Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the era of the Internet, people are active in multiple online services, and they usually have accounts on more than one online service. Each account is a virtual identity of the user. In order to trace individual's online behavior at any time and any places, linking virtual identities belonging to the same natural person across different online service domains is very important. Existing methods...
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
Autonomous vehicles must communicate with each other effectively and securely to make robust decisions. However, today's Internet falls short in supporting efficient data delivery and strong data security, especially in a mobile ad-hoc environment. Named Data Networking (NDN), a new data-centric Internet architecture, provides a better foundation for secure data sharing among autonomous vehicles....
Content-centric networking (CCN) is considered to be the future Internet which moves from host-to-host model to transfer data model based on content name. Network data caching is a characteristic of CCN whose effectiveness depends on the content caching policies in the nodes. Leave copy everywhere (LCE) is the default policy in CCN which caches all content at all nodes leading to poor caching performance...
Malware attacks have become ubiquitous in modern large data-centric networks. Therefore advanced malware threat detection and related countermeasures are an important paradigm in cybersecurity research. This work studies malware propagation in fully connected networks, where network topology plays a minimal role in lateral spread within the network. The live netflow and perimeter alert data used in...
This paper proposes a framework for security services for Voice over IP (VoIP) and Voice over LTE (VoLTE) in commercial networks using Software-Defined Networking (SDN) and Network Functions Virtualization (NFV). The VoIP/VoLTE services are exposed to several security threats such as Denial-of-Service (DoS) attack, network sniffing, unauthorized services access, and VoIP spam. The conventional security...
Internet traffic destined to routable yet unallocated IP addresses is commonly referred to as telescope or darknet data. Such unsolicited traffic is frequently, abundantly and effectively exploited to generate various cyber threat intelligence related, but not limited to, scanning activities, distributed denial of service attacks and malware identification. However, such data typically contains a...
RINA, the Recursive InterNetwork Architecture, is a novel “back to basics” type approach to networking. The recursive nature of RINA calls for radically different approaches to how networking is performed. It shows great potential in many aspects, e.g. by simplifying management and providing better security. However, RINA has not been explored for congestion control yet. In this paper, we take first...
By using conventional database management tools, data explosion is one of the most regular triggers for the development of Big Data. This results in increase difficulty for database management and larger datasets from existing applications. The organizations face the challenge to capture, manage and analyze the data in an acceptable period of time due to the increasing size of data sets, ranging from...
Named Data Networking (NDN), a revolution of the IP architecture, provides an information-centric routing for designing the unified Internet of Things (IoT) network protocol. However, the data forwarding scheme exploited by the current NDN generates lots of communication overhead and invalid caching hits, which is not suitable for IoT. This is because there exist large amounts of weak network devices...
Based on the researches, there is a high rate of fraudulent activities in the online auctions. For instance, this figure for 2008 was about $43M in the US. As a result it can be considered as a crucial problem. This issue has been always a concern of customers and users of the online auction. Due to interaction and mutual effects between Security and trust these two concepts need to be considered...
High-performance networking technologies and services are being rapidly developed and deployed across the nation and around the globe to support the transfer of large data sets generated by next-generation scientific applications for collaborative data processing, analysis, and storage. However, these networking technologies and services have not been fully utilized mainly because their use often...
A distributed framework for network forensics is presented in this paper, which tries to capture and store the digital evidence of the information leaking through the network. The architecture of the frame work is composed of the distributed data agents and the forensic center. The former can extract and compress the text of the content of all target network transmission, and the latter can locate...
In this paper we are interested to applied the adaptive neuro-fuzzy inference system (ANFIS) technique, which is realized by an appropriate combination of fuzzy systems and neural networks, for identifying and forecasting a set of input and output data of packet transmission over internet protocol (IP) networks. The obtained results demonstrate that the developed model presents the same statistical...
Whereas prefix hijacking is usually examined from security perspectives, this paper looks at it from a novel economic angle. Our study stems from an observation that a transit AS (Autonomous System) has a financial interest in attracting extra traffic to the links with its customers. Based on real data about the actual hijacking incident in the Internet, we conduct simulations in the real AS-level...
Traffic classification has become a crucial domain of research due to the rise in applications that are either encrypted or tend to change port consecutively. The challenge of flow classification is to determine the applications involved without any information on the payload. In this paper, our goal is to achieve a robust and reliable flow classification using data mining techniques. We propose a...
Multi-sensor data fusion has been an area of intense recent research and development activity. This concept has been applied to numerous fields and new applications are being explored constantly. Multi-sensor based Collaborative Click Fraud Detection and Prevention (CCFDP) system can be viewed as a problem of evidence fusion. In this paper we detail the multi level data fusion mechanism used in CCFDP...
With a majority of Internet traffic being predicted to be caused by content delivery, it is clear that content delivery applications will consume much of the resources on the Internet. This paper considers the problem of cost-efficient content delivery, in which the application incurs both a network delivery cost (e.g., from cross ISP traffic or, more generally, operation/energy costs at Internet...
As reliance on Internet connected systems expands, the threat of damage from malicious actors, especially undetected actors, rises. Masquerade attacks, where one individual or system poses as another, are among the most harmful and difficult to detect types of intrusion. Previous efforts to detect masquerade attacks have focused on host-based approaches, including command line, system call, and GUI...
The wireless networked sensors embedded with everyday objects will become an integral part of Future Internet, where the interaction among people, computer and those objects will shift the current Internet to a new paradigm, namely the Internet of Things. The terabyte torrent of data generated by billions of sensors belonging to a large number of distributed heterogeneous sensor networks in Future...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.