The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The notion of Software-Defined Networking (SDN) has already been introduced into cloud datacenter networks for provisioning virtual network environment. Network virtualization of today is generally achieved by L2-in-L3 tunneling protocols like VXLAN (Virtual eXtensible LAN) and NVGRE (Network Virtualization using Generic Routing Encapsulation) in public cloud datacenters. Some leading production packages...
The Distributed Network Protocol (DNP) is the communication protocol standard for Electric Power Systems (EPS) and it is a promising communication standard for the Electric Intelligent Devices (IEDs) found in Smart Grids. This paper presents a hardware implementation of the Data Li nk layer specified in version 3.3 of DNP (DNP3). A 100 Mbps Ethernet-based Distributed Network Protocol has also been...
In this paper, in a laboratory environment, the performance of four network traffic generators (Iperf, Netperf, D-ITG and IP Traffic) are compared. Two computers with Windows operating systems were connected via a 100 Mbps link and for various payload sizes, ranging from 128 Bytes to 1408 Bytes, the TCP traffic on the link was measured using the various monitoring tools mentioned above. The results...
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unavailable in order to complete the TCP three-way handshake mechanism. Detecting TCP SYN Flood in the Hypertext Transfer Protocol (HTTP) is the main problem in this paper. Anomaly detection...
Networked devices are often equipped with multiple interfaces. Legacy routing and transport protocols only support the transport of data over a single interface resp. paths. This tutorial discusses extensions for IP and TCP in order to support multiple interfaces. Multihoming and mobility management allow the simultaneous usage of interfaces by independent application data flows, while multipath transport...
In standard TCP/IP stack, its protocol dictates that if the header error is detected by mean of checksum computation, the packet will be discarded. Though this is a very fast and efficient method to detect `bad packet', it forces an extra channel usage. In this paper, we proposed a method to implement forward error correction (FEC) for uncompressed packet header. It is a byte-level FEC and it is going...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable with spoofed Internet Protocol (IP) address. The main problem in this paper is how to detect TCP...
With the increase of network bandwidth, more and more new applications such as audio, video and online games have become the main body in network traffic. Based on real time considerations, these new applications mostly use UDP as transport layer protocol, which directly increase UDP traffic. However, traditional studies believe that TCP dominates the Internet traffic and previous traffic measurements...
Reliable Burst Protocol (RBP) is a streaming protocol intended for use over packetized data networks to provide deterministic ordered and guaranteed data transmission. It has been designed to support configuration-based bounding of worst-case operation, with minimal performance impact. Retransmissions of data only occur for messages not received by the destination node. This allows for bounded worst...
Transmission Control Protocol (TCP) Synchronized (SYN) Flood has become a problem to the network management to defend the network server from being attacked by the malicious attackers. The malicious attackers can easily exploit the TCP three-way handshake by making the server exhausted and unavailable. The main problem in this paper is how to detect TCP SYN flood through network. This paper used anomaly...
Traffic classification is important to many network applications, such as network monitoring. The classic way to identify flows, e.g., examining the port numbers in the packet headers, becomes ineffective. In this context, deep packet inspection technology, which does not only inspect the packet headers but also the packet payloads, plays a more important role in traffic classification. Meanwhile...
In the last years, Precision Farming and Farm Automation in Agricultural field, have been requesting short range wireless communication systems for machine synchronization and long range wireless communication for fleet management, and for production and task control in real time. Existing protocols can meet the requirements only partially: different legislation and product availability in different...
In this paper, we extend the concept of Stochastic Packet Inspection (SPI) to support TCP traffic classification. SPI is a method based on the statistical fingerprint of the application-layer headers: by characterizing the frequencies of observed symbols, SPI can identify application protocol formats by automatically recognizing group of bits that take e.g., constant values, or random values, or are...
The steadily growing importance of Internet-based applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multipath Transfer (CMT) is to exploit the existence of multiple paths among endpoints to increase application data throughput. However, handling the congestion control of each path independently lacks of fairness against non-CMT flows...
Efficient network transmission technology is one of the key technologies of stereoscopic video. This paper envisages a scenario of stereoscopic video transmitting over IP networking and puts forward so called Multi-View Data Conduit protocol (MVDC) which is an efficient network transmission technology for stereoscopic video using layered architecture of the scalable extension of H.264. The paper also...
This paper presents experimental results of the implementation of network steganography method called RSTEG (Retransmission Steganography). The main idea of RSTEG is to not acknowledge a successfully received packet to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG can be applied to many network protocols that utilize...
We discuss the need for accurate analysis of TCP connections based on aggregated flow information. Due to increasing bandwidths in the Internet, flow metering is thought to be a promising solution for network monitoring, as packet-oriented state-based analysis reaches its limits and fast hardware support for flow metering is available. Motivated by earlier work on flow-based connection analysis, we...
IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take quality of service (QoS) requirements into account. QoS is the ability of the network to provide a service at an assured service level while optimizing the global usage of network resources...
Along with the development of Internet/Intranet application, more and more sensitive data is transmitted through the network. In order to prevent the critical data from being divulged and guarantee the security of information, we should pay more attention to the surveillance of network traffic. With this motivation, we present an efficient TCP flow reassembling algorithm which is the key of dataflow...
Botnets with the centralized architecture provide a simple, low-latency, anonymous and efficient real-time communication platform for the botnet controllers. To our knowledge, most of the latest detected large-scale botnets are based on the centralized structure with HTTP or customized protocols. Therefore, centralized botnets detection helps greatly improve control of unwanted traffic. The main contribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.