The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
DNS provides a global-scale distributed lookup service to retrieve data of all types for a given name, be it IP addresses, service records, or cryptographic keys. This service has proven essential in today's operational Internet. Our experience with the design and development of Named Data Networking (NDN) suggests the need for a similar always-on lookup service. To fulfill this need we have designed...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
In the view of converged fast-wired and fast-wireless networks (5G) with a transparent multi homed point of access to the Internet, new scenarios must be considered in the near future. In particular, this paper focuses on an Internet access leveraging simultaneously on different technologies such as ADSL, cable, WiFi, 3G/4G, satellite links, to offer a combined connectivity service. Some solutions...
The Internet of Things (IoT) ecosystem, is constantly growing and attracting interest for next generation information and communication infrastructures. In this paper we focus on the exploitation of IoT platforms for remote healthcare status monitoring within the context of the so called connected health applications. In this context users and most importantly healthcare service providers and first...
Open communications over the Internet pose serious threats to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks. Unfortunately, existing censorship circumvention systems do not provide high availability guarantees to their users, as censors can easily identify, hence disrupt, the traffic belonging to these systems using today’s advanced...
Distributed Denial of Service (DDoS) attacks employing reflected UDP amplification are regularly used to disrupt networks and systems. The amplification allows one rented server to generate significant volumes of data, while the reflection hides the identity of the attacker. Consequently this is an attractive, low risk, strategy for criminals bent on vandalism and extortion. To measure the uptake...
The internet is more than 45 years old and it's starting to show its age. To be sure, it has served us wonderfully well. Its underlying technologies delivered the World Wide Web (still a young adult at around 28 years old) and our global communications network. Even as its user base has swelled to 3.4 billion, these technologies have scaled admirably. n Today, however, all of those users demand a...
Although people think that their identity is not revealed on the internet, the confidentiality and protection of personal information on unreliable networks such as the internet is an important question. In this study, a sample application on network packet tracing and analysis of network cameras with Wireshark program is realized to show how partial access to personal information and location information...
This paper proposes a Domain Name System (DNS) Name Autoconfiguration called DNSNAv4 for Internet-of-Things (IoT) Devices in Internet Protocol (IP) version 4 (IPv4). The manual configuration of domain names of devices might be a cumbersome burden for users as the number of devices increases. A legacy scheme called DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register DNS names...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
To better understand the Internet infrastructure services is crucial to the design, operation, and management of Internet applications. The lack of better understanding of the actual usage of allocated IP addresses is among many such challenges, due to the wide deployment of IP address multiplexing techniques, such as NAT. To address this issue, we propose a novel analysis approach based on large-scale...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. As the study for solving this problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. As one scheme...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
The trend of SCADA (Supervisory Control And Data Acquisition) is to centralize more regional sites into one Main Control Center (MCC), in order to increase the efficiency. Due to the geographical distribution of the sites locations, the most common communication method with MCC is GSM (Global System for Mobile Communication) network. Predicting network performance over a GSM network depends on the...
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours. These opportunistic attackers enumerate blocks of IP addresses in hope of discovering an exploitable host. Fortunately, defensive measures such as port knocking...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
This paper mainly introduces the basic functions of DNS, and its usage for mapping service in the Identifier Locator Split (ILS) schemes, as one transitionally functional component in future network architecture. As well known, the overloaded semantics of IP address, being used for both endpoint identifier and routing locator in traditional internet, has hindered the smooth support for mobility of...
The vision behind the Internet of Things (IoT) is that any things that need communications, are universally connected, and becoming an integral part of the future Internet. However, the existing of Low Power Networks (LPN) consisting of battery-powered nodes poses great challenge for traditional addressing and routing protocols. The paper proposes a geographical topology-enabled IPv6 addressing framework...
In this paper we present a time behavioral analysis of a simulated botnet network traffic, collected and discovered from NetFlow messages. More specifically said - lifespans. The technique, which we used, is focused on to model command and control communication in a botnet network. The lifespan of this referred traffic is modeled by lifelines using Python language.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.