The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Address Translation has often been described as an aberration in the evolution of the Internet, and one that will be removed with the completion of the transition of IPv6. This is an opinion in support of NATs, arguing that they are an important step in the evolution of the Internet and may well play a lasting role in this environment.
Traffic monitoring and analysis has become necessary to understand the nature of information flowing within an organization. This is particularly important due to the recent trend of increase in the percentage of anomalous traffic in the overall organizational traffic composition. In this work, we attempt to determine the typical characteristics seen in various organizational network traffic. We use...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
Our research group has proposed a VNT control method based on attractor selection. Since the number of attractors composing an attractor set is limited, it is important to decide what kind of attractors should be prepared. The existing method prepares attractors such that their topological characteristics are different from each other. However, since the existing method does not incorporate current...
Content-centric networking (CCN) is considered to be the future Internet which moves from host-to-host model to transfer data model based on content name. Network data caching is a characteristic of CCN whose effectiveness depends on the content caching policies in the nodes. Leave copy everywhere (LCE) is the default policy in CCN which caches all content at all nodes leading to poor caching performance...
Geolocation databases are widely used for mapping Internet devices' IP address to the physical location. However, there are inconsistencies between them. It is difficult to avoid because the methodology used by database provider to gather their geographic information is different. Moreover it is impossible to update database in real time. Yet by analyzing inconsistencies between geolocation databases,...
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the recent past have shown that even small autonomous systems (ASs) are able to manipulate routing information with huge global impact. Even though countermeasures exist, they are not established at large scale yet. Monitoring of the actual routing state is the only mean to provide at least information about...
As one of promising future Internet architectures, named data networking (NDN) technology has been widely researched in these days. As a basic name lookup structure used in NDN routers, a name prefix trie (NPT) is an extended version of a binary trie used for IP address lookup. However, since name prefixes can have an unbounded number of components, an NPT can have many empty nodes which cause memory...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
Nowadays security is a major concern. Address resolution Protocol (ARP) is a most popular communication protocol in the LAN. ARP is mapping from IP address (32 bits) into MAC address (48 bits). ARP has some limitations like lack of states and authentication. So attacker can exploit these vulnerabilities and gain unauthorized access to one's sensitive data. There are some attacks against ARP like MAC...
The development and deployment of the Locator/ Identifier Separation Protocol (LISP), a paradigm introducing several benefits to the Internet architecture, is becoming widespread thanks to initiatives like the LISP-Lab project. Yet, LISP remains a relatively recent technology, hence, its actual performance when integrated with the current Internet remains still to be assessed. To tackle this issue...
To combat with botnet, early detection of the botnet communication and fast identification of the bot-infected PCs is very important for network administrators. However, in DNS protocol, which appears to have been used for botnet communication recently, it is difficult to differentiate the ordinary domain name resolution and suspicious communication. Our key idea is that the most of domain name resolutions...
The exponential growth of the Routing Information Base (RIB) of the Internet's Default-Free Zone (DFZ) routers has raised concerns about non-scalability of the current Internet's routing architecture. The main reason is that Internet addresses currently carry information about both the identity and location (physical connection point) of devices connected to the Internet. The Locator/ID Separation...
Named Data Networking (NDN) is an entirely new internet architecture inspired by years of empirical research into network usage. NDN is related to Content Centric Networking. Unique feature of NDN is its adaptive forwarding plane. In NDN, the packets carry the data name instead of the source and destination address. In NDN, communication takes place by the exchange of Interest and Data packets. Data...
Detecting anomalous traffic with low false alarm rates is of primary interest in IP networks management. In this paper we propose a novel anomaly detection system, based on a combined use of sketches and of a novel bivariate non-parametric detection method. The latter allows us to simultaneously analyse two different traffic features so as to improve the performance of the "classical" detection...
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology (IT) provides the infrastructure backbone for business activities, a corporate network connects the company to Internet and enables it to perform its activities globally. The corporate carries data packets generated by the users' while performing their business tasks. Traditionally,...
The importance of the analysis and understanding of the network traffic has constantly been increasing due to insights that this provides towards determination of user behaviour and resource usage. The data analyses in order to determine the related parameters are performed by selection of a small subset of the complete flow data due to data privacy and heavy computational/memory load issues. That...
The significant dependence on cyberspace has indeed brought new risks that often compromise, exploit and damage invaluable data and systems. Thus, the capability to proactively infer malicious activities is of paramount importance. In this context, inferring probing events, which are commonly the first stage of any cyber attack, render a promising tactic to achieve that task. We have been receiving...
Online Social Networking (OSN) applications attracted millions of people in few years and are considered as the success story of current Internet applications. However, how they work is unclear for both end-users and researchers, since the developers keep the system architecture secret and use encryption mechanisms. In this paper, we present the main outcomes of our analysis of one of the most well...
The most basic function of an Internet router is to decide, for a given packet, which of its interfaces it will use to forward it to its next hop. To do so, routers maintain a routing table, in which they look up for a prefix of the destination address. The routing table associates an interface of the router to this prefix, and this interface is used to forward the packet. We explore here a new measurement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.