The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With Java runtime-based application has been widely used in our enterprise application and mobile computing.We must maintain many machines in different types, like web server cluster,distributed database,virtual machines,hosting machines and so on.Cloud computing technology has been designed to manage those resources in efficiently way. Client agent can be installed in those host machines or virtual...
The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the cooperation of multiple components. Similar solutions cause a multiplication of alerts, thus increasing the time needed for alert management and hiding the few critical alerts as needles in a hay stack. We propose an innovative...
Based on the currently P2P(Peer to Peer) traffic identification, this paper established a initiative monitoring model to monitor specific information based on hybrid P2P network, which detects the existed specific information on hybrid P2P network by positive monitoring method, to get the audience information related to specific information. By mathematic analysis to the audience information to monitor...
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and study address-misconfigured P2P traffic, a major class of such misconfiguration. P2P address misconfiguration is a phenomenon in which a large number of peers send P2P file downloading requests to a ``random'' target on the...
Based on the analysis of QQLive protocol, an active monitoring based QQLive real-time information acquisition system was presented by the in-depth study of characteristic message and characteristic payload in the communication process of QQLive. The system acquires the channel list and program information, at the same time monitors the viewing user information by forging the client to send message...
Tycho was conceived in 2003 in response to a need by the GridRM [1] resource-monitoring project for a ldquolight-weightrdquo, scalable and easy to use wide-area distributed registry and messaging system. Since Tycho's first release in 2006 a number of modifications have been made to the system to make it easier to use and more flexible. Since its inception, Tycho has been utilised across a number...
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less false positives than existing network security event detectors (e.g. IDS). We proposed a network security event detection method by analyzing correlation among multiple sessions. Our method can recognize hosts behaviors by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.