The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. So requests with different destination DNS IP addresses can be redirected toward a fake DNS server by a hacker. This type of attack is detectable by neither the EDS nor any anti spoofing software.
Parallel transmission is one of the popular techniques to realize huge bandwidth between two network nodes. However, in parallel transmission, many packet order inversions will be occurred when the delay difference among the routes is large, and TCP throughput will be drastically decreased under such a circumstance. In this paper, a TCP over SCTP (Stream Control Transmission Protocol) parallel transmission...
According to the characteristics, attack mechanisms and the fault phenomenon of ARP deception, this paper makes an in-depth analysis on it from the viewpoint of the set, the automatic prevention and control algorithms and model of ARP deception are given. The implementation according to the model is carried out on Linux operating system, the actual operating results show that the model can effectively...
Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our systems) are regarded as essential security methods, especially on the LAN system which uses ARP protocol with holes enabling hackers to conduct ARP spoof and sniff packets on the LAN systems. Regarding Web sites with membership systems such as e-commerce Web sites and...
In this paper, we present a systematic method for the designing fault tolerant reversible arithmetic circuits for finite field or Galois fields of the form GF(2m). To tackle the problem of errors in computation, we propose error detection and correction using multiple parity prediction technique based on low density parity check (LDPC) code. For error detection and correction, we need additional garbage...
Video-streaming can now be offered on third-generation (3G) mobile networks. Most research efforts have focused on video download. This paper presents a detailed study of challenges faced for successfully deploying applications requiring life video upload. Both subjective and objective qualities as well as the effects of mobility are analyzed on real 3G networks. Consequently, video profiles are identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.