The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can result in huge loss of data and make resources unavailable for legitimate users. With continuous growth of Internet users and traffic, the importance of Intrusion Detection System (IDS) for detection of DoS/DDoS network attacks has also grown. Different techniques such as data mining and pattern recognition are being used...
The evolution of Internet is continually growing, most people use online streaming applications to watch videos. However, some of P2P streaming applications usually occupy the network bandwidth, and the encrypted tunnel is usually used to avoid the traffic to be detected. Thus, it is an important issue for ISP to detect the traffic in the encrypted tunnel. This paper proposes a novel solution to detect...
The SIP(Session Initiation Protocol) is the core control protocol of the Next Generation Networks(NGN), which is used for initiating, modifying and tearing down multimedia sessions on IP data network. Because the SIP server is the core facility of NGN, its realization is especially important. One way to realize the SIP server is the proxy server, which mainly provides routing service. Namely, it ensures...
OpenFlow is a new protocol which enables researchers to run experimental protocols in a network without changing the network topology. In the paper, we analyze and test OpenFlow based on a formal method, such as CPN (colored Petri net). To avoid state exploration, we mainly focus on testing the interaction property of OpenFlow. According to the latest OpenFlow specification, we construct its hierarchy...
A large proportion of vegetable lands in China are widely scattered plots, resulting in difficult supervision of vegetable production process. Little research has been done to analyze supervision problems from both production behavior and information behavior. This paper presents an investigation in Guangdong province of China, from a special viewpoint of both vegetable production behavior and information...
The ability to accurately classify various types of Internet traffic within a network using Netflow traces represents a major challenge as there is no payload information available with Netflow. P2P applications represent a very large portion of the internet traffic and are becoming more difficult to classify, as some of these applications tend to use port masquerading techniques and encrypted payloads,...
Nodes in low-rate wireless sensor networks (LR-WSN) are often placed in the bad environment intensively, and node energy consumption makes the network topology structure change dynamically, resulting in coverage of the case in which the actual testing process can not meet the requirements. In order to facilitate users' remote testing, this paper builds a conformance test platform of LR-WSN, proposes...
The Internet of Things describes multiple distributed systems where all (or most) everyday items include embedded systems in order to connect to the internet. This paradigm has the potential to revolutionize global industry and daily life. Healthcare is once such industry where the Internet of Things may provide great advantages to patients, care givers, and medical institutions. As the number of...
Computing is now ubiquitous. Accessing the Internet is increasingly common from mobile devices through cellular networks. The Internet is now used for shopping, communicating, and for finding employment and housing. More information is readily available than at any time in human history; however, this information is often inaccessible to people with blindness or low-vision. In order to increase access...
The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attacks has rapidly grown in frequency, severity, and sophistication in recent years. Thus, serious attention needs to be paid to network security. However, to create a secure network that...
We describe the SPaCIoS project, illustrating its main objectives, the results obtained so far and those that we expect to achieve, in particular, the development of the SPaCIoS Tool, an integrated platform that takes as input a formal description of the system under validation, the expected security goals, and a description of the capabilities of the attacker, and automatically generates and executes...
In the Internet of Services (IoS) vision of the Internet, applications are developed as services using the web standards. Model-based testing combined with active model inference is one of the methods to test the applications pretty automatically, in particular to look for vulnerabilities. But one part still needs to be written manually, the test driver. It contains an abstraction of the real application...
This paper examines the processing of PII data in e-Government web services in developing nations using the case study of some Nigerian embassies. It presents a secured framework intended for protecting Personally Identifiable Information (PII) data in e-Government web services in developing nations where such do not already exist. The framework is based on OWASP ASVS security requirement for data...
This paper presents the design and development of a web enabled system supporting materials flows and relevant management processes in educational settings. Unlike other organizational settings, where warehouses are organized with specific input and output procedures, in educational environments (at least, in Cyprus) resources are allocated in various locations (offices, warehouses, laboratories,...
The paper describes the developed multiaccess internet application for collective realization of listening tests which are very important for evaluation of the synthetic speech quality used in text-to-speech systems or human-machine interfaces. This application together with testing speech and image corpora are stored on the server PC, where the listening tests are also executed. The application communicates...
Random surfers spend very little time on a web page. If the most important web page content fails to attract his attention within the short time span, he will move away to some other page, thus defeating the purpose of the web page designer. In order to predict if the contents of a web page will catch a random surfer's attention or not, we propose a machine learning based approach to classify web...
The Internet Protocol version 6 (IPv6) is being adopted in networks around the world as the Internet Protocol version 4 (IPv4) address space is nearing maximum capacity. Security needs are changing because of various new aspects of IPv6, such as the way addresses are determined. There are security applications that are being developed to meet these needs; however, there are not many production IPv6...
Many web systems developers have completed education in basic web site development. The evolution of web systems to include interfaces to legacy systems exposed through web services requires a shift in the developers design process. Web system developers of 2012 and onward have to be aware of many issues regarding legacy systems, security, performance, modern development languages and methodologies...
Effective and steady routing protocol will be an important factor to ensure performance of network. Protocol test is an important means to guarantee the rightness and effectiveness of the implementations of a protocol. Protocol conformance test focuses on the conformance of the implementation under test and the requirement of protocol standards. According to the characteristic of BGP4+ protocol, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.