The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the detection properties of obfuscated network buffer overflow attacks by selected IDS and NBA. The obfuscation was performed by tunneling the malicious traffic in HTTP and HTTPS protocols with the intention of simulating the usual legitimate characteristics of the HTTP traffic's flow. The buffer overflow vulnerabilities of four services were used: Samba, BadBlue, Apache, DCOM...
A large amount of unstructured data is produced daily through numerous media around us. Despite that computer systems are becoming more powerful, even the commodity hardware, processing of such data and gaining useful information in time efficient manner remains a problem. One of the domains in unstructured data processing is Natural Language Processing (NLP). NLP covers areas like information extraction,...
The rapid growth in revenue-generating capabilities of mobile social games has caught the attention of both researchers and industry. The author analyzes the key factors of revenue-generating engines in mobile social games in Japan, and presents the four key factors involved in revenue-generation mechanisms of those games. The author discusses the four golden rules of mobile social games and presents...
The popularity of the social web introduces opportunities for the recommender systems, whilst new challenges arise when semantic knowledge is integrated in the landscape. The large amount of opinions available from Web 2.0 are exploited here to improve recommendation techniques in a semantic context. The developed recommendation system matches the crawled opinions against tourist objectives within...
Ontologies have been frequently employed in order to solve problems derived from the management of shared distributed knowledge and the efficient integration of information across different applications. However, the process of ontology building is still a lengthy and error-prone task. Therefore, a number of research studies to (semi-)automatically build ontologies from existing documents have been...
RFC4893 defines the transition mechanisms to use 4 byte Autonomous System numbers. This RFC has some inconsistencies and has not been implemented correctly by all vendors. As a result, several major Internet incidents related with the handling of bogus 4 byte Autonomous System Numbers (ASNs) have ocurred. The last one was registered between the 17th and the 18th August, 2009. This paper analyses BGP-4...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Advances in portable devices and location-aware applications have necessitated the research in sophisticated yet small-footprint hardware and software in embedded systems, while the proliferation of the Web and distributed database systems has led to new data mining applications. We are investigating the utilization of reconfigurable hardware, due to its flexibility and performance, for data mining...
Long-Term Evolution (LTE) is the next-generation network beyond 3G. Authentication service is one of the most essential services in LTE networks, which has significant effects on internet security. In this paper, we survey and compare three authentication protocols: Password Authentication Protocol, Lightweight Extensible Authentication Protocol, and Extensive Authentication Protocol-Transport Layer...
The cache-and-forward (CNF) architecture has recently been proposed as a "clean-slate" solution for efficient content delivery in the future Internet. The CNF architecture is based on the concept of hop-by-hop transport and in-network storage of content. In this paper, we investigate a gateway centric method for efficient content caching and routing in the CNF network. In this method, a...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. The Integration of the MANETs and infrastructure networks such as Internet extends the network coverage and increases the application domain of the MANET. Communication between a mobile device in an ad hoc network and a fixed device on the Internet is achieved using gateways, which acts as...
The richness of functions and the availability of data make the Web the real service platform. Telecomm operators are using an old approach to a new All-IP infrastructure. This enables the WebCos to become the major Service Providers of next generation networks. TelCos should instead use the Web APIs and the cloud computing infrastructure to build services. They should also provide interworking functions...
This paper proposes a novel method to characterize Internet email traffic. We apply our mechanism to two different volumes of email traffic data captured respectively near an email gateway of a small company and at a country-edged core router of a large commercial Internet service provider in China. Experiment results show that there are significant abnormal email traffic in both the backbone link...
Nowadays, Internet congestion is indicated by dropping packets when the routers buffers are full, or by dropping packets according to an AQM mechanism such as RED. Many mechanisms have been proposed to eliminate or minimize the effect of packet loss and tackle the consequential inefficiency due the retransmission of the dropped packets. Fast congestion notification (FN), that has been evaluated through...
Congestion in computer network happens when the number of transmission requests exceeds the transmission capacity at a certain network point (called a bottle-neck resource) at a specific time. Congestion usually causes buffers overflow and packets loss. The purpose of congestion management is to maintain a balance between the transmission requests and the transmission capacity so that the bottle-neck...
Who can best manage technical teams and organizations, the one who knows technology or the one who knows management, is of great interest to the authors. Even Lou Gerstner when pursued by the executive search committee of IBM, also believing in the myth, felt that as a non-technical person he was not qualified to lead IBM. Later, however, he did accept the position and turned IBM around. On the other...
With the recent emergence of business being conducted over the Internet, companies are inevitably using information technology to cut costs, increase productivity, reduce the time required to develop new products harness the collective expertise of their employees, and create an extended enterprise by forging closer relationships with their customers, suppliers, distributors and partners in order...
Wireless mesh networks (WMNs) have become a network of choice to provide broadband wireless Internet connectivity where wired infrastructure is uneconomical or impractical to deploy. Their support for inexpensive broadband Internet services has made them even more attractive and increased users' demand. Even with their abundant computational resources in the form of mesh routers (MRs), WMNs suffer...
Network mobility is proposed to let a mobile network change its point of attachment and still keep all nodes attached to the mobile network globally reachable. However, due to finite bandwidth, limited signaling coverage and frequent link failure, a mobile network needs multihoming to access the Internet simultaneously on the perspective of performance and reliability. In this paper, we extends our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.