The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interplanetary Network defines the architecture and protocols necessary to permit inter-operation of the Internet residents or systems on earth/spacecrafts with other remotely located Internet resident/systems on other systems/spacecrafts in transit in the hostile and unpredictable environment of space. Inter-networking in such environment requires new techniques other than traditional communication...
Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where...
Electronic services (mail, web, etc.) can operate, at present over wireless networks. 802.11 networks are an example, where wireless devices use its resources to access to networks and services and in particular to Internet. The security mechanisms in the MAC layer are added to existing security mechanisms in other layers of the TCP/IP model, and therefore it generates multiple encryption of information...
As the core infrastructure of the VoIP, IMS and IPTV, SIP based network is now increasingly been deployed throughout the world. Due mainly to the relatively high flow rate and the exorbitant session maintenance, SIP servers are similarly susceptible to the Denial-of-Service (DoS) Attacks above the IP stack, especially when the Distributed spoofing URI is considered. A hybrid SIP DoS detection method...
The security of data which is transferred in E-business and E-Government is becoming more and more important. Using of IP security protocol can solve the reality and reliability problem, greatly improves the security of transmitted data. An IP security gateway realization is introduced in this paper.
Botnet has become a prevalent platform for malicious attacks, which poses a significant threat to Internet security. Recently, botnets are inclined to utilize HTTP to route their command and control (C&C) communication instead of using the protocol Internet Relay Chat (IRC). And these web-based C&C bots try to blend into normal HTTP traffic, which makes them more difficult to be identified...
Kernels defined on vectors have been widely used in host-based intrusion detection. We propose a protocol anomaly detection model based on string kernels including high-order Markov kernel, all-length gap-weighted kernel, all-length-weighted kernel and its variation all-length-weighted once kernel. Experimental results show that these string kernels can hold state information of protocols well. Models...
In order to improve the efficiency of transmission for anti-virus gateway, this paper presents a new HTTP anti-virus gateway, which is called semi-proxy and based on protocol analysis. Based on the analysis of the principle of the current anti-virus gateway, this paper introduces the design principles and the key implementation techniques in detail, and finally verifies them by experiments. Experimental...
Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning, accuracy, and reliability of these detectors as well as...
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol is the most important part of the malicious botnet's evolution and evasion techniques. The initial malicious botnet was using the IRC protocol for communication between the command and contorl server and the zombie system. After that they use the HTTP protocol on the firewall-friendly...
The stream control transmission protocol (SCTP) uses a cookie mechanism to tackle the security and traditional attack scenario. Unfortunately, SCTP is not secured against redirection attacks, bombing attacks and towards verification-tag guessing attacks which lead to association-hijacking and may force the victim client to starve out of service from the server. Therefore, we propose a secure SCTP...
IPv6, as the alternative of IPv4, contains numerous features and improvements that make it attractive from a security perspective, but it is by no means the panacea for security. This paper presents the design and implementation of a distributed intelligent firewall system based on IPv6, which is able to secure the network layer and application layer of IPv6 networking. By the system, the typical...
Computer Security is a serious concern in today's growing environment of network. Every Computer network is affected by malicious attacks in the way of security violations with varying degrees. Unauthorized access and disruption of services are the main concern of security. In this paper, we are presenting a novel detection of network errors by studying the raw packets of TCP/IP collected in the network...
Based on TCP protocol, this paper aims at TCP flows, discusses the effects of multivariate correlation analysis on network traffic, obtains the quantitative relationship between different types of TCP packets in each time unit by correlation coefficient matrix, and finally proposes an anomaly detection and analysis method based on the correlation coefficient matrix. The experimental results show that...
A novel security network storage system based on internet is put forward in this paper. First, the hierarchical model is presented consists of storage client, storage middleware and storage network. Second, two key technologies are proposed in detail including ISCSI protocol and distributed storage network; last experimental results prove that the system can improve the security of network storage...
To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this work, we perform large-scale Internet-wide measurements to determine if Web sites use TLS when needed and when they do, if they use it correctly. We find hundreds of thousands of pages where TLS is either not used when it should...
There is a growing interest in designing high-speed network devices to process packet at flow level above the network layer. A basic operation inherent to such systems is the task of maintaining per-flow state in order to correctly perform their higher-level processing. In this paper, we present an efficient TCP flow state management algorithm in high-speed network. First we devise all flow states...
Testing network-based security tools such as intrusion detection and prevention systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents,...
Summary form only given. Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for...
In this paper, the remote operating system detection is discussed and some detection methods which contain active detection and passive detection are studied and compared. The implement of remote operating system detection based on Libnet is provided and the architecture of total system is presented. The principle of Libnet is studied and it can improve detection performance and scalability. The detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.