Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS nor any anti spoofing software.
The rapid consumer adoption of high-speed Internet connections has lead to the unprecedented interconnection of home networks. Consequently, the number of domestic home automation networks offering Internet connectivity has increased. These home automation networks are increasingly comprised of resource limited wireless sensor networks (WSN). This creates the potential for malicious users from across...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
Network security problems emerge in an endless stream and cause the inestimable damage. To solve network security problems efficiently, it is not enough to make good protection at nodes or protect networks from outside attacks. Many network security problems should be solved efficiently in collaborative approaches which can integrate various resources over internet to defense network security. In...
With the growing demands for computer network communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various applications. The security...
Malicious behavior will lead to abnormal network traffic patterns. This paper presents a network traffic based method to evaluate the security situation of hosts. A group of variables that can reflect the network traffic feature in a fixed time window are selected as the evaluation metrics. Based on the large samples, we report on a preliminary proof-of-concept approach, that's logistic regression...
MANET has been a hot research topic for quite a few years. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. Applications for MANET range from military operations and emergency disaster relief, to community networking and interaction between attendees at a meeting. The challenge of MANETs is to design...
Through the analysis of shortcoming of self-adopting network security model P2DR, A new dynamic model WP2DR2C is put forward. Based on the model, NIPS gateway system is designed by cooperation of intrusion detection and traffic traction. In order to figure out accurate diffluence of subsystems among dynamic traffic, the paper proposes dynamic diffluence algorithm according to the features of NIPS...
Proxy mobile IPv6 has been proposed to enable a network-based mobility support which does not require a mobile host to be involved in mobility signaling. In the Proxy mobile IPv6 specification, an authentication procedure is required as an initial part of registration for network access. However, the current specification does not provide the authentication procedure explicitly. Thus, in this paper,...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.