The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content Delivery Networks have gained a popular role among application service providers (ASPs) and infrastructural companies. A CDN is an overlay network that gives more control of asset delivery by strategically placing servers closer to the enduser, reducing response time and network congestion. Many strategies have been proposed to deal with aspects inherent to the CDN distribution model. Though...
Network forensic is a offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection in the network. Network examination manage unstable and persuasive data. Network traffic movement is spread and afterward lost, so organize legal sciences is frequently a devoted examination...
Network traffic classification is important for QoS, Network management and security monitoring. Current method for traffic classification such as port based or payload based suffered many problems. Newly emerged application uses encryption and dynamic port numbers to avoid detection. So we use unsupervised machine learning approach to classify the network traffic. In this paper unsupervised K-means...
The collision of information technology (IT) and operational technology (OT) networks has resulted in some significant security challenges. Cyber attacks are now taking place against critical infrastructures and the nature of industrial automation control systems equipment in OT networks makes traditional IT security measures more difficult if not impossible to employ. A new method of system isolation...
In this article, the chief research and analysis of the network performance measurement and its research trend in the world are introduced. The network measurement technologies are classified according to consultative layer and other method. Measurement technologies of network layer are emphasized. The advantages/disadvantages of the bandwidth measurement technologies and traffic measurement technologies...
Distributed Denial-of-Service (DDoS) attacks are a great threat to the Internet. Enabling accurately detection of Distribute Denial-of-Service attacks is important because it is the foundation of defense against the attacks. In this paper, we focus on the distribution difference of the packet size between normal traffic flows and attack traffic flows and propose an entropy-based detection measurement...
Network traffic generation was the subject of many research projects in the past, but none of them could generate network data which has the same nature as a traffic from human or machine behavior. In this paper we introduce a related work in this field of area focusing on advantages and disadvantages, such as authenticity, inaccuracy, wrong timings and real-time generation. Further, we propose a...
Correctly labelled dataseis are commonly required. Three particular scenarios are highlighted, which showcase this need. One of these scenarios is when using supervised Intrusion Detection Systems (TDSs). These systems need labelled datasets for their training process. Also, the real nature of analysed datasets must be known when evaluating the efficiency of IDSs detecting intrusions. The third scenario...
Cellular Network Providers (CNP) provide users with wireless data access to meet the growing ubiquitous demand for the Internet. As users subscribe to a fixed data plan for a monthly flat fee, some users may exhaust their data allowance before the end of the billing cycle, while others underutilize their monthly quota. To take advantage of such underutilization, Khausik et. al. propose a mechanism...
Through the analysis and study of common traffic monitoring methods, Net Eye(referring to the name of the model put forward in the context) traffic monitoring model is put forward. The article expounds its function and the key algorithm, and system implementation by technologies such as WinPcap and so on.
Nowadays, along with the development of mobile network, the network traffic is growing rapidly, including traffic between backbone networks. ISPs are seriously puzzled by the explosive growth of traffic between backbone networks. Therefore, the research and analysis of traffic characteristics between backbone networks becomes essential. In this paper, based on the Hadoop platform, we analyze the monthly...
With the widespread popularity and rapid development of Internet, the network is becoming more complex. Analysis of network node behavior can be crucial for network management and service provisioning. In this paper, we conduct the detailed measurement analysis of the network node (NN) traffic characteristics based on a large-scale data set collected from an enterprise network traffic monitoring device,...
This paper compares and contrasts the most widely used network security datasets, evaluating their efficacy in providing a benchmark for intrusion and anomaly detection systems. The antiquated nature of some of the most widely used datasets along with their inadequacies is examined and used as a basis for discussion of a new approach to analyzing network traffic data. Live network traffic is collected...
Many of the classical self-similar network traffic models are asymptotic in character, Hence, they are not as much of effective in queuing based performance estimate. Self-similar characteristic is most important for network traffic engineering as it causes degradation of network performance. In this paper, we investigate mean waiting time and packet loss probability of the switch under self similar...
Today, network traffic has increased because of the appearance of various applications and services. However, methods for network traffic analysis are not developed to catch up the trend of increasing usage of the network. Most methods for network traffic analysis are operated on a single server environment, which results in the limits about memory, processing speed, storage capacity. When considering...
Network traffic intrusions increase day by day in computer systems. This poses major security threats to computer networks. In this paper, we present an effective approach for anomaly detection in network traffic. We investigate the long-range dependence (LRD) behavior of decomposed network traffic subgroups in different directions with respect the enterprise network. If the network traffic exhibits...
With the rapid increasing impact of the mobile Internet on people's daily life, accessing the Internet via mobile devices is showing an obvious trend, which brings a large amount of network traffic at the same time. This paper analyzes HTTP traffic characteristics based on real world data collected from a commercial Internet Service Provider (ISP) in charge of some regions of China. We investigate...
In recent years, with the rapid development of the Internet on a global scale and the prompt popularization of various App applications, the Internet is increasingly becoming an integral part of people's lives. Meanwhile various network problems caused by abnormal network behavior have become more prominent than any time before. Furthermore we also have a lot of personal information on the Internet,...
IP traceback to the origin of denial of service (DoS) attack is extremely hard and most existing methods such as marking and logging based approaches are not practical and need changes in infrastructure. The flow-based IP traceback is a new approach which can use the advantages of metaheuristic algorithms. In this paper, a bee colony algorithm is applied to find the DoS attack source. The traffic...
Within the Future Internet, a new trend is foreseen with the creation of overlay networks composed of residential gateways (i.e. Home-Box), leveraging their storage and upload capacity in order to achieve scalable and cost-efficient content distribution. In this paper, we highlight an architecture of such a home-box overlay for Video On Demand (VOD) services, in cooperation with a network-aware request...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.