The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
The IPv6 protocol is the next-generation IP protocol that addresses many of the shortcomings that exist in the IPv4 protocol. Some of the enhancements include increased address space, mandatory security and provisioning of stateless auto-configuration, a technique through which a new node forms its own address without the assistance of centralized host configuration servers operating in the network...
In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane,...
Network testbeds for developing, deploying, and experimenting with new network services have evolved as recent rapid progress in virtualization technology. This paper proposes a new testbed for enabling experiments with end-systems, or peers, at the edge, often located in private networks behind firewalls. The existing testbeds such as PlanetLab and CoreLab consist of only nodes in the public Internet,...
Traditional NAT traversal methods require the help of a third party for signalling. This paper investigates a new autonomous method for establishing connections to peers behind NAT. The proposed method for autonomous NAT traversal uses fake ICMP messages to initially contact the NATed peer. This paper presents how the method is supposed to work in theory, discusses some possible variations, introduces...
Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals -- to one or more DNS servers -- the origin and the target of that query. Over time, users' communication (e.g., browsing) patterns might become exposed to entities with little or no trust. Current DNS privacy leaks stem from fundamental features of DNS and...
In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement...
A hierarchical of 160-bit ID space is constructed based on the node's location information (network heterogeneous) and the node's processing capability (node heterogeneous) etc. The problem of the topology consistency is solved by making the hierarchical ID space compatible with that of the physical network. The relay of weighed reputation method is used to realize the storage and collection of the...
As an alternative solution to solve the tussles between the network operators and the peer-to-peer (P2P) applications, an informed peer selection (IPS) scheme like P4P is proposed. In IPS, each network operator installs a server that provides their network information to the peers as a guidance for peer selection and each peer chooses its communicating partner based on the guidance. Most existing...
Network security problems emerge in an endless stream and cause the inestimable damage. To solve network security problems efficiently, it is not enough to make good protection at nodes or protect networks from outside attacks. Many network security problems should be solved efficiently in collaborative approaches which can integrate various resources over internet to defense network security. In...
Today many Peer-to-peer (P2P) applications are widely used on the Internet. Especially file sharing is a popular P2P application that has, at least partially, replaced the centralized file sharing infrastructure. However, there are still a number of legacy applications that utilize a centralized infrastructure as opposed to a decentralized approach. In this paper we present a generic framework for...
Session Initial Protocol (SIP) is widely used for handling multimedia signaling. Because SIP is widely used in many multimedia applications, it becomes an attractive target to attackers. Actually, in contrast to traditional telephone networks, SIP works at the application layer in IP networks. It is thus faced to not only the IP-networks security issues, but also to new issues which are related to...
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting these networks from intruders and attackers is a real challenge. One of the constant threats on P2P networks is the propagation of active worms. In 2007, Worms have caused damages worth the amount of 8,391,800 USD in the United...
In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used...
The diameter base protocol, originally developed by the Internet Engineering Task Force (IETF), provides the authentication, authorization and accounting (AAA) functionality needed for network access and mobility in IP-based networks. Diameter has also been adopted by the Third Generation Partnership Project (3GPP) and other standards bodies as an AAA framework in the IP multimedia subsystem (IMS)...
In this work wepsilare dealing with security in highly distributed systems, namely in peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of Malware spreading. Also we are proposing our system for automatic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.