The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management. The problem has been faced by many researchers, but still remains an open field, since a general solution has not been found yet. In this paper we want to demonstrate as the performance of well-known methods for network...
Identifying network traffic accurately and efficiently is crucial for network management and security. Though several identification methods were proposed recently, none of them is shown to be better than all others and recognized as a de facto one. In this paper, an analysis of existing methods is given, and then a Perfect Protocol Finite State Machine (PPFSM) that can describe different identification...
TCOMS (the telecom comprehensive operations management system) is one of the support systems in operation and production of telecom-company, which not only covers wide area, but also has a complex construction and Internet connection. So, this kind of network, involving important information transportation, requires safety guarantees. In view of the importance, this paper puts forward a network safety...
IT infrastructure is a core asset to many organizations Internet is a global communication medium. The stability and security of network is very important. A well establish a secure infrastructure would help your network safe from intrusion from any source any place. Protection of resources is an important aspect of any computer system. Harnessing and configuring security policy is an important role...
In the last few years, several new IP applications and protocols emerged as the capability of the networks to provide new services increased. The rapid increase in the number of users of peer-to-peer (P2P) network applications, due to the fact that users are easily able to use network resources over these overlay networks, also lead to a drastic increase in the overall Internet traffic volume. An...
In recent years, traffic monitoring and especially anomaly estimation have constituted an open problem in the network community. This paper proposes to design an observer-based sliding mode control for time delay systems representing TCP fluid flow model. The main advantage of the sliding observer lies in estimating, in a finite time, system states while exhibiting fundamental robustness against perturbation...
During the last years, Internet facilities like email, the world-wide-web (WWW), and e-commerce have generated a boost of Internet growth, making offering services possible in fundamentally new ways. One of these services is Voice over IP (VoIP), also named Internet Telephony (IP telephony). With most major telecommunications carriers preparing for VoIP mass deployment, the security of service cannot...
In this paper we propose an IP traceback mechanism based on deterministic packet marking and logging, using protected nodes set to reduce logged data amount. The proposed scheme exploits the fact that the number of nodes that may be under attack is usually limited to a small fraction of total nodes in the Internet, greatly reducing storage requirements by logging only the traffic destined to this...
We discuss the near-term and far-term security, trust and dependability challenges in wireless and mobile telecommunications, in an always-connected environment. We identify some relevant technological and threat trends and propose research priorities in order to solve and respond to the future security-related challenges. Threat trends include increase of complexity and connectivity and challenges...
A mechanism to control cooperative actions in multi-agent systems for network management systems that consists of agents managed by different network management authorities (NMAs), such as ISPs and universities, is presented. In spite of cooperative work among NMAs being indispensable for Internet management, NMAs do not always trust or coordinate with each other because their intentions or policies...
Designing a networked system (NS), which consists of various network equipments and uses LAN technology, has become increasingly important. However, there have been few studies on NS design. Our previous study suggests that a well managed NS from an access control viewpoint has a fixed degree distribution, regardless of connection restriction. In this paper, we find an approximation function of its...
Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers, since a major bottleneck in building such routers is the lack of large optical memories. However, reducing buffer sizes might pose new security risks: it is much...
Reliable Server Pooling (RSerPool) denotes the new IETF standard for a lightweight server redundancy and session failover framework for availability-critical applications. A number of research papers have already addressed the service and pool management performance of RSerPool in general. However, the important topic of security, including the system robustness against intentional attacks, has not...
The advances of network technology bring many more kinds of network form, such as SDH network, PON network, video network, power network and so on. On the one hand it leads to the network complication and on the other hand also puts forward higher requirement on business network management system. Database-centric network management would improve network security and reliability; provide effective,...
As a opening global network, Internet now is facing more and more attacks and complex methods of attack, which causes the network security problem becoming the focal point that people pay attention to.The single firewall strategy can not satisfy the need of network security, intrusion detection system which is used at present has very high rate of false alarm. However, intrusion detection system based...
With the advent of concept of trustworthy networks, discussions on its supporting technologies have become a new focus of research. This paper proposes a new trust mechanism for the routing systems of trustworthy networks. Presently, study of trust is mostly based on the trust of "hard" security. While behavior trust is classified into the category of "soft" security. This paper...
The Internet Protocol version 6 (IPv6) protocol represents an emerging networking capability designed to enhance transport, management and security of IP packets through the networks. IPv6 packet header required for this protocol is much larger than that of the current IPv4 protocol. The processing of IPv6 packets can be complex depending on how many packet header options are needed for a given mode...
Group key management is a fundamental building block for secure group communication. Several group key management techniques are designed to provide a common group key either in small groups, so called dynamic peer groups (DPG), or in large groups but not in both. The Multicast Internet Key Exchange (MIKE) has been introduced to address this issue. The advantage of MIKE is the integration of two key...
The coupling of mobile ad-hoc networks (MANETs) and the Internet is gaining attention by researchers working towards future ubiquitous computing environments. In this work, we focus on the situation that occurs when specialized, sensitive data are sent to the Internet from MANET nodes. These special data types are especially susceptible to security risks such as information leak and data falsification...
Wireless Mesh Networks (WMNs) have revolutionized the provisioning of broadband wireless Internet service to a community of users. A group of static mesh router automatically interconnect themselves to form a Web of connection and employ multi-hop forwarding to connect to the Internet Gateway (IGW). Thus, we see that is critical to establish and ensure a collaborative framework at the MRs. All existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.