The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
in this work, SDN has been utilized to alleviate and eliminate the problem of ARP poisoning attack. This attack is the underlying infrastructure for many other network attacks, such as, man in the middle, denial of service and session hijacking. In this paper we propose a new algorithm to resolve the problem of ARP spoofing. The algorithm can be applied in two different scenarios. The two scenarios...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
Nowadays, a typical household owns multiple digital devices that can be connected to the Internet. Advertising companies always want to seamlessly reach consumers behind devices instead of the device itself. However, the identity of consumers becomes fragmented as they switch from one device to another. A naive attempt is to use deterministic features such as user name, telephone number and email...
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
The number of computers, tablets and smartphones is increasing rapidly, which entails the ownership and use of multiple devices to perform online tasks. As people move across devices to complete these tasks, their identities becomes fragmented. Understanding the usage and transition between those devices is essential to develop efficient applications in a multi-device world. In this paper we present...
With the development of Internet, the streaming media video content is increasingly rich. At present, Adobe's Secure Real-Time Media Flow Protocol (RTMFP) is widely used in video transmission. In order to improve the video transmission speed, RTMFP adopts P2P technology. P2P technology brings a new question about traffic locality. This paper is verified that the cross-domain traffic is more than the...
This poster presents an extension to the currently limited Docker's networks. Specifically, to guarantee quality of service (QoS) on the network, our extension allows users to assign priorities to Docker's containers and configures the network to service these containers based on their assigned priority. Providing QoS not only improves the user experience but also reduces the operation cost by allowing...
Distributed shared memory(DSM) is an implementation of the shared memory model in distributed systems. Software-defined networking (SDN), can be effectively exploited to improve the performance of DSM. In this research, we propose an SDN-based distributed shared memory architecture. This architecture improves distributed applications by tuning network transmission and offloading functionality to the...
Denial of Service (DoS) attacks continue to grow in magnitude, duration, and frequency increasing the demand for techniques to protect services from disruption, especially at a low cost. We present Denial of Service Elusion (DoSE) as an inexpensive method for mitigating network layer attacks by utilizing cloud infrastructure and content delivery networks to protect services from disruption. DoSE uses...
There are currently no generally accepted metrics for information security issues. One reason is the lack of validation using empirical data. In this practical experience report, we investigate whether metrics obtained from security devices used to monitor network traffic can be employed as indicators of security incidents. If so, security experts can use this information to better define priorities...
For the least connections algorithm currently used cannot solve the problem of inaccurately reflecting the load capacity of servers caused by the situation that the difference of resources consumed by different requests is very big, this paper designs a new algorithm named UCM algorithm. It means use the unused rate of the CPU and Memory as the actor to calculate the weight of the server, and introduces...
In order to solve the problem of multiple subsystems sends images to the server and the server receives and real-time display the image on the screen and store image data in the distributed vision inspection system, this article designed a image transmission system which can realize the multi-point-to-point image transmission. The image transmission system based on TCP / IP protocol, using a typical...
For security, management and accounting, network administrators benefit from knowledge of IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it is in IPv4. This paper presents a new approach to track IPv6 address assignments in LANs. The method is based on a study of implementation of IPv6 (mainly neighbor discovery) in current operating systems. The detection...
Recent reports on Internet security have indicated that the DNS (Domain Name System) protocol is being used for botnet communication in various botnets; in particular, botnet communication based on DNS TXT record type has been observed as a new technique in some botnet-based cyber attacks. One of the most fundamental Internet protocols, the DNS protocol is used for basic name resolution as well as...
In this paper, we present the step parallelization of a dividing genetic algorithm (DGA) for the parallel, distributed, and distributed/parallel computing environments. The DGA is employed in a method for road traffic network division, which we developed. The step parallelization, which performs all steps of the genetic algorithm at least partially concurrently, is an alternative to the commonly used...
Current allocation rates suggest IPv4 exhaustion by approximately 2011. Hence, this paper will lead the way for the acceptance of Internet Protocol version 6 (IPv6) migration in the Philippines using a similar Network Address Translation (NAT) that there is an apparent means to be taken into consideration and NAT IPv6 to IPv4 (NAT64) can be a good choice for computer networks like the Philippines...
According to theWorld Health Organization, breast cancer is the most common form of cancer in women. It is the second leading cause of death among women around the world, becoming the most fatal form of cancer. However, to detect and classify masses is a hard task even for experts. Consequently, due to medical experience, different diagnoses to an image are commonly found. Therefore, the use of a...
The attempts of malicious access and attacks from the Internet to the internal computers of organizations never stop today and corresponding countermeasure for each technique is required. Most organizations introduce some firewall facilities as one of the solutions to protect their internal computers as well networks from those attacks. However, in most organizations, the network administrator has...
A Polarized OFDM (POFDM) scheme is proposed for the wireless depolarized channel. Through such scheme, each sub-carrier's polarization state, amplitude and phase can be modulated to bear information, and the spectrum efficiency can be further improved. Consider the multi-path fading channel, the channel caused depolarization impairments to POFDM are quantitatively analyzed; to mitigate such impairments,...
Modern web users are exposed to a browser security threat called drive-by-download attacks that occur by simply visiting a malicious Uniform Resource Locator (URL) that embeds code to exploit web browser vulnerabilities. Many web users tend to click such URLs without considering the underlying threats. URL blacklists are an effective countermeasure to such browser-targeted attacks. URLs are frequently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.