The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network attacks and in particular denial of service (DoS) attacks have emerged as a major way to compromise the availability of servers and interrupt legitimate online services provided by servers. These attacks are among one of the hardest security problems to address because they are simple to implement but hard to prevent and difficult to trace. Tracing the attacker after an attack is crucial to...
One of the most appealing characteristics of unstructured P2P overlays is their enhanced self-* properties, which results from their loose, random structure. In addition, most of the algorithms which make searching in unstructured P2P systems scalable, such as dynamic querying and 1-hop replication, rely on the random nature of the overlay to function efficiently. The underlying communications network...
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
A content-centric network is one which supports host-to-content routing, rather than the host-to-host routing of the existing Internet. This paper investigates the potential of caching data at the router-level in content-centric networks. To achieve this, two measurement sets are combined to gain an understanding of the potential caching benefits of deploying content-centric protocols over the current...
The distribution of multimedia streaming requires efficient management strategies in multisite environment with multiple senders and receivers. The intermediate nodes between senders and receivers act as the Streaming Routers (SR1). They play an important role in the distribution of required contents by relaying and dropping video frames which depends on the network characteristics of peer receivers...
Many research activities have been provided to allow Session Initiation Protocol (SIP) based communication in Peer-to-Peer (P2P). We have contributed to these activities by proposing a scalable proxy topology building and routing in P2P SIP network where SIP location service is integrated in proxies that run over peer entities. Therefore as SIP cannot work efficiently through a NAT (Network Address...
In the network operator-friendly P2P traffic control technique such as P4P, peers are supposed to select their communication partners by following a guidance issued by the network operator. Thus, the guidance has significant impact on the traffic control. However, detailed performance study of available guidances is missing. Most existing work does not show how they affect intra-domain traffic control...
BitTorrent is one of the most popular application in the current Internet. However, we still have little knowledge about the topology of real BitTorrent swarms and how the traffic is actually exchanged among peers. This paper addresses fundamental questions regarding the topology of live BitTorrent swarms. For this purpose we have collected the evolution of the graph topology of 250 real torrents...
Resource provision within critical friend environment take place on a demand fashion and it is based on the aptitude of members to look across multiple locations for resource discovery and allocation. A major concern of such large scale and uncertain topology setting is the capability of members (nodes) to efficiently search and locate neighbouring participants. Here we adopt a Peer to Peer (P2P)...
Traffic traces provide valuable data to researchers and organizations alike. However, organizations that provide this information do not wish to expose the internal workings of their networks to potential attack. Traffic trace anonymization attempts to mitigate this concern by hiding sensitive information while preserving most of the empirical value of the trace. Unfortunately, many attacks such as...
A backup topology design algorithm for avoiding congestion in IP fast reroute is presented. In IP fast reroute techniques, detour routes are computed by using backup topologies. Reducing the number of backup topologies is the main problem, but some links will become overloaded if the number of backup topologies is reduced. The proposed backup topology design algorithm splits the traffic on high load...
Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prove its authenticity. In this paper we propose a stateless IP traceback technique that identifies the origin network of each individual packet. We show that the proposed traceback system is the only one that scales with the number...
Based on the territorial continuity of IP addresses, this paper proposes an enhanced Boot-Trapping algorithm. It constructs a Patricia Tree which reflects the topology of the physical network, and collects information of the online Ultra Peers. By providing an UltraPeer physical network nearby for a LeafPeer, it can improve the proximity between the overlay network and the physical network, the aggregation...
It has been clear for a long time that P2P applications represent a large proportion of the load on the network infrastructure. This is why significant research efforts have been devoted to reducing this load, in the form of ISP friendly P2P solutions. These solutions focus on the volume of the traffic as opposed to the number of network flows. At the same time, we are witnessing a great demand for...
Existing network operator-friendly P2P traffic control techniques like P4P argue that network operators can reduce inter-domain traffic while peer-to-peer (P2P) applications can improve their performance through the traffic localization. However, the existing work has not addressed how the traffic localization affects an intra-domain traffic control in detail. In fact, not considering the impact on...
In the internet today, computing and communication networks are very chaotic and complex. They do not have any centralized organization or hierarchical control. Thus there has been much interest in peer-to-peer networks because they provide a good substrate for creating large scale data sharing, content distribution and application level multicast. Many internet applications need to perform large...
Multicast has been being developed as a very promising technique to data delivery to a group of destinations simultaneously. Except of first implementation for multicasting in the Internet aka IP Multicast, for past few years some systems defined for end-hosts overlay network have been successfully designed and implemented. Additionally, overlay multicast defined for end-host based networks has been...
Network survivability is an important topic for the Internet. To improve the performance of the Internet during failure, IP Fast Reroute (IPFRR) mechanisms are proposed to establish backup routes for failure-affected packets. NotVia, a most prominent one, provides 100% protection coverage for single-node failures. However, it brings in nontrivial computing and memory pressure to routers with special...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
This paper suggests ISP-provided content delivery service that provides fine-grained locality and exploits network status in content routing to overcome the dilemma from current content delivery technology like P2P. Hierarchical DHT provides an efficient and scalable distributed data service architecture and it is able to achieve high level of locality over ISP network which has a hierarchical topology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.