Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Web services are self-describing, platform independent applications that can be accessed over the Internet. Web services enable us to dynamically find, bind and consume the needed functionality. Semantic Web services are being developed with the vision of automating this process and to facilitate interoperable machine to machine interaction with no/minimal human intervention. Semantic descriptions...
At present, harmful information promulgated on the internat has become an important social proble, which not only poisons people's mind, but also might effect social stability and country security. In order to reinforce the control of the network infromation and guarantee the security of the content promulgated on networks, the paper proposes a content-based network monitoring system. This paper first...
Web usage mining is an application of data mining technology to mining the data of the Web server log files. It can discover these session patterns of user and some kinds of correlations between these Web pages. Web usage mining provides the support for the Web site design, providing personalization server and other business making decision. There are some session patterns saved in Web server log...
Starting from semantization of Internet documents, aiming the issue of Internet address' ergod whose objective is converting HTML documents of the original version into transitional XHTML documents and into RDF documents of direction to xml, authors have done the mathematical description and verification to cluster of IP address and computer directory/file tree based on fractal theory. With the formation's...
The knowledge of traffic behavior characteristics of every application has vital effect on the accuracy and granularity of application identification. Based on analyzing the Chi-Square Statistics, a novel method named ABSA is proposed to analyze the traffic behavior characteristics of applications. The ABSA method does not focus on any certain applications; in contrast, it aims at providing a quantitative...
Active Queue Management (AQM) can potentially reduce packet loss rate in the Internet. This is used by routers for control congestion, where packets are dropped before queues become full. In this paper, a new framework of AQM, namely NEWQUE active queue management algorithm supporting explicit congestion notification (ECN), is proposed. The objective of the new algorithm is to improve performance...
Internet grows day to day and so on the complexity of its security. Different types of people all around the world use Internet in their daily routine tasks. Internet and network security challenges make use of more efficient and complicated defense tools such as Intrusion Detection Systems (IDSs) vital. Nowadays attempts to solve IDS problems are under consideration. One of the deficiencies of current...
The address non-transparency of NAT (network address translation) device is a great challenge for managing and monitoring the network. Now a lot of problems exist in various detection technologies for obtaining the number of NATed hosts, which can't meet the need of managing and monitoring network. This paper analyzes popular detection technologies for detecting the number of NATed hosts in detail,...
In order to support more value-added services and a larger space for IP addresses, the Internet requries to classify IPv6 packets into flows for specific requirements. High performance IPv6 packet classification (PC) algorithms are therefore in high demand. This paper proposes a new IPv6 PC algorithm based on flow label (FL), called FLIN (Flow Label Initial Noticed). FLIN is fast and scalable with...
Packet classification (PC) is an important technology for next generation network services. Even though some PC algorithms for IPv6 have been proposed, most of them are precluded from commercial equipments due to high memory requirements, low searching speed, or expensive cost. In this paper, we propose an efficient paralleled IPv6 packet classification scheme; called Plus Bits and Bloom Filter based...
Stochastic fairness queuing scheduling scheme resolved the connection level fairness problem and are widely used in traditional network, however, with rapid development of P2P services in Internet, this classical algorithms failed in maintaining fairness among hosts. In this paper we proposed an improved SFQ algorithm: Dual Class SFQ to ensure the fairness among hosts using different type of services...
Along with the development of Internet/Intranet application, more and more sensitive data is transmitted through the network. In order to prevent the critical data from being divulged and guarantee the security of information, we should pay more attention to the surveillance of network traffic. With this motivation, we present an efficient TCP flow reassembling algorithm which is the key of dataflow...
Peer-to-Peer (P2P) systems have gained much popularity over the past few years. P2P networks contribute a significant portion of the Internet traffic and cause increasing costs incurred by Internet service providers (ISP). Present P2P systems are generally selecting peers in random manner, regardless of the network cost, which generates much redundant traffic over the core network and congest the...
To keep the network secure, it is necessary to monitor network traffic timely and effectively. The traditional methods for detecting network anomalies were mainly based on such ways as sampling, counting and aggregating, but they can not solve the problem of getting accurate and effective results well. In this paper we propose a new method that is based on the basic properties of frequent pattern...
A defense system against UDP flooding attack with artificial immune detection was put forward, and four sections detection with weight was proposed based on considering the uncontinuity of IP address. Eigenvalue matching was introduced based on analyzing the r-continuous bits matching rule. Using the new matching rule the negative selection algorithm was improved both in detector generation and "black...
Internet topology measurement is an important part of Network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP addresses belonging to the same router for constructing accurate Internet maps. However, there are thousands of IP addresses only in a region topology exploration, while current alias...
This paper evaluates security issues of the recently designed and implemented next generation protocol UDTv4 and offers two contributions to this area of research. Firstly, since UDT is a relatively new protocol, its security requirements have not been considered and explored. An examination investigating its security requirements in implementation is performed. The objective is to achieve a wide...
The domain name system (DNS) is a fundamental component of the modern Internet, and repeated queries make up of a large amount of DNS traffic. To filter out the repeated queries in BIND DNS log file, an efficient algorithm is proposed. The algorithm is characterized by maintaining the time sequence of original queries during the processing. The experimental results using CN TLD root server log are...
Anycast communication is a new Internet service defined in IPv6, and it can make a host communication with the one ldquonearestrdquo member in a group of servers. The anycast routing problem with multiple QoS constrained is known to be NP-complete problem and we can't get satisfying results when using the precise method in polynomial time. In this paper, a QoS anycast routing algorithm based on ant...
In order to solve the problem of user-classification to reflect the features of Web users inflexible, a novel user classification model was presented in this paper. By introducing the concept of time discretization and applying fuzzy equivalence relation clustering to classify Web users, the model can rationally solve the user classification problems. Empirical results showed that the output of user...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.