The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Semantic web technologies have gained some spot-light in recent years, mostly explained by the spread of mobile devices and broadband Internet access. As once envisioned by Tim Berners-Lee, semantic web technologies have fostered the development of standards that enable, in turn, the emergence of semantic search engines that give users the information they are looking for. This paper presents the...
The emergence of network virtualization solves the problem of ossification. At the same time, it provides endless possibilities for the innovations of the network architecture. As a result, it has attracted the attention of the next generation Internet architecture. Therefore this paper based on the architecture of For CES to explore the implementation of the data plane virtualization and provide...
With the proliferation of Internet access across the globe, as well as the advancement of many new devices and next generation networks, there is no surprise that malware infection via web browsing is still one of the most significant threats to Internet users today. Over the past several years we have also seen the increase in advanced targeted attacks against corporations which steal intellectual...
The use of Network Function Virtualization to run network services in software enables Software Defined Networks to create a largely software-based network. We envision a dynamic and flexible network that can support a smarter data plane than just simple switches that forward packets. This network architecture needs to support complex stateful routing of flows where processing by network functions...
Network Intrusion Detection Systems (NIDS) and Anti-Denial-of-Service (DoS) employ Deep Packet Inspection (DPI) which provides visibility to the content of payload to detect network attacks. All DPI engines assume a pre-processing step that extracts the various protocol specific fields. However, application layer (L7) field extraction is computationally expensive. We propose a Deep Packet Field Extraction...
LWM2M is an emerging Open Mobile Alliance standard that defines a fast deployable client-server specification to provide various machine to machine services. It provides both efficient device management as well as security workflow for Internet of Things applications, making it especially suitable for use in constrained networks. However, most of the ongoing research activities on this topic focus...
Carrying out network monitoring tasks remains a continuous challenge, partially because the line rate reaches and exceeds 100 Gbit/s. Besides the increasing data rate, the advent of programmable networks necessitates efficient solutions for supporting packet processing tasks in an adaptive way. Introducing a modification of a protocol or any new protocol in such a flexible infrastructure implies a...
Modern car engine has a control unit that serves to control all aspects of the car known as the Engine Control Unit (ECU). The control unit was developed by the manufacturer to assist in optimizing engine performance, and has proven to be very useful Unfortunately, the existence of ECU means independent repair shops can't do engine repair and maintenance without help from manufacturer. This paper...
Rapid growth of internet technology made many IaaS providers arise across the globe to meet the needs of small IT companies. Number of IT companies started using resources of IaaS provider due to elastic and pay as you go nature. Increasing number of cloud providers results in difficulty for requester to select suitable cloud provider based on requirements. In this paper we present a broker based...
This paper covers the first steps in creating a Software Defined Open Architecture Modem (SDOAM). Potentially useful operating environments, platforms and approaches are reviewed as well as relevant work on underwater digital communications at CMRE, including JANUS. A high-level architectural structure, based on a generalisation of the classic OSI communications stack, is proposed, identifying the...
Network security refers to any activity designed to protect the network. These activities intend to protect the usability, reliability, and safety of network and data. Effective network security targets a variety of threats and stops them from entering or spreading on network. In network security, Complex Event Processing (CEP) system can be used for correlating events across different security devices...
Among the current information security prevention systems such as firewalls and intrusion detection systems, there exist several shortages such as alert overload, high false alarm rate, absence of effective alert management mechanism etc. As a result, there is a tremendous amount of alert data overload in the network, and this data could be redundant, irrelevant or meaningless. The result of this...
There is increasing interest in using terminal architectures capable of supporting multiple networks. A terminal that is episodically present on a network is a new situation for most Network Managers and for computer network defense needs. Likewise, having to accommodate interaction with multiple network managers is a different paradigm for the terminal. This paper discusses the kinds of node architecture...
Proposed by Joseph Mitola III in 1999, Cognitive Radio (CR) has been considered as a promising solution for intelligent and efficient utilization of scarce spectrum in the communication world. CR brings about flexibility and self-adaptability to networks, by deploying most of functions on software. As the future communication era enables efficient utilization of radio resource, shrewd management of...
A key challenge in developing RESTful Web systems is the lack of software development frameworks that support REST principles. This article gives practical guidelines for designing frameworks for developing such systems. Derived from intuitive formal models, these guidelines enable a development process that improves separation of concerns and the modifiability of developed systems. The authors analyze...
Although large scale high performance computing today typically relies on message passing, shared memory can offer significant advantages, as the overhead associated with MPI is completely avoided. In this way, we have developed an FPGA-based Shared Memory Engine that allows to forward memory transactions, like loads and stores, to remote memory locations in large clusters, thus providing a single...
Network evolution towards self-aware autonomous adaptive networking aims at reducing the burden of configuring and managing networks, which leads to performance degradation. In order to optimize network operations, the introduction of self-awareness, self-management, and self-healing into the network was proposed, leading to a novel paradigm in networking - known as cognitive networking. This paper...
We propose a scalable framework for triple M routing in dynamic optical networks and first experimentally demonstrates a DREAM-based optical transport network with 1000 control plane nodes and multi-terabit per second ODUk electrical cross-connects.
This report describes NotX — service oriented system, that applies ideas of CEP and SOA to build highly reusable, flexible, both platform and protocol independent solution. Service oriented system NotX is capable of notifying users of external information system via various engines; currently: SMS engine, voice synthesizer (call engine) and mail engine. Adaptable design decision makes it possible...
The heterogeneity and complexity of modern networks and services urge the requirement for flexible and scalable security systems, which can be dynamically configured to suit the everchanging nature of security threats and user behavior patterns. In this paper we present a distributed architecture for an Intrusion Detection System, allowing for traffic analysis at different granularity levels, performed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.