The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-oriented monitoring research. In this paper, we release a fine-grained user request-centric open trace data set, called Trace Bench, collected on a real world cloud storage system deployed...
Emergence of honeynet, which is a network of honeypots, has changed the phase of internet security and information gathering about intruders. In improving deception of the honeynet which in turn increases the workload of attackers, most honeynet deployments are geared towards improving on the deception deal by using MAC addresses, IP addresses and protocols on host machine. Attackers gain access to...
Detecting anomalous behaviour in network flow data is challenging for a number of reasons, including both the computational demand associated with a large corporate network and the peculiar temporal characteristics of flow data. Relay-like behaviour refers to the rapid commencement of an out-going flow from a network device following the completion of an in-coming flow. This paper develops a computationally...
The Internet and university campus network construction and popularization not only brings the new challenges to college education has brought unprecedented opportunities. Ideological and political education informatization is the inevitable developing trend of information age, but in the process of the concrete implementation in our country due to reasons such as cognition, and experience a lot of...
We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates users responding to phishing attack attempts and prevents access to phishing sites from the protected network. Although PhiGARo processes the phishing...
Detecting polling behaviour in a computer network has two important applications. First, the polling can be indicative of malware beaconing, where an undetected software virus sends regular communications to a controller. Second, the cause of the polling may not be malicious, since it may correspond to regular automated update requests permitted by the client, to build models of normal host behaviour...
Unlike the current Internet where applications have little control over the path that their data travels, emerging network architectures enable applications to control the path their packets/flows take. Although an application can select its paths, providing an application with the up-to-date information needed to make an informed decision is a difficult problem. In particular, monitoring (i.e., collecting...
For monitoring ships, buoys and water levels information, a new waterway monitoring system is proposed. The pooled service and tile-caching technologies are further utilized to improve capacity of multi-user concurrent accessing and to speed up the chart displaying performance. In addition, based on ArcGIS nautical solution and ArcGIS server, data processing, standardized display and service publishing...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
Network security is being payed more and more attention nowadays, especially in the protection of enterprise intranet security has become the current research focus. This paper provides a method of monitoring illegal extra-connection of enterprise terminal devices based on flexible policy configuration, in the process, all the terminals that access to corporate intranet hosts and other devices will...
In this paper, we present an analysis of a new class of domain names: disposable domains. We observe that popular web applications, along with other Internet services, systematically use this new class of domain names. Disposable domains are likely generated automatically, characterized by a "one-time use" pattern, and appear to be used as a way of "signaling" via DNS queries....
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent...
Advanced Technology in the area of intrusion detection is the Honeypot technology that unlike common IDS s tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypot provide a platform for studying the methods and tools used by the intruders, thus deriving their value from the unauthorized use of their resource. To provide scalable, early warning and analysis...
In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network...
Tele-medicine service is playing an important role in near future. The rapid growth of information and communication technology (ICT) is an important driver to improve medical services. Moreover, a number of medical sensors/devices have been introduced. In this work, we study medical environments and infrastructure that affect the medical service quality and summarise the necessary services. Based...
Large-scale centralized network management, such as that of cloud computing, software-defined networking (SDN), and network virtualization is becoming increasingly popular. Thus appropriate interface devices are required in which new devices are incorporated together with legacy devices to facilitate large-scale network management. To accommodate the existing communication devices, which are not expected...
Server clustering is a common design principle employed by many organisations who require high availability, scalability and easier management of their infrastructure. Servers are typically clustered according to the service they provide whether it be the application(s) installed, the role of the server or server accessibility for example. In order to optimize performance, manage load and maintain...
In this paper, we present Reconfigurable Wireless Sensor Network (R-WSN), which will improve the reliability of wireless links in health monitoring system, providing reconfigurable features to all intermediate nodes. Reconfigurable devices permit remote and runtime software reconfiguration, which implies benefits in WSNs deployment and maintainability and, finally, cost reduction.
This paper demonstrates a bottom-up approach to developing autonomic fault tolerance and disaster recovery on cloud-based deployments. We avoid lock-in to specific recovery features provided by the cloud itself, and instead show that tools used in system administration today can provide the foundation for recovery processes with few additions. The resulting system, Hydra, is capable of detecting failures...
The needs of the research communities in research institutes and Higher Education (HE) establishments are demanding evermore powerful computing resources for supporting complex scientific and industrial simulation and modeling, manipulating and storage of large quantities of data [6, 9]. In this paper we present our experience at the University of Huddersfield (UoH), UK in developing the HPC systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.