Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Content centric network (CCN) has been regarded as one of the most promising architecture solution for the future Internet, which has great advantages in support of content delivery services, such as Video-on-demand (VoD) application. Although there are some existing models proposed for the cache performance in CCN router, few of them consider the case of video request traffic. In this paper, we focus...
Although it is widely accepted that traffic volume is affected by user behaviors, observations related to semi-periodical patterns of weekly traffic is rarely reported. The present study, therefore, attempts to conduct a temporal analysis on one set of one-year network traffic data collected from a real IP backbone node in China. By traffic decomposition, we divided the traffic into two parts: major...
Network traffic classification has become vital due to the increased flow of web traffic from services like HTTP, FTP, and SMTP etc. The idea of Network traffic classification is to categorize the network traffic and regulate the flow of data in the network there by monitoring the traffic. In this paper, a comparative analysis of different supervised learning algorithms like Ensemble learning methods,...
One of the most profitable and emerging high-tech markets is the one that involves games for PC and consoles; a market that is growing year by year and that is rapidly evolving. Several big game corporations are implementing now the remote video streaming through the domestic network between two devices; a feature that regards not only PCs but also consoles. This paper investigates one of the main...
Honeypot technology is one of the main mechanisms of computer security. It is certain resource, which should be attacked or explored illegally. The research provides the version of Honeypot implementation based on proxy-server. The target of paper is emulation of intruder detection system and analysis of potential violator behavior. As a result, statistics of attacks sources has been collected and...
Network operators need to assess the effects of routing policies and traffic engineering methods in order to guide planning and operational decisions related to peering. We propose a peering analysis framework based on the correlation of inferred AS paths and traffic flow information. We define the data sets needed and a four-step methodology designed to reduce network data dimensionality, determine...
This paper present a method for the analysis of self-similar traffic flows in high-speed computer network with the aim of providing a possible explanation for the locality phenomenon that appears in the behavior of the Hurst exponent in stationary second order temporal series representing traffic flows in current high-speed computer networks. It is shown analytically that this phenomenon occurs if...
Currently, the Internet is one important part of the campus infrastructure that supports the teaching and learning activities. The important part of the internet facility is the provided bandwidth as Bandwidth management to teaching and learning is indispensable. In this study, an analysis and cluster of the university internet traffic is required as bandwidth management decision support. Therefore,...
Researches on human thinking styles have received wide attention, especially in online education; an aspect of human computer interaction. However, the deciphering of specific thinking styles of an online user has suffered setbacks due to the limited exposition on the probability of online thinking style signature of users. This study explored this limitation with the assumption that human daily behavioral...
A huge amount of mobile traffic runs on Internet every day. The complex mobile traffic data may degrade the network performance if they are not well managed. As the important foundation of network management, mobile network traffic classification aim to map IP packets into a predefined traffic class set. Most work in this area until now has focused on classification schemes. In contrast, little attention...
The rapid development of Internet attack has posed severe threats to information security. Therefore, it's of great interest to both the Internet security companies and researchers to develop novel methods which are capable of protecting users against new threats. However, the sources of these network attack varies. Existing malware detectors and intrusion detectors mostly treat the web logs separately...
Today one cannot think of life without the Internet. The Internet has grown at a very fast pace, which has resulted in heavy Internet traffic. Most of today's internet traffic is due to video streaming services such as YouTube and Netflix. The Average traffic load has risen, and data traffic patterns have also become unpredictable. Therefore, network traffic monitoring and analysis have become essential...
Traffic Classification plays a vital role and is the premise for the modern era of network security and management. This technology categorizes network traffic into several traffic classes based on some fusion of parameters. A number of restrictions have been revealed by the older methods like port based, payload based, and heuristics based classification. Due to inadequate classifier performance...
In this paper, we present evaluation results of Service Function Chaining implementation scheme using multiple flow tables of OpenFlow. With a single flow table in the implementation, the number of flow entries in the flow table significantly increases as the number of service chains increases. This results in looking up larger flow table and higher processing time in processing packets. We have addressed...
Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a great amount of compromised hosts by using their vulnerabilities to create attack networks or Botnets. Although a number of defense techniques and countermeasures...
It is crucial to understand patterns of university traffic and usage behaviour of end users. We address the problem of identifying malicious activities and understanding Internet usage within the university campus. This paper aims at discovering the hidden patterns based on the analysis done on the captured traffic. To tackle the problem, systematically traffic is captured, filtered, managed and then...
There is a fast growing number of public spaces offering Wi-Fi access to meet the rising demands for the Internet. It is common for such service to be offered to users at no charge or for a flat fee. Both situations provide very little incentive for Wi-Fi providers to offer better service to the users. Similarly, Wi-Fi providers pay a monthly flat-rate to ISP for Internet access, which does not incentivize...
Along with the widespread development of Internet and mobile applications, the demand for more flexible and dynamic networking services increases. It becomes a new challenge for many carriers to deploy a variety of new services by effective provisioning of network resources. Software-Defined Networking (SDN) is a novel approach to make networks reconfigurable and extensible such that new services...
Denial of Service (DoS) is a hot topic phenomenon lately. The intensity of DoS attacks increasing every day with the discovery of a new attack with the same type which is Distributed Denial of Service (DDoS). Both, attack the victims by flooding a lot of packet to the traffic channels at a time. This makes the flow of packets to the victim's becomes choked and victim do not get the desired package...
In this paper we utilize mobile handset-based measurements to examine smartphone generated mobile network usage. The focus is on user behavior analysis and network session is defined as the measure of network usage. In particular, we utilize the richness of handset-based data to understand the offline/background actions leading to the network usage. We make a distinction between human versus machine-generated...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.