The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the first generalized reputation system that can be applied to multiple networks that is based on the blockchain. We first discuss current reputation systems, conducting a critical analysis of their current security vulnerabilities, before looking at how new blockchain based technologies are used. We propose an innovative new reputation system that is based on blockchain technologies...
To effectively control botnets, a study on modeling and analyzing the propagation characteristics of botnets has been lasted for many years. Due to the real network has scale-free properties, it is unrealistic for mainstream propagation models to describe how the bots spread based on random network. Hence, in this paper, we take two key factors which can reflect the scale-free feature of actual Internet...
The Internet has become the most vulnerable part of critical civil infrastructures. Proactive measures such as early warnings are required to reduce the risk of disasters that can be created using it. With the continuous growth in scale, complexity and variety of networked systems the quality of data is continuously decreasing. This paper investigates the ability to employ Bayesian inference for network...
We study the impact of video on demand content delivery on service provider networks focusing on the interplay between Internet service provider (ISP) owned and over-the-top (OTT) content catalogs. We utilize an Integer Linear Program to show that the delivery of OTT content consumes significantly more energy than ISP content, which can be cached freely in the network. Retrieving OTT content from...
Excessive bandwidth consuming by peer-to-peer (P2P) applications is one of serious problems in residential networks such as in dorms, apartments and even Small and Medium-sized Enterprises (SMEs) networks which have a limited bandwidth. P2P file sharing and P2P streaming applications usually are the cause of this problem. To share the bandwidth fairly among users, the traffic of these applications...
One of the goals of network administrators is to identify and block sources of attacks from a network steam. Various tools have been developed to help the administrator identify the IP or subnet to be blocked, however these tend to be non-visual. Having a good perception of the wider network can aid the administrator identify their origin, but while network maps of the Internet can be useful for such...
This paper introduces a moving target blind rendezvous system leveraging the BitTorrent Distributed Hash Table (DHT) to securely locate other nodes in a distributed system and to exchange information without a single point of failure. We leverage cryptographic constructions such as Elliptic Curve Diffie-Hellman key exchange and secure hashing functions, as well as the immense size of the BitTorrent...
The Internet of Things is expected to foster billions of heterogeneous sensors and actuators that support a wide range of applications. Maximizing the utilization of these sensors is hinged upon the ability to discover their capabilities (ex: measured attributes, location, accuracy, etc.). This process is known as Service Discovery (SD), and can have a local scope (SD within a bounded area), or a...
Information sharing among a group of friends or colleagues in real life is usually a distributed process: we tell each other interesting or important news without any mandatory assistance or approval from a third party. Surprisingly, this is not what happens when sharing files among a group of friends over the Internet. While the goal of file sharing is to disseminate files among multiple parties,...
The measurement of a search algorithm for unstructured P2P network centres on the number of nodes not receiving their requested files (number of failures) and the number of hops per query. Most current search algorithms are unable to guarantee the success of the query. This study involves a comparison of the strengths and weaknesses of three algorithms of Gnutella P2P protocol, namely Flood, Random...
In this age where there is a massive explosion in the data in our surroundings, the traditional way of actually storing and processing the data is no longer feasible. Moreover, the unstructured data that is present cannot be processed by the conventional ways. With the emergence of this data explosion also known as Big Data, a lot of importance has given to actually process and more importantly analyze...
Content Centric Networking (CCN) has been emerged as a new networking paradigm. In CCN, adaptive video streaming is one of the most promising technologies. However, rate adaptation and outbound face selection are the primary concern since a node cannot reliably estimate the end-to-end throughput. In this paper, we propose a strategy for outbound face selection considering both response time and bit-rate...
DoS attacks are significant issues for the Internet. With huge need on internet service provided using large application server, Denial of Service (DoS) attack is developed into a key security issue in the network service provisioning. Flooding attack is one of the major DoS attacks, floods the network traffic abnormally to disturb the internet services which is rendered to users. In addition, worm...
In this paper, we focus on the topic of construction of multicast trees in overlay networks. Moreover, we address our problem with the survivability assumptions and propose several scenarios that can be applied to provide the required protection. We perform numerical experiments to compare proposed survivability scenarios and investigate the problem of providing survivability to both static and dynamic...
The necessity of information and communication technology beggars description. But in developing world, proper ICT facilities have not been achieved yet, especially, in the rural or remote areas. In this paper, an incentive has been presented to develop a sustainable peer to peer network for those areas. The connected peers will be able to share important information shared without the requirement...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
Peer-to-Peer (P2P) botnets have emerged as a significant threat against network security because of their distributed platform. The decentralized nature of these botnets makes their detection very challenging and the situation gets aggravated if an existing P2P network is exploited for botnet creation (parasite botnets). In this paper, we present a two-tier detection scheme to detect parasite P2P...
Social Networking Sites (SNS) require a centralized system accessible via Internet. SNS' owners are in control of user's data; this often leads to data theft, piracy and privacy issues. This paper proposes a way of socializing with people in surrounding places by using a ubiquitous social sensor network system (USSNS) where Wireless Sensor Node interact in a peer-to-peer mode without the need of Internet...
Decentralised, peer-to-peer based services present a variety of security and privacy benefits for their users, and highly scalable to cater for a growing numbers of users, without extra servers being required of the service operator. This presents a significant advantage for newly emerging mobile applications (with high numbers of users, and limited funds for infrastructure), although performance...
Assessing information quickly and accurately in order to respond in any emergency situations is vital. This paper proposes an approach to provide information exchange in the emergency situation. We propose a scheme focusing on information collection and distribution between heterogeneous organizations who involved in the emergency response system. Our scheme uses peer-to-peer concept in order to support...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.