection from Web-server access logs. More specifically, we construct a Bayesian network that classifies automatically access-log sessions as being crawler- or human-induced, by combining various pieces of evidence proven to characterize crawler and human behavior. Our approach uses machine learning...
The permanently increasing data traffic of IP services and broadband applications has become the largest traffic component in transport networks. The requirements of the dominant IP-client result in major changes of the architecture and in the networking paradigm of the optical layer. Due to these changes fast provisioning capabilities enabled by signalling intelligence and automated switching flexibility...
This paper presents the use of overlay networks as a tool to confront the consequences of extreme network attacks. In particular, it suggests the use of disaster recovery sites, which are becoming a common practice of all major IT infrastructures. The main goals of this attempt are to enable IT infrastructures to deal with severe network attacks such as denial of service and distributed denial of...
Although spanning-tree protocol (STP) is widely used in switching networks today, it is not until recently that its security performance is studied by researchers. In this paper, the problem of attacks to STP is addressed. The paper proposes a novel solution that partitions a STP network into two tier of switching networks. The reason of the partitioning is to hide the STP operation of the network...
The delayed message authentication protocol (DeMA protocol) is a protocol that can be used in order to exchange authentic information between two entities by using a one-way chain (i.e. an array of elements generated by a one-way function) on each entity's side. The use of the discrete power function in the DeMA protocol offers the advantage that the length of the chains does not influence the computational...
Since P2P file-sharing networks became extremely popular between Internet users, many researchers have tried to model those P2P networks. This article deals with the modeling of public domain P2P file-sharing networks in terms of some parameters such as their number of users and the number of files inside them along the time. To do so, we have been measuring five public P2P file-sharing networks (Gnutella,...
How to provide quality of service (QoS), has been a major issue for the Internet for the past decade. But, recent monitoring projects showed that Internet traffic exhibited large variations, and non-stationary traffic, making difficult to guarantee a stable and robust QoS. The objective of this paper is then to guaranty a robust QoS which means providing the requested QoS under all circumstances,...
Some applications need to collect information from several different sensor networks to provide comprehensive services. In order to simplify the complexity of dealing with heterogeneous sensor networks, a uniform interface should be provided for users. This paper describes a novel approach to integrate these different sensor networks into one virtual sensor network. Users can easily query data through...
Border gateway protocol (BGP) is the de facto inter-domain routing protocol. With the rapid development of Internet, the convergence problem of BGP attracts more attention, which is an inborn limitation for path vector routing protocol. But previous work can't give a definite and comprehensive answer to it. This paper presents a new BGP convergence model and analyzes the convergence delay bounds of...
One major new and often not welcome source of Internet traffic is P2P filesharing traffic. Banning P2P usage is not always possible or enforcible, especially in a university environment. A more restrained approach allows P2P usage, but limits the available bandwidth. This approach fails when users start to use non-default ports for the client software. We have developed the PeerTracker algorithm that...
Electronic ordering (e-ordering) services are fundamental in the provision of B2B e-commerce. The contemporary e-ordering implementations are expensive vary in terms of the underlined technologies, creating important interoperability, security and privacy problems. In this paper we capture the security and privacy requirements of the e-ordering service and we present an e-ordering system based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.