The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the past decade, numerous systems have been proposed to detect and subsequently prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly detection solutions are limited to a subset of the traffic due to scalability issues, hence failing to operate at line-rate on large, high-speed datacentre networks. In this paper, we present a two-level solution for anomaly...
In this paper, we propose the use of prefix visibility at the interdomain level as an early symptom of anomalous events in the Internet. We focus on detecting anomalies which, despite their significant impact on the routing system, remain concealed from state of the art tools. We design a machine learning system to winnow the prefixes with unintended limited visibility — symptomatic of anomalous events...
A system for protecting web resources on web site server is proposed. A few number of protection system have been developed over the past decade. However, because of the insecurity of internet, these traditional systems are quite fragile under the attacks from internet. We propose a protection system for protect the recourses on web site server by combining the hash signature algorithm and digital...
Internet congestion existing solutions such as active queue management algorithms have many shortcomings, mainly related to the detection phase. These algorithms depend on routers' buffer statistics to detect congestion and their performance is highly affected by the environment and the parameters that are used. In this paper we are proposing a mechanism that is capable of detecting congestions by...
GARSON is a new approach to autonomic and cognitive network management. This paper describes the main features of GARSON and its position among similar approaches. GARSON consists of several ‘planes’ playing different roles in the network management hierarchy. The autonomic monitoring plane and autonomic actuating plane of GARSON are described in more detail. The basic structure of GARSON network...
This paper presents the Content Aware Network designed as one of the Parallel Internets developed on Virtual Infrastructure. The CAN is a post-IP network designed to facilitate access to multimedia content in large scale environment. We introduce the proposed CAN network architecture and discuss mechanisms and algorithms required to assure ubiquitous content access and efficient content delivery....
One of the key research items of Content-Centric Networking is how to develop more efficient cache replacement policies, and most of the existing approaches have their foundations with dated web environments while considering little of the dynamicity of user interests. In this paper, we propose a new cache replacement policy, named as the “Recent Usage Frequency (RUF).” In order to deal with dynamic...
Network topology measurement is the basis of network management which makes better use of Internet for people. Using Trace route tool is the traditional way to get information about the network topology. However, Trace route sends numerous packets into the network which increases the network load. In order to reduce the amount of duplicated packets, this paper presents an algorithm named BST. According...
In this paper, the application of telemetry system is presented. The main goal of the work is multiposition systems of computer science, integration dispersed database servers and other functionalities. The proposed system can support the distribution of electricity. Investigations indicate the high efficiency of the data identification on the basis the agglomeration of the very large number of IEPN...
Intrusion detection (ID) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. Internet services, and the number of Internet users increases every day this makes networks as a window for...
Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. However, the majority of past research has failed to indicate how long or how many packets it takes for the monitor to detect a stepping stone....
Aiming at the problem, which it is difficult to monitor the medicine trade information on Internet, proposed a combined strategy that searched specific topic on the Internet based on analyzing focused crawler's searching algorithm. The combined strategy includes page-searching and relativity analysis. Page relativity algorithm adopts improved Fish-Search algorithm; Relativity analysis adopts distributed...
Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday. However, there have been serious security problems and network failures that are hard to resolve, for example, botnet attacks, polymorphic worm/virus spreading, DDoS, and flash crowds. To address many of these problems, we need to have...
Based on the deep analysis of Email protocol characteristics, an email auditing system is designed and implemented. By means of packet capture technique, E-mail monitoring algorithm, and web-mail monitoring algorithm, the presented auditing system can monitor E-mail and Web-mail. At the same time, the problem raised by version upgrade of Web-mail is resolved by means of adding new rules based on protocol...
With the wide use of Internet, network attacking is also becoming complicated and frequent. Traditional antivirus solutions such as gateway and desk prevention could not meet the requirement of network security of users. This paper proposes a kind of measure which can scan web-virus with advanced virus-scanning engine in collaboration with gateway and firewall. ICAP Client module utilizing ICAP protocol...
At present, harmful information promulgated on the internat has become an important social proble, which not only poisons people's mind, but also might effect social stability and country security. In order to reinforce the control of the network infromation and guarantee the security of the content promulgated on networks, the paper proposes a content-based network monitoring system. This paper first...
With the rapid development of the Internet and Data Storage technology, people intends to store a large number of documents of various types on their PCs, but having no way to manage such heterogeneous data sources in a integrated way, such as data in more structured sources (e.g., spreadsheets), semi-structured sources (e.g., XML documents) and unstructured sources (e.g., text documents). This paper...
The knowledge of traffic behavior characteristics of every application has vital effect on the accuracy and granularity of application identification. Based on analyzing the Chi-Square Statistics, a novel method named ABSA is proposed to analyze the traffic behavior characteristics of applications. The ABSA method does not focus on any certain applications; in contrast, it aims at providing a quantitative...
In this paper, a novel intrusion behavior analysis mechanism based on the design of honey pot and the diagnosis of ant colony algorithm has been proposed. In which, there are monitor module, track module, and analysis module developed. The intrusive behavior is then analyzed through the above modules. In the developed honey pot, all of the architecture, database, directory, security parameters are...
This paper introduces the NCSLab (Networked Control System Laboratory) at http://www.ncslab.net, which provides a complete Web-based solution for users to carry out experiments on experiment devices located globally. A scalable and service-oriented architecture which is composed of Web browsers, central Web server, MATLAB servers, regional experiment servers, control units and experiment devices is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.