The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In spite of significant on-going research, the Border gateway protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP prefixes for ASes (Autonomous Systems). In this context, a number of research studies focused on securing BGP through historical-based and statistical-based behavioural models. This paper suggests a novel method based on tracking...
Internet Protocol Security (IPSec) is a standard suite of protocols defined by Internet Engineering Task Force (IETF) to provide security which includes data authentication, integrity, and confidentiality. IPSec provides data security at the IP packet level. IPSec developed for IPv6 as well as for IPv4. IPSec protocol provides an elegant solution to the security problem of IP protocol, at IP layer...
BGP hijacking is a well known threat to the Internet routing infrastructure. There has been considerable interest in developing tools that detect prefix hijacking but such systems usually identify a large number of events, many of them being due to some benign BGP engineering practice or misconfiguration. Ramachandran et al. [1] and later Hu et al. [2] also correlated suspicious routing events with...
Since several years the number of VoIP (Voice over IP) infrastructures increases and, consequently, the number of VoIP users increases too. Under these circumstances VoIP systems get more and more attractive for attackers, since the probability of successful attacks increases and attackers gain benefits, e.g., money with fee-based telephone numbers. Therefore, this paper describes a solution to capture,...
Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals -- to one or more DNS servers -- the origin and the target of that query. Over time, users' communication (e.g., browsing) patterns might become exposed to entities with little or no trust. Current DNS privacy leaks stem from fundamental features of DNS and...
DNS Servers significantly play a vital role in Internet and Intranet environments. It translates human-friendly names into IP addresses and vice versa. However, propagation processing of any change in DNS Server takes hours and days for its full global-wide implementation in both the versions of IP addressing scheme. This is the age of fast communication where bulk of data communication occurs globally...
IPsec is also an important security protocol for next generation Internet (NGI) and it has become a hot topic in security communication research to increase IPsec's performance without any security decreasing. In this article, we analyze the implementation of IPsec's security policy database (SPD) and its searching method. We also proposed an optimized design for the SPD with hash table based on chaining...
Many Websites on the Internet are based on database, especially Websites which use database to display the pages actively such as ASP, PHP and JSP. However, because of SQL attack, people pay much attention to the security of database on the Internet. Different from many protection systems deployed between Web servers and Internet, this article designed a database protection system between Web server...
This paper proposes an IP trace analysis system based on code moving (IP_TASCM) for sharing Internet measurement, tools and dataset. However, two characteristics differentiate it from other prior similar systems. One of them is that besides the common catalog service, IP_TASCM also stores tools, datasets and measurement results together for researchespsila download and analysis. The other one is that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.