The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet Exchange Points (IXPs) play a crucial role in the Internet ecosystem. However, existing literature fails in quantitatively assessing the advantage for an Internet Service Provider (ISP) to peer at an IXP. We give a contribution to bridge such a gap by collaborating with three medium-sized ISPs in Italy to compare key performance indicators (round-trip delay, hop count, packet loss, and jitter)...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly dynamic, and largely opaque eco-system of networks the Internet is. Currently, only two practical solutions are available: (i) equipping packets with the Record Route IP option to register addresses of the traversed routers; (ii) eliciting ICMP Time Exceeded messages by limiting the Time-to-Live of...
Social networks and other clouding applications should require a fast response from datacenter's infrastructure. One of the techniques that has been widely used for achieving such requirements is the employment of In-Memory Key-Value Storage (IMKVS) as caching mechanisms in order to improve overall user experience. Memcached and Redis are applications that use IMKVS approach. Commonly IMKVS clients...
With the increasing diffusion of Internet probing technologies, a large amount of regularly collected traceroutes are available for Internet Service Providers (ISPs) at low cost. We introduce a practically applicable methodology and algorithm that, given solely an arbitrary set of traceroutes, spot routing paths that change similarly over time, aggregate them into inferred events, and report each...
This paper proposes a 3D real-time video-teleconferencing system over IP broadband networks. The video capturing uses two synchronized cameras positioned side by side in front of the person who will communicate, in order to compute his or her three dimensional information to be transmitted to the remote side. The system also has a module for IP transmission of audio and video, and a module for 3D...
Using thousands of infected internet computers to launch distributed denial of service attack against companies and governments internet resources by attackers is becoming dangerously common trend. Recently, there is a growing trend towards attackers, using IRC (Internet Relay Chat) protocol-based botnet for control and command infected internet computers. The botnet consists of the infected computers,...
The use by a growing number of users of Cloud-based services requires an adaptation of the network technologies used to access them. We propose to combine two novel protocols at the state of the art at Cloud access middle-boxes to better profit from spare unused network path diversity. The first protocol, Multipath TCP, allows creating multiple TCP/IP sub flows, as much as needed. The second, the...
Today, Online audits give profitable data about items and administrations to buyers. On the other hand, spammers are joining the group attempting to deceive pursuers by composing fake surveys. Past endeavors for spammer identification utilized reviewers' behaviors, text similarity, linguistics features and rating patterns. Those studies have the capacity recognize certain sorts of spammers, e.g.,...
Use of Internet in today's world has been largely dominated by content dissemination but currently used IP architecture is based on connection between hosts. In order to disseminate content efficiently in cost effective manner, internet architecture needs to map "what" user wants with "where" host of network is. Content Centric Networking (CCN) decouples content from host. CCN...
The policy challenges associated with global warming, the prospect of increasingly expensive fossil fuels, and serious concerns about the safety of nuclear power are encouraging many country of world economies to develop smart grids (SGs) as a component of their energy policy portfolios. In the smart grids is an important part of renewable energy sources especially for wind turbines. Due to structure...
A dedicated networking laboratory is used by students on a computer networking degree program so that they can undertake practical work without affecting the main University network. Images of the laboratory computers are maintained on a server and deployed when major updates or reconfigurations of the computers are required. Improvements can be made in the configuration and management processes....
Honeynet represents a new strategy in defending the computer networks and systems against unauthorized access or hacking attempts. Not only it can detect and display the attack pattern or the tools utilized, it can also help in eliminating access to real systems by representing an emulation of the physical systems and services present within the network, thus delaying or confusing the intruder. In...
Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. With little or no advance warning, an attacker can easily exhaust the computing resources of its victim within a short period of time. In this paper, we study the...
Nowadays, client likes to take suggestions before spending on a new product. For this they go to online item review webpage for perusing other's encounters and saying for that item. A real issue which was disregarded so far is the investigation of review spammers. However, numerous scientists gave their productive commitment in this field of exploration from 2007. The situation now asks for, conspicuous...
Many commercial and open-source network simulators are available; however, most of them are not suited for novices in college and school education or learning. Moreover, although Ethernet has recently become much more important, simulators that can be used for this purpose is rare because most simulators suited for education and learning are designed for IP communication. The author developed a simple...
Classification of Network Traffic is one of most important issue in network management and detection of Intrusion attacks play a vital role in it. To have a holistic picture of the network intrusion detection, selection of appropriate feature is very important; it reduces analysis effort and time too. Data mining can be very fruitful for feature selection and intrusion detection. In this paper, Tcpdump...
This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions),...
HTTP botnets have been a major threat to cyber security in recent years. Fast-flux technique can be detrimental to botnet detection techniques based on traffic analysis, due to its ability to hide bot traffic among normal traffic. In this paper we propose a new approach to detect hosts infected by HTTP bots. Our technique will not only detect traditional HTTP botnets but also fast-flux botnet traffic...
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels internet traffic through worldwide network having number of relays to hide user's usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known...
Voice chat and conferencing services may be assumed to be private and secure because of strong encryption algorithms applied to the video stream. We show that information leakage is occurring in video over IP traffic, including for encrypted payloads. It is possible to detect motion and scene changes, such as a person standing up or walking past a camera streaming live video. We accomplish this through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.