The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the detection properties of obfuscated network buffer overflow attacks by selected IDS and NBA. The obfuscation was performed by tunneling the malicious traffic in HTTP and HTTPS protocols with the intention of simulating the usual legitimate characteristics of the HTTP traffic's flow. The buffer overflow vulnerabilities of four services were used: Samba, BadBlue, Apache, DCOM...
RFC4893 defines the transition mechanisms to use 4 byte Autonomous System numbers. This RFC has some inconsistencies and has not been implemented correctly by all vendors. As a result, several major Internet incidents related with the handling of bogus 4 byte Autonomous System Numbers (ASNs) have ocurred. The last one was registered between the 17th and the 18th August, 2009. This paper analyses BGP-4...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Long-Term Evolution (LTE) is the next-generation network beyond 3G. Authentication service is one of the most essential services in LTE networks, which has significant effects on internet security. In this paper, we survey and compare three authentication protocols: Password Authentication Protocol, Lightweight Extensible Authentication Protocol, and Extensive Authentication Protocol-Transport Layer...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
This paper proposes a novel method to characterize Internet email traffic. We apply our mechanism to two different volumes of email traffic data captured respectively near an email gateway of a small company and at a country-edged core router of a large commercial Internet service provider in China. Experiment results show that there are significant abnormal email traffic in both the backbone link...
Network mobility is proposed to let a mobile network change its point of attachment and still keep all nodes attached to the mobile network globally reachable. However, due to finite bandwidth, limited signaling coverage and frequent link failure, a mobile network needs multihoming to access the Internet simultaneously on the perspective of performance and reliability. In this paper, we extends our...
The extended use of DMX512 protocol has been applied in many areas such as stage and theatre. While it has two inherent flaws in landscape lighting control: the quantitative limitation of control slots and slow bandwidth utilization ratio. This paper proposed the evolution of a management and control system for landscape lighting. By using the upper Internet management network, several lower DMX512...
Voice-over-IP (VoIP) is a key component of next-generation-networks and rapidly becoming more and more common in the Internet in general. This also increases the demand of VoIP operators for a scalable, distributed and flexible monitoring. But current monitoring architectures are either not designed for including application layer protocol analysis and data acquisition, or they are very specific and...
The ID/locator split concept has recently been introduced into the ITU-T Study Group 13's standardization activities for future networks. To contribute to ITU-T's this effort, we first propose a naming system, called host name and identifier system (HNIS). We show how host names and host identifiers (IDs) are generated and mapped to each other. We then present a new network architecture based on the...
In this work we present a model for online charging of media-rich services supporting dynamic QoS negotiation, within the third generation partnership project (3GPP) IP multimedia subsystem (IMS) emulated environment. In the QoS negotiation process a user, a network provider, and a service provider negotiate about the session to be initiated, resulting in an user-specific combination of media components...
Routers configure their paths based on the Link State Database (LSDB) in order to meet service requirements and Quality of Service (QoS) guarantee. Internet routing can be categorized into intra domain routing and inter domain routing, and QoS should be guaranteed both at the intra and inter domains for end-to-end QoS guarantee. The LSDB can be easily managed and updated at the inter domain routing...
IEEE P1900.4 is an emerging standard for optimized radio resource utilization where cognitive radio technologies are used for efficient spectrum utilization. In this paper, we design and implement a cognitive wireless network system based on open documents of IEEE P1900.4, and evaluate its performance using UDP streaming and HTTP download. Our experiments show interesting results that total network...
Most network operators have considered reducing Label Switched Routers (LSR) label spaces (i.e. the number of labels that can be used) as a means of simplifying management of underlaying Virtual Private Networks (VPNs) and, hence, reducing operational expenditure (OPEX). This letter discusses the problem of reducing the label spaces in Multiprotocol Label Switched (MPLS) networks using label merging...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.