The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scanning attack threatens the security of network communication severely. Traditional network communication usually uses static IP address configuration, which provides convenience to scanning attackers. In this paper, an IP Hopping (IPH) communication scheme is proposed based on software-defined network to solve this problem, in which IP addresses can be assigned to the hosts in the network dynamically...
Methods and ways to perform denial-of-service attack are analyzed and classified in this work. Famous Denial-of-Service attack classifications are reviewed and analyzed. New elements of modern DoS attack classification are proposed.
Network packet capture and analysis technology is a cornerstone of network security and protocol analysis technology. On the analysis of the LAN IP network traffic monitoring requirements, this paper detailed introduces the design ideas of traffic monitoring system based on WinPcap technology, expounds the key technologies and features in the process of system implementation, focusing on huge amounts...
Web Technology is the development of the mechanism that allows two or more computer devices to communicate over a network. To understand such a complex system there is a need of experiential learning. Authors adopted an "Experiential learning" for teaching the web technology course. Teaching with a hands-on session where the teacher explains the concepts with demonstration and students simultaneously...
The simplicity and high performance-to-cost ratio make Ethernet, the most dominant and widely deployed LAN technology. But, a single Ethernet network cannot scale to large networks such as enterprise, campus, data center and wide area networks because of broadcast based services like Address Resolution Protocol (ARP) and Dynamic Host Configuration Protocol (DHCP). The Software-Defined Networking (SDN)...
Current I/O devices communicate based on the PCIe protocol, and by default, all the traffic passes through the CPU-memory complex. However, this approach causes bottleneck in system throughput, which increases latency and power as the CPU processes device specific protocols to move data between I/O devices. This paper examines the cost of this centralized I/O approach and proposes a new method to...
Enhanced IP (EnIP) offers a solution to the problem of IPv4 address depletion without replacing IPv4, as IPv6 does, but by building on top of IPv4, maximizing backward compatibility. An experimental EnIP deployment between nodes at the University of Maryland and the University of Delaware, requiring neither software modification nor modification of in-path routers, demonstrates EnIP's potential.
This paper introduces based on 51 MCU Ethernet interface hardware circuit design and software implementation. Describes how to transplanting ZLIP protocol into the C8051F120 micro controller to debug and run, Experimental results show that the Ethernet system operated normally, better real-time data transmission and stability. This design provides a easy and low cost method of network interface design,...
Internet threat have different form of attacks, considering individual users to obtain control over data and network. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's threshold and overwrites it to neighboring memory. The techniques to avoid buffer overflow vulnerability...
Recently, peer-to-peer has been becoming a promising architecture for developing video streaming services because it can reduce the bottlenecks and the load at the server side. However, P2P systems implement their own routing protocols on overlay networks, which are largely independent of the Internet routing. As a result, the traffic generated by P2P systems is immense and unpredictable. Controlling...
In the future, production systems will consist of modular and flexible production components, being able to adapt to completely new manufacturing processes. This requirement arises from market turbulences caused by customer demands, i. e. highly customized goods in smaller production batches, or phenomenon like commercial crisis. In order to achieve adaptable production systems, one of the major challenges...
Formal verification of the trusted computing base of a software system is essential for its deployment in mission-critical environments. Commercial off-the-shelf routers are nowadays being used for managing traffic in high-assurance networks. The specifications for the development of these routers are provided by RFCs that are only described informally in English. It is essential to ensure that a...
Over the last 5 years the Communications Research Group at the University of Cape Town has been actively involved in IP Multimedia Subsystem (IMS) testbed research initiatives. This paper aims to describe the research work that was done within this testbed. The work ranges from work on an IMS client, IMS based services such as IPTV and Advertising, as well as network management work relating to QoS,...
CWMP (CPE WAN Management Protocol) as the protocol for remote management of home network devices and terminals, provides a safe remote auto configuration of end-user devices within WAN. In this paper, we introduce the CWMP in detail and describe the design and realization of a distributed network management system based on it, which provides network managers with a centralized remote management platform...
This paper describes BESIP (Bright Embedded Solution for IP Telephony) project. It was developed by LipTel team supported by CESNET. Primary goal was to implement multiplatform embedded SIP communication server with unified configuration interface. The paper explains and describes the whole concept and individual modules, acquaints with the current state and with the future intents. SIP server is...
In this paper we introduce some attack types, which can be led against VoIP traffic and we present protection forms against them. We have performed an experiment on the proposed protection model, which was focused on signaling DoS attack with aim to cause malfunction of the software exchange Asterisk. For attack we have used software tool SIPp as messages generator to flood the exchange with a huge...
Many protocols and communication standard appear in the Substation Automation System (SAS) world. Advanced communication standards a low the exchange of peer to peer information between primary devices in order to accomplish distributed automation application inside SAS. Evaluating the conformity of primary devices towards security and SAS architectures towards required specifications is a non trivial...
Current solutions for managing distributed applications in the cloud, typically covered by PaaS (Platform as a Service) offers, remain domain specific and are only partially automated. In this context, the task consisting in automatically configuring distributed applications is still a difficult issue. In this paper, we present an application architectural model and a self-configuration protocol that...
Internet is near to one of the most important changes in its existence — the migration of core protocol IP to a new version IPv6. Along with other changes, one of the important results is that the IPv6 network will no longer cares for fragmentation. According recommendations the sending node is responsible to select proper size of packets to send. Present paper proposes one possible way for software...
Recently, Internet use has increased rapidly especially in Asia, and the stock of IPv4 address has been exhausted. Fundamental solution for IPv4 address depletion is to migrate IPv6. However, since IPv6 is not compatible with IPv4 (such as address length, header structure), they can't communicate with each other directly. High Performance Packet Processing Engine (HPPPE) is a network processing software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.