The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reliability, availability and survivability are important characteristics of Web servers that enable them to provide continual service to clients. Server migration is one of the many approaches used to improve the reliability of Web servers. We propose a novel technique for migrating Web servers that is based on protocol splitting, wherein two servers, a connection server and a data server, function...
Sketch is commonly used in network anomaly detection. However, its irreversibility seriously obstacle for identification of origin of traffic anomaly, such as attack flows. In this paper, we design a novel sketch structure, called Bitwise Sketch, with the ability of fast and lightweight reverse deduction. Bitwisebased hash function, which distributes keys (IPs) is Sketch, is adopted in bitwise sketch,...
This paper propose a new method for de-tecting distributed denial of service (DDoS) attack. By using the monitors on the edge network to record the traffic information in a Sketch matrix, we can get the suspicious attack traffic information as the local detec-tion result. Then, all the monitors that have found sus-picious information about the same destination IP or-ganize into an AutoTree to collaborative...
In recent years there has been growing interest for the vision of a so-called Web of Things, which pursues the access to a wide variety of everyday objects through a regular web browser. We believe that this vision is right now at a key moment in its realization, analogous to the '90 for the World Wide Web. The Constrained Application Protocol (CoAP), a web protocol optimized for constrained networks...
As we are moving towards to the Internet of Things (IoT) era, Wireless Sensor Networks (WSN) in smart buildings delineate the heart of such systems?? architecture. WSN systems are mature enough to support the IoT vision and different architectural designs and communication protocols are developed to realize this vision. In this paper, two different WSN architectural approaches for smart building systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.