The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of things (IoT) is internetworking of various physical devices to provide a range of services and applications. IoT is a rapidly growing field, on an account of this; the security measurements for IoT should be at first concern. In the modern day world, the most emerging cyber-attack threat for IoT is ransomware attack. Ransomware is a kind of malware with the aim of rendering a victim's...
Interactive and multimedia applications depend on the stability of end-to-end paths on the Internet for predictable performance and good quality of service. On the other hand, network providers depend on multiple paths to ensure fault tolerance and use load balancing between these paths to enhance the overall network throughput. In this study, we analyze the path dynamics within service providers'...
For reenterable models of IP networks with dynamic routing according to RIP protocol, measuring subnets for QoS parameters evaluation have been essentially modified and extended. Online algorithms of statistical analysis have been specified by colored Petri nets. The mean and variance of the packet delivery time have been evaluated. As a result, the computation precision has grown and an essential...
Although the Internet offers numerous advantages, it raises many information security risks, especially against young people and children, who are today amongst the largest user groups of mobile and online technologies all around the world. Therefore, to empower and protect Internet users, it is necessary to develop proper strategies and tools to encapsulate their needs, and identify and prevent all...
Current networks are multi-service packet-switched environments, very often based on Internet Protocol, where the provision of good quality services is a great challenge. The most popular service, offered by almost every network, is voice transmission. As a real-time service, it places high demands on bandwidth and delay. The paper describes selected network dimensioning problems for the voice over...
Qos of broadband network is important. ISPs have some methods for evaluate it. But they are not efficient enough. This paper present a new method in which delay and scale of windows of TCP messages are used for evaluating performance of broadband. Comparison between delay or scale of window s of samples is the core idea of the method. There are two kinds of comparison. One is absolute terms of above-mentioned...
Word embeddings is a well known set of techniques widely used in natural language processing (NLP), and word2vec is a computationally-efficient predictive model to learn such embeddings. This paper explores the use of word embeddings in a new scenario. We create a vector representation of Internet Domain Names (DNS) by taking the core ideas from NLP techniques and applying them to real anonymized...
Tor is an anonymous Internet communication system based on the second generation of onion routing network protocol. Using Tor is really difficult to trace the users Internet activity: this is the reason why the usage of Tor is intended in order to protect the privacy of users, their freedom and the ability to conduct confidential communications without being monitored. Tor is even more used by cyber...
IPv6 is an ultimate solution to the Internet address exhaustion. It is believed, the protocol will be requested by not only human but also everything on the earth surface. Furthermore, the improvement on the protocol is important to achieve IP packets transmission efficiently. Processing technology has been improved to become very fast packet processing both in host as well as intermediate systems...
The success of the Internet around the world has produced many benefits, but due to IP protocol stack limitations, the IP addresses exhaustion problem soon arose. Although it has been proposed several solutions to alleviate it, the problem still remains, specially in the emerging countries, which have a reduced pool of public IPv4 addresses. Classless Inter-Domain Routing (CIDR) scheme has partially...
In the era of the Internet, people are active in multiple online services, and they usually have accounts on more than one online service. Each account is a virtual identity of the user. In order to trace individual's online behavior at any time and any places, linking virtual identities belonging to the same natural person across different online service domains is very important. Existing methods...
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
Being widely adopted by worldwide service providers, the MPLS technology to connect geographically separated customer sites becomes important in reliability. It is used to implement VPNs to connect the customer networks i.e., Inter-provider VPN network. In this project we first briefly describe VPNs which are behind the scope of secure private MPLS connections such as several VPN deployments emerged...
The current Border Gateway Protocol (BGP) operation in the Internet has a serious problem with regard to Mis-Origination, which is the hijacking or misconfiguration of network prefixes. We already have several Origin Validation (OV) techniques to mitigate the impact of Mis-Origination. an Internet Routing Registry (IRR) has been deployed only for a small number of users. More recently, RPKI (Resource...
We introduce a simple solution for the support of host mobility in the Internet called DIME (Dynamic Internet Mobility for End- Systems). DIME is based on dynamic address translation between the transport and network layers of end hosts, combined with a new out-of-band protocol that updates host-address bindings between communicating hosts opportunistically. It does not require modifications to the...
A major goal of current computer network security systems is to protect the network from outside attackers; however, protecting the network from its own users is still an unattended problem. In campus area networks, the risk of having internal attacks is high because of their topologies and the amount of users. This work proposes a new approach to identify whether a network user is having or not a...
DNS provides a global-scale distributed lookup service to retrieve data of all types for a given name, be it IP addresses, service records, or cryptographic keys. This service has proven essential in today's operational Internet. Our experience with the design and development of Named Data Networking (NDN) suggests the need for a similar always-on lookup service. To fulfill this need we have designed...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
In the view of converged fast-wired and fast-wireless networks (5G) with a transparent multi homed point of access to the Internet, new scenarios must be considered in the near future. In particular, this paper focuses on an Internet access leveraging simultaneously on different technologies such as ADSL, cable, WiFi, 3G/4G, satellite links, to offer a combined connectivity service. Some solutions...
Internet Finance promote the innovation and development of financial field, at the same time, it also has its own risks, such as system security risk, capital security risk, higher liquidity risk, market selection risk, monetary policy risk. So the internet financial supervision is very necessary, regulators should pay attention to the risk characteristics of the Internet financial regulation, establish...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.