The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of vulnerabilities and attacks on Web systems show an increasing trend and tend to dominate on the Internet. Furthermore, due to their popularity and users ability to create content, Web 2.0 applications have become particularly attractive targets. These trends clearly illustrate the need for better understanding of malicious cyber activities based on both qualitative and quantitative analysis...
Internet traffic monitoring and traffic characterization are essential for managing and optimizing network infrastructures. In general, the traffic classifier based on Machine Learning (ML) might not perform well for some cases such as imbalanced data sets. To address this issue, we propose an evaluation measure aiming for the case of imbalance multi-class network traffic classification based on the...
Traffic identification is an important issue in the network industry. Due to the rapid increase of applications and protocols in the Internet, traffic identification based on TCP/UDP port numbers is no longer a practical approach. Deep packet inspection (DPI) thus becomes necessary, which scans the payload of a flow for certain patterns. In this paper, we analyze the architectures of two popular open-source...
In the field of traffic classification, previous efforts have been centered on identifying applications (HTTP, SMTP, FTP, etc) rather than the actual services that they provide (email, file transfer, video streaming, etc.). Nowadays, however, a single application as HTTP can provide multiple services for the end-user. Some methods have been proposed to distinguish between these services but tuning...
The ability to localize Internet hosts is appealing for a range of applications from online advertising to localizing cyber attacks. Recently, measurement-based approaches have been proposed to accurately identify the location of Internet hosts. These approaches typically produce erroneous results due to measurement errors. In this paper, we propose an Enhanced Learning Classifier approach for estimating...
In recent years, tagging methods have been widely used on the Web for multimedia search and recommendation systems. Social tags are the keywords annotated by users to the multimedia objects. These tags contain the information which allows multimedia objects to be located and classified. Unfortunately, irrelevant information and noise are frequently included in such tags, especially when we use social...
Online social networks are increasingly being used as places where communities gather to exchange information, form opinions, collaborate in response to events. An aspect of this information exchange is how to determine if a source of social information can be trusted or not. Data mining literature addresses this problem. However, if usually employs social balance theories, by looking at small structures...
Recently, the number of Internet applications available for use on both desktop computers and smartphones has rapidly increased. The Internet traffic generated by these applications has increased significantly as well. Network operators are required to be aware of the status of managed networks in terms of application usage. However, the application traffic observed in a network is dependent on users...
Micro-blog is one of the internet applications, and it is newly developed online communication platform to achieve real-time information sharing. Micro-blog becomes quite popular. We analysis the researched approach of detecting hot topic, combine with a variety of related parameters of hot topic, and implement the detection of hot topic through Micro-blog. This paper presents a hot topic detection...
Modern malware often changes their runtime behaviors in each execution to tolerate against malware analyses and detections. For example, when a malware copies itself on a file system, it can randomly determine its file name for avoiding the detections. Another example is that when a malware tries to connect its command and control server, it randomly chooses a domain name from a hard-coded domain...
Root cause analysis of BGP updates is the key to debug and troubleshoot BGP routing problems. However, accurately inferring what is the cause of routing instability and where it originate is very hard. In this paper, we present a novel approach to locate the origin of routing instability by analyzing the relationship of the closed loops formed by intersecting the all the paths in path exploration...
Web content extraction is actually the process of transforming web unstructured information into structured information. Knowledge base has the advantages of ordering information and knowledge, also be used conveniently. So it's convenient to retrieve information and knowledge, and it makes base for effective use. Knowledge base will speed up the knowledge and the flow of information and make for...
Despite the advances in technology and increase of internet usage which provide numerous benefits to mankind, little is known about the problems and related issues such as the ethical issues and behavior of using the internet. Hence, it is crucial for researchers to study on the ethical issues relating to the use of information and communication technologies (ICT). This paper extends prior researches...
While network coordinate (NC) systems provide scalable Internet distance estimation service and are useful for various Internet applications, decentralized, matrix factorization-based NC (MFNC) systems have received particular attention recently. They can serve large-scale distributed applications (as opposed to centralized NC systems) and do not need to assume triangle inequality (as opposed to Euclidean-based...
Online quality prediction allows service-oriented systems to anticipate the need for adaptation and thus to prevent the actual occurrence of failures or to mitigate upcoming failures. Such proactive adaptation capabilities are increasingly relevant for future service-oriented systems, which need to cope with limited control over third-party services, as well as rapidly changing usage contexts. Initial,...
BGP prefix hijacking remains a serious security threat to the Internet. Despite many detection mechanisms have been proposed, few of them are practically deployed in a large scale. Inaccuracy of detection and inefficiency of deployment are two major causing problems. In this paper, based on the key observation that the distribution of traffic load to a prefix will change unusually after the prefix...
Root cause analysis of BGP updates is the key to debug and troubleshoot BGP routing problems. However, inferring the root cause with high accuracy is challenge. Although correlating multiple vantage points is a validate method, how many vantage points are truly necessary to pinpoint the root cause is not resolved. In this paper, we propose a new method to explore two independent vantage points to...
Location-based information systems (LBIS) have shown growth in the last years thanks to the popularization of cheap GPS-enabled mobile devices with connectivity to the Internet. At the same time, users have made their locations more available than ever, representing a major privacy problem, as attackers could easily determine their victims' common paths or actual locations. As a result, some techniques...
Our research concentrates on anomaly detection techniques, which have both industrial applications such as network monitoring and protection, as well as research applications such as software behavioral analysis or malware classification. During our doctoral research, we worked on anomaly detection from three different perspective, as a complex computer infrastructure has several weak spots that must...
The need to quickly and accurately classify Internet traffic for various traffic shaping purposes and security reasons has been growing steadily. This is due to the many new applications that have been taken place in the field of Internet traffic. As conventional port number based and packet payload based methods are no longer adequate, pattern recognition by learning the statistical flow-based features...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.