The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we outline the recent efforts of our research in defense against Distributed Denial of Service (DDoS) attacks. In particular, we present a novel approach to IP traceback, namely Unique Flow Marking (UFM), and we evaluate UFM against other marking schemes. Our results show that the UFM can reduce the number of marked packets compared to the other marking schemes, while achieving a better...
The following topics are dealt with : hidden Markov model; support vector machines; microarray sample classification; automated knowledge engineering; medical image edge enhancement; recurrent fuzzy multilayer perceptron; self organizing maps; data mining; business intelligence tool; context ontology driven relevant search; Web search result optimization; image compression analysis; natural feature...
RFC4893 defines the transition mechanisms to use 4 byte Autonomous System numbers. This RFC has some inconsistencies and has not been implemented correctly by all vendors. As a result, several major Internet incidents related with the handling of bogus 4 byte Autonomous System Numbers (ASNs) have ocurred. The last one was registered between the 17th and the 18th August, 2009. This paper analyses BGP-4...
The poor performance of TCP, designed about 30 years ago, over high bandwidth-delay product connections has attracted much attention in the past few years. Some research work attempt to solve this problem by using innovative window estimations. The bursty nature of packet transmission has compounded the challenges in the problem. In this paper, we propose a new transmission protocol - Fairness Control...
From the aspect of inter-domain routing security, it is important to identify the critical ASes which transmit a large fraction of data traffic. By analyzing the BGP routing process under the control of routing polices and evaluating a series of Transmit factors, we realize that BGP routing system has a Hinge-Transmit property. It indicates that Tier-1 AS set is the hinge of the Internet, transmitting...
According to the cross relationship between administrative division map and the graph of backbone routing system, we classify the routing nodes by map-coloring technology which is based on "triangular element". Then, we design the "tricolor loop" network architecture and its routing policy. In order to give a better description about this scheme, we take the backbone routing system...
The large IPv6 address space enables the study on network addresses in a network environment, which ensures the construction of a secured and trusted China next generation Internet (CNGI), it is a tested for next generation Internet (NGI) applications. This paper describes two of the major transition technology and discusses their applicability and uses. The intra-site automatic tunnel addressing...
We present a new multi-path routing methodology called MLB-routing based on multinomial logit model, which is well known as the random utility theory. The key concept of the study is to incorporate multiple paths from same origin to destination, and distribute packets followed by the multinomial logit type probability. Since MLB-routing is pure multi-path routing, it reduce the severe convergence...
Mining and statistical analysis of network data are often employed to determine traffic loads, analyze patterns of users' behavior, and predict future network traffic. In this talk, we analyze traffic data collected from three deployed networks: a cellular wireless network used by public safety agancies, a satellite network used by Internet service providers, and the Internet. We describe analysis...
To enable seamless integration of ad hoc networks with other Infrastructure LANs and to the Internet, TCP seems to be the natural choice for users of ad hoc networks that want to communicate reliably with each other and with the Internet. It is well-known that due to the nature of multi-hop wireless Ad hoc network applications, TCP throughput instability can have a devastating impact on the QoS requirements...
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing path from the start router to the end one based on the trust theory that considers the trustworthy of link, the cost of link and the trustworthy of router as the critical factors so as...
It has been recognized that today's Internet routing and addressing system is facing serious scalability problems. The ever increasing network customers, multihoming, and traffic engineering, are driving the growth of Default Free Zone routing table size at an alarming rate. To solve this issue, several solutions have been proposed to separate the current single numbering space, i.e., the "IP...
Geographic-based addressing and routing has been discussed for more than twenty years. In this paper, we clarify the purpose of fitting geographic information into addressing and routing, and further propose a new geographic-based addressing and routing scheme. Our contribution lies in three aspects. First, we classify previous geographic-based addressing and routing proposals into three categories...
Today, overlay networks are used as a promising platform to deploy wide area of applications and services in the Internet. The application level state maintained by the overlay networks should have high degree of availability.This can be compromised when a significant percentage of overlay nodes fails simultaneously (massive failure). The first problem: when a significant fraction of nodes fails simultaneously...
The efficiency of routing algorithms has always been an open question accompanied with the evolving history of routing problems. Message storm could easily be found in today's Internet routing infrastructure, especially in the context of distance-vector like algorithm, requiring each node affected by network anomalies to send requests to all its neighbors and wait for response. Through in-depth analysis,...
The cache-and-forward (CNF) architecture has recently been proposed as a "clean-slate" solution for efficient content delivery in the future Internet. The CNF architecture is based on the concept of hop-by-hop transport and in-network storage of content. In this paper, we investigate a gateway centric method for efficient content caching and routing in the CNF network. In this method, a...
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with rdquonationalrdquo firewalls, citizen profiling and other rdquounethicalrdquo uses of Information Technology. Current steganographic methods that implement covert...
Although commonly used sensor nodes are resource-limited devices, enabling cooperation among these devices can help building very powerful systems. Besides other characteristics, storage capabilities of individual sensor nodes have to be considered as this might be very small compared to the collected sensor data. The temporal availability of sink nodes or the importance of collected data are not...
Aiming to the problem of scalability caused by frequent route updates in current inter-domain routing system, this paper proposes a scalable inter-domain routing update mechanism to restrict the propagating scope of the update, called SIRUM. The autonomous system estimates the probability of that the communications of its neighbors are affected by the update according to the history information of...
Open shortest path first (OSPF) is the most commonly used intra-domain Internet routing protocol. As the routes of paths are determined by basically only the link metrics, many paths may pass a link with small metric; therefore, there is high possibility that it causes the congestion of the link. It is essential that the number of the paths with large traffic in a link is limited to avoid a congestion;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.