The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial of Service (DDoS) is one kind of attacks using multiple computers. An attacker would act as a fake service requester that drains resources in computer target. This makes the target cannot serve the real request service. Thus we need to develop DDoS detector system. The proposed system consists of traffic capture, packet analyzer, and packet displayer. The system utilizes Ntopng...
Methods and ways to perform denial-of-service attack are analyzed and classified in this work. Famous Denial-of-Service attack classifications are reviewed and analyzed. New elements of modern DoS attack classification are proposed.
The MPT network layer multipath communication library-which was proposed to be a possible new basis for the future cognitive info-communication-is capable to use multiple communication channels to create an UDP tunnel which uses GRE tunnel protocol. On the other hand, Multipath TCP uses a special kernel module which creates multiple TCP sub-flows to aggregate network throughput. In this paper we used...
Being DNS an essential service for Internet reliability, it is an attractive target for malicious users. The constantly increasing Internet traffic rate challenges DNS services and their attack detection methods to handle actual queries while being flooded by tens of millions of malicious requests per second. Moreover, state of the art on hostile actions evolve fast. DNS administrators continuously...
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
It was long time ago, when the Internet was a basic network used for data and information sharing. The evolutionary process of the Internet started with connecting people and then with the increasing popularity of it and with the emerging concept of smart systems, device-to-device communications within smart systems dawned. And now; by taking the advantage of another emerging concept: mobility, we...
From the point of view of system development, this paper introduces a FPGA based parallel AD acquisition board and its implementation process. The board uses 24-bit 8 channels of TI to synchronize the sampling chip ADS1278 to synchronize the input signals of the 8 input signals. FPGA uses Altera's EP2AGX45F572, Nios II processor running on it as the core of data processing. Communication between CY7C68013...
The paper is devoted to an analysis of a one-year-long period of operation of a honeynet composed of 6 Dionaea honeypots emulating Windows services. The analysis focused on the frequency of attacks according to the location of individual honeypots (sensors) as well as to the geographical location of attackers. From the statistical processing of the results, it was demonstrated that the most frequently...
A user-orientation behavior profile is present to analyze demand for telecommunication and Internet services. This paper proposed a system for analyzing service demand used to simulate usage under various assumed conditions. A User behavior profile, together with a prototype profile, is simulated and tested. A User behavior profile is constructed in detailed segment to improve the accuracy of services...
A computer has become possible to operate more services by improving the performance. Therefore, there is a growing tendency to aggregate a single computer. In consequence, a virtualization technology such as VM (Virtual Machine) is receiving a lot of attention.
Theoretical values of throughput and latency parameters of 3G as well as 4G mobile networks are generally known from the standards. However, in praxis they depend on various aspects like radio signal coverage, number of connected users or moving speed of the terminal equipment. In this paper we present results of measurements conducted in Vienna, Austria. They were conducted for activities of AEROCEPTOR...
Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk...
Honeypots and honeynets are unconventional security tools for the purpose of studying techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, we focus on information about the locations, shapes of geographic features and the relationships between them, usually stored as coordinates and topology (spatial...
This paper aims to design a Hadoop system and evaluates the performance of a task allocation scheme. The task allocation scheme splits each job into tasks using an appropriate splitting ratio, and assigns tasks to slave servers based on server processing performance and network resource availability. We experimentally evaluate the performance of the scale out of the task allocation scheme with five...
In Named Data Networking (NDN), the speed of name lookup operation and the scalability concern impact deeply on the performance of the forwarding system. NDN names can contain unbounded number of components which may result in intolerable lookup time. And since routers cannot have unlimited table size to keep up with the unbounded nature of application data namespace of NDN, it may lead to missing...
The strict Quality of Service requirements of real-time services in communication networks necessitate the fast recovery from link/node failures by activating alternate paths which avoid the failed component. Multi Topology Routing (MTR) based IP Fast Re-Route (IPFRR) technologies rely on virtual topologies (VTs) to seamlessly forward the IP packets during network failures. In this paper, we implement...
Structured overlays enable a number of nodes to construct a logical network autonomously and search each other. Skip Graph, one of the structured overlays, constructs an overlay network based on Skip List structure and supports range queries for keys. Skip Graph manages routing tables based on random digits; therefore, the deviation of them disturbs effective utilization of the routing table entries...
Recently, a new type of domain names, namely temporary domain names, has become heavily used by many kinds of Internet services, such as cloud storage and social networks. Generally, these services would generate a large volume of temporary domain names within their private domain zones, and use them to convey “one-time-signals” with their customers. By analyzing the real world DNS traffic, we find...
The management model for the process of IT-services guaranteed level assurance is considered. Quality level of service is controlled by applying the alternative technologies for information flows processing and IT-services structural reconfiguration in the Enterprise Resource Planning system (ERP-system). The example, that illustrates the decision-making process with the use of game-theoretic approach,...
Since 1998, SQL injection were started. So many ways of doing SQL injection on different type of database. Attacks are happened on data-driven web application for exploiting the data of the server. Existing IDS base prevention system working on predefine rules. But they are not stable. So, in order to prevent database from SQL Injection Attack, we propose a model, which is implemented with SNORT and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.