The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
OpenFlow protocol allows researchers to use programmable networking techniques to flexibly assign networking resources and manage network traffic according to user demands. In this paper, by taking SAGE Visualcasting as an example user application, we propose that OpenFlow-based programmable networking can be interactively utilized together with other monitoring schemes to enhance the performance...
A proxy cache has quite a few difficult jobs to do. It is hard for people to effectively and efficiently do the maintenance work needless of mentioning the performance tuning work. In this paper we study the widely used proxy caching server--Squid. It suffers with well-designed tool to the management or evaluation of its performance or capability, which motivates us to design and implement friendly...
Botnets are emerging as the most significant threat facing online ecosystems and computing assets due to their enormous volume and sheer power. It is a major challenge for cyber-security research community to combat the emerging threat of botnets. Most of useful approaches for botnet traffic detection are based on passive network traffic monitoring and analysis. Nevertheless, typical network traffic...
This paper presents a visualization analysis tool for detecting, analyzing and responding to the Distributed Denial of Service attack termed the Domain Name Service (DNS) amplification attack. The tool integrates agent technology, visual analytics and interactive visualization techniques to allow users to interact with the system in real-time, to monitor the network traffic, to analyze traffic information,...
The collective behavior of network data segments corresponding to port 110 (e-mail) was visualized and analyzed with a set of nonlinear and computational parameters such as: Lyapunov exponent, fractal dimension, recurrence, determinism, grammatical rules, and lempel-Ziv complexity. Common methods for network data analysis are based mainly in descriptive statistics, although useful and widely accepted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.