The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
The Locator/Identifier Separation Protocol (LISP) separates classical IP addresses into two categories: one for identifying terminals, the other for routing. To associate identifiers and locators LISP needs a specific mechanism, called mapping system. This technology is still at an early stage but two experimental platforms have already been deployed in the Internet: LISP Beta Network and LISP-Lab...
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
Accurate information about address and block usage in the Internet has many applications in planning address allocation, topology studies, and simulations. Prior studies used active probing, sometimes augmented with passive observation, to study macroscopic phenomena, such as the overall usage of the IPv4 address space. This paper instead studies the completeness of passive sources: how well they...
Content Delivery Networks (CDNs) are able to improve user-oriented application performance through caching and anycast routing or DNS-based user mapping mechanism. With the fact that BGP is widely used for inter autonomous system (AS) routing for CDNs, there is a middle mile bottleneck problem, which cause by the nature limitation of BGP. To solve this problem, we propose an SDN-based tunnel multi-path...
The Technology is increasing day by day. Modern technology gives better solution to busy working people. Now a days, houses are equipped with variety of appliances like personal computer, switches, doorbells, Ovens, Televisions, LED lighting, Water heaters, HVAC (Heating, Ventilation, & Air Conditioning)etc. It becomes difficult to monitor all the appliances at a time. Sometimes if no one present...
The modern world is facing a problem of monitoring transportation of vehicles, cargo and people. In order to prevent burglaries, to optimize logistics and to raise general safety level it is of utmost importance to find ways of tracking positions of objects. Despite the fact that a few solutions have already been provided, they all have a number of shortcomings, including the high cost, short battery...
Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers known as “bots” or “zombies”. DDoS attack occurs by...
The use of Internet has been increasing day by day and the internet traffic is exponentially increasing. The services providers such as web services providers, email services providers, and cloud service providers have to deal with millions of users per second; and thus, the level of threats to their growing networks is also very high. To deal with this much number of users is a big challenge but...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
Nowadays, many school teachers start to execute E-testing in classrooms due to its time and labor-saving. It is not easy that teachers want to block access to the Internet for online cheating activities. Therefore, an offline E-testing system is needed. However, existing offline E-testing systems are always developed ad hoc for particular purpose and procedures. This paper presents a general-purpose...
Distributed Denial-of-Service (DDoS) attacks continue to constitute a pernicious threat to the delivery of services within the Internet domain. These attacks harness the power of thousands, and sometimes tens or hundreds of thousands of compromised computers to attack web-services and online trading sites, resulting in significant down-time and financial loss. The problem of detecting DDoS attacks...
In this work we propose a web-based FM broadcasting monitoring system. Our system provides several tools to do the monitoring of the FM broadcasting station content remotely via web. One of them is the capability to tune the frequency to the particular station frequency and record the broadcasting content when the DJ (disk jockey) is on the air. Some recording qualities are available that allows users...
Trend in the usage of Vessel Monitoring System (VMS) device is very low. The root causes of this problem are the high financial burden of VMS device toward fishermen and the lack of VMS device functionality for fishermen. In this paper, we propose a new working mechanism for VMS to address the imbalance mutual relationships in current VMS schema, using secure Bring Your Own Device (BYOD) schema and...
The analysis of the threats of identity theft and infection of websites indicates that antivirals are ineffective for websites, because hosting does not conduct continuous monitoring for viruses on their servers due to large amounts of user data, and RAID cannot save data, because they only duplicate them, and in the case of infection with a virus they merely memorize a changed file. We have developed...
The proposed NMS, called ITB NMS, is a web-based centralized management system used to manage and monitor the current condition of the entire existing network infrastructure clearly and concisely. ITB NMS is used to monitor a device or devices connected to the network-based LAN, WAN or Internet. ITB NMS is able to monitor the condition of a device or monitor the activities being performed by a device...
The Public Participation Geographic Information System (PPGIS) is an important component of GIS. It not only has the spatial decision function of traditional GIS, but also emphasizes the group participation of general public. In view of the dispersion, diversity and complexity of agricultural environmental monitoring objections, the article puts forward the work idea of agricultural environmental...
A health monitoring system is proposed with the aim to provide health monitoring with minimal location and time constraint for the elderly. The challenges in continuously monitoring health faced by conventional medical practice is expected to be solved using this vest-based system, as it is capable to obtain health parameter from its wearer and channel it to a remote web and database server anytime...
The solar street lamp system using GPRS and ZIGBEE technology is designed in this paper. The street lamp management system is composed of GPRS wireless mobile network and ZIGBEE short-distance wireless network. Users can view the real-time parameters of street lamps on the computer (or mobile phone), and at the same time, can also set up some working parameters (e.g., working mode, voltage of turning...
A video streaming system with over-the-top delivery has to select the servers that handle the service requests such that the content is delivered with the desired quality and system resources are efficiently used. Server selection can be formulated as a multi-criteria optimization problem, but solving this problem requires dynamic information about system resources. In this paper, we study the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.