The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern companies can't operate and conduct business without using a developed and stable functioning information system, which includes a network. To monitor network performance characteristics of network traffic are often defined, the values of them determine the performance of the network. Mostly these characteristics values vary slightly within predetermined time intervals. A significant change...
In recent years, there is a rapid growth in the internet services which has increased incoming traffic in the network and also plays a vital role in increasing the size of the cluster server. The load balancing is a key technology to manage the traffic efficiently. In this paper, we propose an alternative load balancing architecture using OpenFlow switches which are connected to the controller. This...
Typical traffic scheduling is to use special load balancers distributing client requests to different application servers, but this technique requires not only the dedicated hardware support, but also has many other shortcomings, such as high price, lack of flexibility and easier to become a single point of failure. This paper presents a cheap, flexible solution. Based on SDN, this method adopts the...
Real network traffic is mostly generated by an interactive session between applications, thus we feel that there is a strong demand for a solution capable to reproduce these interactive application workloads. For this purpose, we propose a new strategy for generating realistic network traffic and interactive application workloads using container technology. In this article, we also demonstrate why...
Prior load balancing solutions for chaining virtualized network functions cause significant control and data plane overheads and demand special requirements on network hardware. In this study, we present the design, implementation, and evaluation of Hash-based Traffic Steering on Softswitches (HATS), a load balancing mechanism that aims at mitigating such drawbacks. The method exploits flow hashing...
Existing traffic replay methods are mainly aim to generate a large number of network traffic per unit time, which neglect the time's authenticity of replay traffic. In order to generate the network traffic which is exactly the same as the real traffic in the target network, including packet's numbers, payloads, interactive orders and time series, this paper proposes a traffic replay method based on...
Malicious domains are basic tools in the hands of cybercriminals. Once a victim is malware-infected, malware will tend to connect malicious domains to do internet crime such as awaiting the remote control command or delivering the malware reported feedback. Recent studies have paid much effort on detecting malicious domains, but still have room to improve. For the purpose of detecting malicious domains...
Network intrusion detection system (NIDS) takes necessary measures when detecting threats. Since most of the malicious contents like phishing sites and advanced persistent threats are transmitted on transmission control protocol (TCP), existing measures are usually injection-based, such as injecting a reset (RST) packet to terminate the connection or a HTTP 302 response to redirect users' requests...
Honeypot technology is one of the main mechanisms of computer security. It is certain resource, which should be attacked or explored illegally. The research provides the version of Honeypot implementation based on proxy-server. The target of paper is emulation of intruder detection system and analysis of potential violator behavior. As a result, statistics of attacks sources has been collected and...
With the advent of multiple radio interfaces on modern smart phones, simultaneous transmission and reception of data through via both mobile networks and WiFi networks has gained a considerable attention as a cost-effective means for mobile data offloading. In this paper, we present a practical SDN-based data offloading framework based on a Femto-WiFi Integrated network. The proposed framework take...
As IT technology advances, the number of people who use electronic financial transaction recently increases. However, as the number of users and the amount of transaction increase, the cyber-attacks and security incidents also increase. To cope with these incident responses, applying digital forensic technology is essential for financial network. In this paper, we analyze main financial cyber security...
Low-rate Denial of Service (LDoS) attack is one of great threats to computing platform and big data center. LDoS attacks are difficult to be found because its average attack rate is low enough to evade traditional DoS-based countermeasures. In this paper, the propagation back (BP) model of neural network is used to establish the nonlinear model of network traffic, and a method of LDoS attacks detection...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Current practices in network security deployment require multiple specialised devices as firewalls, traffic shapers, sensors or Intrusion Detection Systems (IDSs) to handle malicious traffic. This practice not only increases the overall operational costs but also makes network administration complicated. The high cost of Distributed Denial of Service (DDoS) mitigation devices empowers centralised...
The continued growth of the Internet has resulted in the increasing sophistication of toolkit and methods to conduct computer attacks and intrusions that are easy to use and publicly available to download, such as Zeus botnet toolkit. Botnets are responsible for many cyber-attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of existence botnet toolkits release...
With the rapid development of the Internet and mobile platform technology, the network application based on P2P/P2SP is increasing, which makes the network bandwidth resources become increasingly tight. Based on the protocol analysis, this paper studies the characteristics of the typical P2P/P2SP packet, and proposes the specific recognition scheme for the application of this kind of application,...
The Social Internet of Things enables cooperation with devices in various domain networks to provide Internet of Things applications. But, as the number of relationships between humans or devices will increase dramatically, device generates a lot of messages when requesting data. Also, in the centralized manner, the server sends data individually to each device even if they need same data. It causes...
The rapid development of Internet attack has posed severe threats to information security. Therefore, it's of great interest to both the Internet security companies and researchers to develop novel methods which are capable of protecting users against new threats. However, the sources of these network attack varies. Existing malware detectors and intrusion detectors mostly treat the web logs separately...
Monitoring the activity of equipment in datacenters is often a key element in designing large scale network and IT infrastructure. The information collected by direct parameter observations (such as total network traffic, CPU usage, etc.) represents a first step in the overall system performance optimization. A second one is denoted by data analytics and decision making strategies based on the values...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.