The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) connects a large volume of devices together, via different modes of wired and wireless communication interfaces. The existing transport layer protocols, like TCP and UDP as well as their variants, lack functionality to handle the diverge and heterogeneous communication standards while ensuring the IoT transport requirements like short-lived packet or message transfer, short...
This paper presents a framework for a firewall to analyze and block BitTorrent file-sharing protocol using Traffic Analysis (TA) methods. BitTorrent traffic can be a concern of network administrators and is a valuable target for TA based investigation. In this work, the ability of a TA based classifier to identify the existence of BitTorrent traffic is tested under the condition that it is not only...
To better understand the Internet infrastructure services is crucial to the design, operation, and management of Internet applications. The lack of better understanding of the actual usage of allocated IP addresses is among many such challenges, due to the wide deployment of IP address multiplexing techniques, such as NAT. To address this issue, we propose a novel analysis approach based on large-scale...
The Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures use a forwarding plane that requires large Forwarding Information Bases (FIB) listing the next hops to name prefixes and Pending Interest Tables (PIT) that maintain per-Interest forwarding state. We introduce CCN-RAMP (Routing to Anchors Matching Prefixes), a new approach to content-centric networking that substitutes...
Internet security is a branch of computer sciences often involving browser security, network security, applications and operating systems to keep the internet as a secure channel to exchange information by reducing the risk and attacks. There are a number of studies that have been conducted in this field resulting in the development of various security models to achieve internet security. However,...
Honeypot technology is one of the main mechanisms of computer security. It is certain resource, which should be attacked or explored illegally. The research provides the version of Honeypot implementation based on proxy-server. The target of paper is emulation of intruder detection system and analysis of potential violator behavior. As a result, statistics of attacks sources has been collected and...
The modern world is facing a problem of monitoring transportation of vehicles, cargo and people. In order to prevent burglaries, to optimize logistics and to raise general safety level it is of utmost importance to find ways of tracking positions of objects. Despite the fact that a few solutions have already been provided, they all have a number of shortcomings, including the high cost, short battery...
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
The flow of information among people through electronic devices has undeniably become an important aspect of many human lives. The importance of the Internet has grown in time to settle on almost even grounds with electricity. Here, we present a novel hybrid approach to opportunistic wireless networking. The main objective of our work was to propose a system with a feature-set attractive for real...
In the recent phase, product cost variance analysis has been widely used. Traditional product cost variance analysis is based on data fusion method, which is constrained by its own openness and self-organizing condition. In the process of product cost variance analysis interaction, it is very easy to cause a large amount of data, resulting in system crashes, influencing the effect of data analysis...
Nowadays, the Internet of Things (IoT) is receiving more attention in commercial and academic research, especially about its security property. However, current protocols cannot satisfy the requirement of various IoT applications and introduce some problems. There are three typical problems: traditional public key infrastructure (PKI) apply in IoT will incur great overhead, wireless sensor network...
A worm is a standalone program, which is self-replicating malware that distributes itself to other computers and networks. An Internet worm can spread across the network and infect millions of computers in very little time. Damages caused by such attacks are considered very high. Worms affect the network packet and its performance. In this paper, different methods are analyzed to detect Internet worms...
We propose that spectrograms can be useful for investigating large and complex sets of temporal data, especially 3D-like, using them as a quick and compact high density visualization tool for big data, where each pixel represents a data value. Our approach proposes for interaction with the spectrogram based toolkit thus allowing for a possible redefinition of hypothesis or research goals when new...
Today a lot of digital evidences for crime investigation includes a geospatial component. This data comes from various sources such as smartphones, tablets, navigation systems, digital camera with global positioning system (GPS), etc. The geospatial data plays a crucial role in crime investigation such as helping to tracking suspects, profiling serial offenders, recognizing trends in criminal activities,...
The use and deployment of Industrial Control Systems (ICS) have become standard across many industries, though the security of these important systems have not kept pace with their current Internet focused deployment technologies. This technology gap has exposed an exploitable vector for would be attackers as ICS protocols do not have security mechanisms in place to handle Internet connectivity. This...
CCN (Content Centric Networking) is a new network architecture, which is optimized for content distribution by introducing route cache and request aggregation. However, current CCN is still similar to traditional Client/Server network architecture, with limited cache space, and the request aggregation policy is suitable for live streaming media rather than streaming media on demand. The main reason...
Malicious network intrusions which exfiltrate data from computer networks are extremely damaging for organisations and governments worldwide. Combating these network intrusions and large-scale cyber-attacks requires mining and analysis of large volumes of computer network data. We present a statistical filtering and temporal PageRank technique that improves the probability of discovering network intrusions...
The network traffic has been growing explosively in recent years after users can watch the high quality video from the Internet. It is an important issue to reduce network traffic and increase the user quality of experience (QoE). Therefore, there have been in-network caching schemes to cache the content fetched by users in proxy servers. Recently, software defined networking (SDN) was proposed to...
In this paper we are showing a financially savvy and effortlessly implementable i-voting (web voting) framework particularly for India in view of adhoc network. The essentials of cognitive radio innovation and Adhoc organize in view of cognitive radio technology are initially presented. The idea of smart i-voting framework is then proposed and how it can be executed in suburban region where web services...
As centralized social networking services (SNSs) or online social networks (OSNs) have inherent privacy concerns, researchers are working on decentralized SNSs as alternatives for addressing these problems. However, it is very difficult to decentralize all the functions of centralized SNSs. This paper describes a decentralized SNS using social virtual private networks (VPNs) that work together with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.