The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Shared memory resources are inevitable components in modern SOC architecture due to Multi-core Architectures resulting ease synchronization with enhanced speed and reliability. Again architectural verification are challenging for these protocols for coherency systems. Hence this project work has come out with complete verification environment for such a complex MESI coherency protocol based on model...
With the increasing scale and complexity of the network, how to maintain a level of network performance and robustness for network operators to satisfy customers becomes more and more challenging. Network anomaly detection and localization are critical for ensuring network performance. In this paper, a novel framework for detecting and localizing network anomalies using active measurements is presented...
Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers known as “bots” or “zombies”. DDoS attack occurs by...
The Internet has become a fundamental platform for virtually all social, economical and security activities in modern societies. Monitoring widespread events on the Internet has many important applications in social trend studies and distributed intrusion/attack detection. This paper studies the problem of distributed joint detection of widespread events observed by the collaborating network devices...
Software defined networks (SDN) is perceived to have specific capabilities for utilization by network infrastructures automatically. The success of OpenFlow protocol is to decouple control plane from data plane completely. However, current SDN still regards the network as a group of devices rather than a holistic resource, and traffic monitoring and control only relies on network states but not including...
Internet traffic measurement and analysis have long been used to characterize network usage and user behaviors, but face the problem of scalability under the explosive growth of Internet traffic and high-speed access. In this paper, we present Hobbits, a Hadoop and Hive based traffic analysis system that performs Internet Protocol (IP) and Transport Control Protocol (TCP) analysis of large-sized Internet...
HTTP(S) has become the main means to access the Internet. The web is a tangle, with (i) multiple services and applications co-located on the same infrastructure and (ii) several websites, services and applications embedding objects from CDN, ads and tracking platforms. Traditional solutions for traffic classification and metering fall short in providing visibility in users' activities. Service providers...
It is a consensus among the researchers, although not proven, that it is close to impossible to guarantee completely secure hardware design. Therefore, it is desired to have run-time hardware Trojan detection techniques. This paper is toward developing a framework of how to achieve run-time hardware Trojan detection units. Although it is difficult to predict the stage of circuit design at which hardware...
Nowadays, many school teachers start to execute E-testing in classrooms due to its time and labor-saving. It is not easy that teachers want to block access to the Internet for online cheating activities. Therefore, an offline E-testing system is needed. However, existing offline E-testing systems are always developed ad hoc for particular purpose and procedures. This paper presents a general-purpose...
Distributed Denial-of-Service (DDoS) attacks continue to constitute a pernicious threat to the delivery of services within the Internet domain. These attacks harness the power of thousands, and sometimes tens or hundreds of thousands of compromised computers to attack web-services and online trading sites, resulting in significant down-time and financial loss. The problem of detecting DDoS attacks...
When IC production enters into the nanometer generation, more and more semiconductor design and manufacture companies have taken a lot of effort in information security area to prevent company information security. But data leakage is a problem still far from been solved, despite its long history to the early days of computer system. Therefore, protection for these sensitive and confidential data...
Recent research demonstrated that software defined networking (SDN) can be leveraged to enable moving target defense (MTD) to mitigate distributed denial of service (DDoS) attacks. The network states are continuously changed in MTD by effectively collecting information from the network and enforcing certain security measures on the fly in order to deceive the attackers. Being motivated from the success...
One of the most serious cyber-security threats is the botnet. The botnet runs in the background of the compromised machine and maintains the communication with the C&C server to receive malicious commands. Botnet master uses botnet to launch dangerous attacks. %such as Distributed Denial of Service (DDoS), data stealing and spamming. This paper addresses the problem of detecting P2P botnet flow...
BGP measurement is important for monitoring and understanding the Internet anomalies. Most of the previous works on BGP measurement rely on aggregated statistics from BGP monitors, e.g., total updates. However, BGP events may have quite limited visibility. Therefore, merely investigating aggregated data may lead to misunderstanding Internet instability, e.g., overestimating the impact of monitor-local...
Tactical Edge Networks provide one of the most challenging communication environments. In order to cope with node mobility, constrained resources, and link unreliability, communication solutions designed for Tactical Edge Networks typically present highly configurable interfaces to be adaptable for various networking conditions. However, the extreme dynamicity and heterogeneity of tactical scenarios...
Against the background of data explosion and cloud computing, this paper investigates a branch of the cloud computing technology which is known as VDI (virtual desktop infrastructure). Users can access data and information via cloud desktops with the endpoint devices. The paper studies OpenStack - a famous open-source cloud platform which has been widely used, and introduces a secure, optimized and...
The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration...
Internet topology measurement studies rely on a few vantage points to trace towards a large number of destinations. Such traces contain significant overlaps, which increase the measurement traffic and duration. As there is considerable redundancy in the generated measurement probes, researchers have been exploring probe reduction approaches with minimal loss of the topological information. To decrease...
Today DNS servers run on many different applications and operating systems what means there are many options how to protect DNS server. Each regular application has implemented security mechanisms that protect the system from standard attacks. DNS service works on application layer, however it is possible to prevent many threats already on lower layers. This paper deals about DNS security mechanisms...
Software-Defined Networking (SDN) is a novel paradigm in networking that changed the way the conventional networks are built and managed. The idea of SDN is based upon the dissociation of the control plane from networking devices to better optimize each. The control of the whole network becomes the responsibility of the controller. In an SDN network, locations of all hosts can be monitored with the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.