Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cloud data centers are critical infrastructures to deliver cloud services. Although security and performance of cloud data centers have been well studied in the past, their networking aspects are overlooked. Current network infrastructures in cloud data centers limit the ability of cloud provider to offer guaranteed cloud network resources to users. In order to ensure security and performance requirements...
Named Data Networking (NDN) represents an emergent Information-Centric Networking architecture. It treats data as the central element and it leverages in-network caching. With the latter feature, traditional security mechanisms, tied to data location, can no longer be used. That's why a data-centric security model is adopted. This model relies mainly on the addition of a signature to each of the recovered...
Software-Defined Networks (SDNs) introduce interesting new opportunitiesin how network routes can be defined, verified, and changed over time. Yet despite the logically-centralized perspective offered,an SDN still needs to be considered a distributed system:rule updates communicated from the controller to the individualswitches traverse an asynchronous networkand may arrive out-of-order, and hence...
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In this demonstration, we showcase the Secure Opportunistic Schemes...
Network tomography is a vital tool to estimate link qualities from end-to-end network measurements. An implicit assumption in network tomography is that observed measurements indeed reflect the aggregate of link performance (i.e., seeing is believing). However, it is not guaranteed today that there exists no anomaly (e.g., malicious autonomous systems and insider threats) in large-scale networks....
Multidomain elastic optical networks (MD-EONs) help to improve network scalability, extend service coverage, and facilitate good interoperability to orchestrate administrative domains managed by different carriers. Since the users in other domains can launch cross-domain physical-layer attacks to a domain, this paper studies the problem of attack-aware service provisioning in one domain of an MD-EON...
Space self-organizing network is a kind of space communication network, which applies self-organizing network to deep space. Future space exploration demands a self-organizing network that will be able to connect spacecrafts with one another and in turn with Earth's terrestrial Internet and hence efficiently transfer data back and forth. The coverage area of the space self-organizing network is large,...
A novel Denial-of-Service attack for Networks-on-Chip, namely illegal packet request attack (IPRA), has been proposed and measures to mitigate the same have been addressed. Hardware Trojans, which cause these attacks, are conditionally triggered inside the routers at the buffer sites associated with local core, when the core is idle. These attacks contribute to the degradation of network performance...
Delay tolerant networks (DTNs) are widely adopted to many network applications, such as disaster recovery and battlefield communications. Such critical network scenarios call for an outright prevention mechanism against contact-based attacks, e.g., blackmailing a legitimate user to compromise sensitive information at a contact. To the best of our knowledge, there is no work on secure routing protocol...
Many-core architectures provide massive parallelism and high performance to the users. They also introduce key challenges regarding security. The main threat rises from the resource sharing. Adoption of firewalls, encryption mechanisms and resource isolation (processor or memory) are common strategies to treat the security threats. The two first strategies present high hardware cost, while the resource...
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users [1]. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In natural disaster situations, Internet and cellular communication...
Middleboxes present new requirements that need to be integrated with traffic engineering applications that are already complex and consider myriad factors (e.g., routing, QoS, load-balancing). While it is possible to revisit traffic engineering algorithms to explicitly integrate middleboxes, such an approach is not compositional. Existing efforts at compositional SDN application development do not...
Attacks in Wireless Sensor Networks (WSNs) aim in limiting or even eliminating the ability of the network to perform its expected function. WSNs are networks with limited resources and often deployed in uncontrollable environments that an intruder can easily access. WSN attacks target specific network layer's vulnerabilities but normally affect other layers as well. Local sensor activity at multiple...
Delay tolerant networks have already evolved as a pragmatic solution to various requirements such as delayed routing in wireless networks. They can also be used in place of traditional wireless networks in the border areas or highly sensitive areas, thus contributing to the data security in such places. In this paper, a border security architecture has been proposed where DTN is used for transferring...
The postal system is often used as an analogy when describing Internet routing. However, in addition to similarities, there are some significant differences. First, and most importantly, the Autonomous Systems (ASes) that operate the routers along the end-to-end path of a packet can often inspect and manipulate the packet and its content. Second, due to lack of secure routing mechanisms, packet paths...
Software-Defined Networking (SDN) benefits from the development flexibility of control-plane applications (SDN-Apps), which allows third parties to make contributions. Such flexibility may expose SDN networks to security threats, since SDN-Apps may be malicious or prone to implementation bugs. These buggy/malicious SDN-Apps may contaminate the data plane with abnormal network actions, which may not...
MapReduce is a programming model used extensively for parallel data processing in distributed environments. A wide range of algorithms were implemented using MapReduce, from simple tasks like sorting and searching up to complex clustering and machine learning operations. Many of these implementations are part of services externalized to cloud infrastructures. Over the past years, however, many concerns...
Current DTN systems are vulnerable to malicious attacks by compromised nodes taking advantage of the DTN protocols that control how nodes join and leave the backbone. Without addressing such security issues, DTN systems could result in performance degrade, the compromise of message confidentiality and integrity, and denial of service. Thus, effective mechanisms to identify and fix this vulnerability...
In Major WSN and MANET routing protocols mainly deals with energy efficiency, routing and band width and their basic Para-mounts like energy efficiency, power consumption and resource constraints based on energy transmission from source to destination. The main idea is to design a protocol which configures the multipath routes based on random choice of path from which it gains a optimal routing with...
In past years, mobile ad hoc networks (MANETs) widespread use in many applications, including for some mission-critical applications, and has become one of the major concerns such as security MANETs. MANETs due to some unique characteristics, prevention methods are not alone enough to protect them need, Therefore, the detection is possible for an attacker to breach system security, such as the need...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.