Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Geolocation databases are widely used for mapping Internet devices' IP address to the physical location. However, there are inconsistencies between them. It is difficult to avoid because the methodology used by database provider to gather their geographic information is different. Moreover it is impossible to update database in real time. Yet by analyzing inconsistencies between geolocation databases,...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Nowadays, many school teachers start to execute E-testing in classrooms due to its time and labor-saving. It is not easy that teachers want to block access to the Internet for online cheating activities. Therefore, an offline E-testing system is needed. However, existing offline E-testing systems are always developed ad hoc for particular purpose and procedures. This paper presents a general-purpose...
Distributed Denial-of-Service (DDoS) attacks continue to constitute a pernicious threat to the delivery of services within the Internet domain. These attacks harness the power of thousands, and sometimes tens or hundreds of thousands of compromised computers to attack web-services and online trading sites, resulting in significant down-time and financial loss. The problem of detecting DDoS attacks...
A flow is said to be asymmetrically routed if its packets follow separate paths for forward and reverse directions. Routing asymmetry leads to problems in flow identification, policy enforcement, quota management, traffic shaping etc. in DPI systems. There are two existing approaches to battle routing asymmetry: clustering and state sharing. The latter fails with stateless traffic, while clustering...
Information-Centric Networking (ICN) is proposed to address the inefficiency of content delivery of IP networks from the perspective of architecture. In contrast, Content Delivery Network (CDN) is an overlay solution in current IP networks. We believe that even though ICN is fully deployed, there is still a role for CDNs to play in ICN networks. Since ISPs in ICN will replicate and forward contents...
Malware attacks have become ubiquitous in modern large data-centric networks. Therefore advanced malware threat detection and related countermeasures are an important paradigm in cybersecurity research. This work studies malware propagation in fully connected networks, where network topology plays a minimal role in lateral spread within the network. The live netflow and perimeter alert data used in...
BGP measurement is important for monitoring and understanding the Internet anomalies. Most of the previous works on BGP measurement rely on aggregated statistics from BGP monitors, e.g., total updates. However, BGP events may have quite limited visibility. Therefore, merely investigating aggregated data may lead to misunderstanding Internet instability, e.g., overestimating the impact of monitor-local...
The present paper focuses on the quantitative and qualitative performance analysis of Network Mobility (NEMO). It compares the original NEMO architecture with an architecture in which NEMO is enhanced with Multi-Path TCP (MPTCP). This quantitative and qualitative analysis is done by plotting theoretical and experimental results using a local testbed implementation. It is shown that the novel combination...
We propose a methodology based on Hidden Markov Models (HMMs) to model scanning activities monitored by a darknet. The HMMs of scanning activities are built on the basis of the number of scanned IP addresses within a time window and fitted using mixtures of Poisson distributions. Our methodology is applied on real data traces collected from a darknet and generated by two large scale scanners, ZMap...
The Internet Protocol (IP) is ubiquitous in terrestrial and electromagnetic-carrier wireless networking. However, for very low-throughput underwater links (such as those using acoustic modems) the IP header introduces an unacceptable amount of data overhead for the small maximum transmission units available on underwater acoustic links. Nonetheless, it is becoming increasingly valuable to connect...
Port scans are typically at the begin of a chain of events that will lead to the attack and exploitation of a host over a network. Since building an effective defense relies on information what kind of threat an organization is facing, threat intelligence outlining an actor's modus operandi is a critical ingredient for network security. In this paper, we describe characteristic patterns in port scan...
The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration...
Many free offers in internet has made startup online business owners struggle to pay their bills. At first, local startup online companies learned that free stuffs will attract traffics and once you get the traffic, revenue will follow. However, it doesn't come easily. PT IP, as a local online escrow service provider for C to C, transaction traffics were dropped to more than 80% after they start to...
Network prefix hijacking is still a serious threat in the Internet. Confirmed incidents in the recent past have shown that even small autonomous systems (ASs) are able to manipulate routing information with huge global impact. Even though countermeasures exist, they are not established at large scale yet. Monitoring of the actual routing state is the only mean to provide at least information about...
Future Internet has been a hot topic for the last decade. One of the approaches put forward in order to revise the Internet architecture is LISP – Locator/ID Separation Protocol, which leverages the separation of the identifier and the locator roles of IP addresses. Contrary to the classical push model used by the BGP-based routing architecture, LISP relies on a pull model. In particular, routing...
Internet topology measurement studies rely on a few vantage points to trace towards a large number of destinations. Such traces contain significant overlaps, which increase the measurement traffic and duration. As there is considerable redundancy in the generated measurement probes, researchers have been exploring probe reduction approaches with minimal loss of the topological information. To decrease...
Traceroute is the most widely used Internet path analysis tool today to study the topology of the Internet and to diagnose routing failures as well as poor performance events. A major limitation of traceroute when the destination is not controllable by the user is its inability to measure reverse paths, i.e., the path from any given destination back to the source. This is a major drawback for ISPs,...
As the number of Internet users increases, network devices are required to achieve power savings. For this purpose, the authors proposed a Gigabit Ethernet link rate switching method based on the destination IP address for typical networks in small offices or at home. However, this method has a problem in that the communication is interrupted for a few seconds when the link rate is switched. To solve...
With the spread of high-performance mobile terminals that include sensors, participatory sensing is attracting attention for collecting sensor information using smartphones. Although there are two key advantages to this approach, its low cost and wide range of sensing, they come at the tradeoff of both the battery and storage. Therefore, efficient collection is required. There is also a challenge...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.