The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As websites have become bulkier and serve more larger files to end users, it has become harder for the HTTP/1.1 protocol to provide adequately short page load times. The HTTP protocol, in its previous versions, is a generic stateless application protocol most often used for distributed, collaborative, hypermedia information systems. The newest version, HTTP/2, introduced an updated protocol feature...
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
Increase in size and complexity of web pages has challenged the efficiency of HTTP. Recent developments to speed up the web have resulted in two promising protocols, HTTP/2 (RFC 7540) at the application layer and QUIC (multiplexed stream transport over UDP). Google servers are using HTTP/2 and QUIC whereas other major sites like Facebook and Twitter have begun using HTTP/2. In this paper, we compare...
Software Defined Networking (SDN) is an alternative networking paradigm that provides flexible network management through the separation between data plane and control plane functionalities. This separation results in extensive communication between control and data plane, which can result in a severe bottleneck for the whole network, under high traffic conditions. Moreover, researchers shown that...
The average Web Page size is constantly increasing: it doubled between January 2012 and January 2015 [1]. In such a context the transport of the Internet traffic becomes very challenging. To moderate the impact of the increase of traffic on end-users' Quality of Experience (QoE), the IETF specified the protocol HTTP2, which optimizes the transfer of the HTTP1 protocol. In this paper we provide a comparison...
HTTP has been the protocol for transferring web traffic over the Internet since the 90s. However, over the past 20 years websites have evolved so much that today this protocol does not provide optimal delivery over the Internet and became a bottleneck in decreasing page load times. Google is pioneering in finding better solutions for downloading web pages and they implemented two new protocols: SPDY...
Network flow monitoring is being supplemented with an application flow visibility to provide more detailed information about network traffic. However, the current concept of flows does not provide a mechanism to keep track of semantic relations between individual flows that are created as a part of a single user action. We propose an extension to the flow measurement, called EventFlow, which allows...
The development of TLS-based encrypted traffic comes with new challenges related to the management and security analysis of encrypted traffic. There is an essential need for new methods to investigate, with a proper level of identification, the increasing number of HTTPS traffic that may hold security breaches. In fact, although many approaches detect the type of an application (Web, P2P, SSH, etc...
Despite its widespread adoption and popularity, the Hypertext Transfer Protocol (HTTP) suffers from fundamental performance limitations. SPDY, a recently proposed alternative to HTTP, tries to address many of the limitations of HTTP (e.g., multiple connections, setup latency). In this paper, we perform a detailed measurement study to understand the benefits of using SPDY over cellular networks. Through...
A brand-new protocol, HTTP/2 is drawing great attention from the web industry as its standard specification is finalized and approved early this year. Since most of its technical features are inherited from SPDY, an application-layer protocol developed by Google, HTTP/2 is expected to solve many of the shortcomings and inflexibilities of HTTP/1.1, and hence enhance the web performance in terms of...
Cognitive networks rapidly proliferating into all aspects of computing and communication. Some of them are specially designed for the people with specific ability. However, very few are designed with assistance of the people with disability and elderly who need help during networking. The goal of this project is to study network accessibility issues and their impact in such cognitive network design...
HTTP/2 is the next generation of the HTTP protocol, and as such, it is supposed to solve past issues and to bring improved performances. Through thorough experiments, we try to bring reliable figures on this new version of the protocol. To do this, we adopt a methodological approach, taking newly introduced features into consideration: compression, multiplexing, server push and priority. Previous...
In large parking lots, it is generally difficult for drivers to know ahead of time whether there will be available parking spots and where they are. Besides, it is logistically cumbersome to wait in line for paying parking fees when leaving. In this demo, we develop an intelligent parking system called iParking. iParking could help users monitor parking states, search for a vacant parking spot, reserve...
The increasing popularity of smartphones, equipped with GPS, provides new opportunities for location-based service (LBS). Among all kinds of LBSs, targeted advertising based on users' locations takes great advantage of the rich location data to improve the accuracy of advertising and thus potentially increase the sellers' profits. However, location-based advertising (LBA) has raised significant privacy...
Modern web pages are diverse and complex. There is also a wide range of devices, operating systems, and browsers that users use to access these web pages. In this work, we study how web pages, and the traffic generated by their download, differ across these different client types. We conduct a preliminary study that performs a client-side analysis of the network traffic. We identify both expected...
Using the ICT and the ubiquitous technology, very convenient services have been provided for users daily and widely. However, users feel a heavy burden on finding information they need at each situation rapidly, because the important information may hide in enormous useless information in the Internet. In this paper, we discuss an Agent Space that consists of Personal Assistant Agents, Service Agents...
SPDY protocol is a new application-layer communication protocol which was proposed by Google in order to overcome the defects of HTTP. On the basis of HTTP protocol, SPDY offered four improvements to shorten the page loading time such as multiplexed requests, prioritized requests, server pushed streams and compressed headers. However, there is no much test work of the SPDY especially treating it as...
Tor is a popular anonymizing network and the existing work shows that it can preserve users' privacy from website fingerprinting attacks well. However, based on our extensive analysis, we find it is the overlap of web objects in returned web pages that make the traffic features obfuscated, thus degrading the attack detection rate. In this paper, we propose a novel active website fingerprinting attack...
The Remote Laboratory Management System (RLMS), REMLABNET, for the integrating and management of remote experiments for starting university level and secondary schools, is presented. Its building was initiated both from the extensive use and expertise in Internet School Experimental System (ISES), remote experiments built and the lack of a similar system for secondary schools in Europe. RLMS is built...
This article presents findings from a Content Analysis of verbal and audio protocol of Mental Model study. When using touch screen display with audio feedback, it was found that the users' mental model is in one dimensional as using screen-reader program. Previous experience using screen-reader program may affected the users' experience using a touch screen with audio feedback. In addition, investigation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.