The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
To cope with the varying delay and bandwidth requirements of today’s mobile applications, mobile wireless networks can profit from classifying and predicting mobile application traffic. State-of-the-art traffic classification approaches have various disadvantages: port-based classification methods can be circumvented by choosing non-standard ports, protocol fingerprinting can be confused...
Currently, when companies conduct risk analysis of own networks and systems, it is common to outsource risk analysis to third-party experts. At that time, the company passes the information used for risk analysis including confidential information such as network configuration to third-party expert. It raises the risk of leakage and abuse of confidential information. Therefore, a method of risk analysis...
In recent years, the intelligent instrument in enterprise energy management is quickly gaining in popularity. The correct instrument information collected is the assurance of accurate analysis for energy efficiency. This paper mainly studies the method of the smart meter data collection in the energy data acquisition system, and proposes the effective measures for improving the success rate of the...
Attack graph technique is a common tool for the evaluation of network security. However, attack graphs are generally too large and complex to be understood and interpreted by security administrators. This paper proposes an analysis framework for security attack graphs for a given IT infrastructure system. First, in order to facilitate the discovery of interconnectivities among vulnerabilities in a...
Cloud computing offers the potential for productivity, cost savings and innovation advantages to organizations. To utilize these benefits, to facilitate wide-scale cloud adoption and to embrace cloud computing, we must address many cloud security challenges. Attackers can compromise the vulnerable hosts and can either take over their resources or use them as stepping stones for future attacks. Open...
HTTP constitutes a dominant part of the Internet traffic. Today's web traffic mostly consists of HTTP/1 and the much younger HTTP/2. As the traffic of both protocols is increasingly exchanged over encryption, discerning which flows in the network belong to each protocol is getting harder. Identifying flows per protocol is however very important, e.g., for building traffic models for simulations and...
The bursty many-to-one communication pattern, typical for data acquisition systems, is particularly demanding for commodity TCP/IP and Ethernet technologies. We expand the study of lossless switching in software running on commercial off-the-shelf servers, using the ATLAS experiment as a case study. In this paper, we extend the popular software switch, Open vSwitch, with a dedicated, throughput-oriented...
In this paper, we have studied and described the security of SIP Trunk on IMS network (IP Multimedia Subsystem) via SBC (Session Border Controller), introduced a model by installing SBC to connect between IMS Network and IP-PBX in concept of SIP Trunk and present new method to increase performance of SIP Trunk by specified concurrent call, setting the caller discrimination to filter subscriber number...
OpenStack has been widely acknowledged to be one of the most important open source cloud platforms. In order to perform experimentally driven research in the area of cloud and cloud networking, there is however a big gap, because most researchers do not have access to a large cloud deployment and cannot change networking or compute infrastructure in order to test their algorithms and protocols on...
The OPC Classic protocol is commonly applied in Industrial control systems, which greatly improve the efficiency of data sharing and introduced in security threats at the same time. With the emergence of new viruses and attacks, aggressive behavior is often hidden in the normal OPC communication, and traditional OPC protection methods have been unable to meet the security requirements. In order to...
As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale...
FPGAs (Field Programmable Gate Arrays) are making their way into data centers (DC). They are used as accelerators to boost the compute power of individual server nodes and to improve the overall power efficiency. However, this approach limits the number of FPGAs per node and hinders the acceleration of large-scale distributed applications.
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Distributed Denial of Service (DDoS) attacks always remain problematic for the security of Data centers, malicious codes are injected to weaker the network and acquire unauthorized access. As protection the firewalls are initial line of defense to battle with unauthorized access, and help to the flawless transactions. Conventional firewalls rely on predefined policies to control, and policies rely...
In the beginning, this paper describes basic overview of attacks on TCP/IP stack in general. In the next section, there is overview of security of signalization and description of techniques used to secure signalization in multimedia communication. Then, there are described techniques of multimedia security. The last part of the paper deals with a Public key infrastructure (PKI) and aspects of its...
Today DNS servers run on many different applications and operating systems what means there are many options how to protect DNS server. Each regular application has implemented security mechanisms that protect the system from standard attacks. DNS service works on application layer, however it is possible to prevent many threats already on lower layers. This paper deals about DNS security mechanisms...
Disruption/Delay tolerant networking (DTN) is a promising solution to mitigate the effects of periodic link outages that last seconds to minutes, which are prevalent in high capacity airborne tactical networks that are directional in nature and highly affected by aircraft body blockage. There are several considerations for applying the DTN Bundle Protocol (RFC 5050) in tactical edge networks which...
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours. These opportunistic attackers enumerate blocks of IP addresses in hope of discovering an exploitable host. Fortunately, defensive measures such as port knocking...
Due to recent integration of SCADA systems with business systems, SCADA systems became open(unprotected), leading to not only security vulnerabilities increase but also sophisticated and intelligent cyber-attacks specifically targeting SCADA systems. A whitelist based security control technique that has attracted a lot of attention, is an emerging systems control, currently can be applied to solve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.