The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collecting network traffic traces from deployed networks is one of the basic steps in understanding communication networks. Traffic traces are used for network management, traffic engineering, packet classification, and analyzing user behavior to ensure adequate quality of service. Monitored traffic traces should be anonymized for privacy and security reasons. The goal of anonymization is to preserve...
Routing is the process of selecting path in a network along which to send network traffic. Routing is performed for many kinds of network, including the telephone network, electronic data networks, and transportation networks. it involves two basic activities: Determining best path and forwarding packets through these paths. The internet routes packet one at a time, some of these packets may be delayed...
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network interface as the host portion, or interface identifier (IID). Static IID assignment provides third parties (whether malicious or not) with the...
Internet is facilitating numerous services while being the most commonly attacked environment. Hackers attack the vulnerabilities in the protocols used and there is a serious need to prevent, detect, mitigate and identify the source of the attacks. Network forensics involves monitoring network traffic and determining if the anomaly in the traffic indicates an attack. The network forensic techniques...
This paper proposes an IP trace analysis system based on code moving (IP_TASCM) for sharing Internet measurement, tools and dataset. However, two characteristics differentiate it from other prior similar systems. One of them is that besides the common catalog service, IP_TASCM also stores tools, datasets and measurement results together for researchespsila download and analysis. The other one is that...
Recently, network resource has become extremely vulnerable to denial of service (DoS) and distributed denial of service (DDoS) attacks, which have become a pressing problem due to scarcity of an efficient method to locate the real attacker. Especially, as network topology becomes more advanced and complex, IP traceback is difficult but necessary. For protection against DoS/DDoS even partial information...
The Intrusion Detection Systems (IDSs) play an important role in monitoring networks, but they lack abilities in automated intrusion response; the Intrusion Prevention Systems (IPSs) can guard networks in entrance, but they have no abilities in response inner-intranet attacks; many proposals focus on solutions in automated intrusion response, but they still have various problems existed, the main...
In order to effectively manage network resources and to serve different traffic needs, several works have been done in the QoS area. Basically, ldquomulti-field (MF) packet classifiersrdquo classify a packet by looking for multiple fields of the IP/TCP headers, recognize which flow the packet belongs to, and according to this information, provide service differentiation in IP networks. However, for...
Voice and telephone communications over IP networks are nowadays known as well established technologies, especially from the point of view of protocol architecture and voice compression algorithms. However, there are still several aspects in their security that need to be investigated. A personal voice communication should ensure authenticity and privacy; they may be provided by means of different...
In the last few years, the number and impact of security attacks over the Internet have been continuously increasing. To face this issue, the use of Intrusion Detection Systems (IDSs) has emerged as a key element in network security. In this paper we address the problem considering a novel statistical technique for detecting network anomalies. Our approach is based on the use of different families...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.