The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Voting advice applications (VAA) have become an increasingly popular feature of electoral campaigns. VAAs are online tools that use survey techniques to measure the degree to which the policy preferences of citizens match those of political parties or candidates. In some cases, such as The Netherlands, VAA's can attract millions of respondents providing an incredibly rich source of mass public opinion...
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory...
With the advancements in the hardware technology, it is now possible to transmit data over Ethernet at the rate of 100Mbps/1Gbps. The only limiting factor for such a high peed data transfer is the speed of the processor in the computer which does all the TCP/IP processing by using the TCP/IP software written in it. In the present system, the IR sensor used is taking 50 images of plasma per second...
The use of the proxy server is being extended steadily in order to provide various web services and improve the quality of web service. However, passing many proxy servers may degrade the quality of web service, because of increasing HTTP message processing time. In this paper, we propose a scheme that bypasses many proxy servers constituting proxy chain. Furthermore, we perform network simulation...
This paper presents a combination of programming languages and web technologies used to deploy a modern remote controlled system. The hardware part of the system is a parallel port interface board that contains different types display devices, user-input components and some relays. The system functionality is based on some software applications developed using different techniques: the communication...
The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing potential TCP SYN DDoS attacks. Router based TCP Intercept is found to provide the best defense while Anti DDoS Guardian gave the worst defese.
The introduction and adaptation of IPv6 addressing have taken great strides coherent to the proliferation of Internet of things. Devices are getting connected in the network plane for streamlined interoperability and to provide compound collaborative services; and although the expanded address space are proving handy they comes with added network management complexity. DHCPv6 assigns address to connected...
This paper focuses on ARP attacks in switched networks, from ARP protocol perspective, analyses the principle of ARP attacks and the exceptional interrupt occurs they cause when the terminal users access the servers. To quickly and effectively detect ARP spoofing, this paper proposes a WinP cap based detection system of ARP spoofing. Using Win Pcap driver development monitoring software, implements...
Network security analysts presently lack tools for routinely screening large collections of network traffic for structures of interest. This is particularly the case when the structures of interest are embodied as summaries of sets of related traffic, essentially behaviour descriptions. This paper sketches a methodology to provide such capability, in the context of flow data. The methodology generates...
The classical approach for Internet topology measurement consists in distributively collecting as much data as possible and merging it into one single piece of topology on which are conducted subsequent analysis. Although this approach may seem reasonable, in most cases network measurements performed in this way suffer from some or all of the following limitations: they give only partial views of...
In this paper, we propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In the system which is composed of heterogeneous storage nodes, there are performance gaps among the storage devices. The storage tiers are made by such gaps in the system. When frequently accessed data blocks are placed on improper storage tier, system performance may decline....
Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are — unauthenticated and stateless nature of ARP...
The naming and routing schemes in traditional TCP/IP were designed in the days when processors were slow and memory was expensive. These schemes are weak in terms of the following aspects: inability to properly support mobility and multi-homing, creating complexity in the network configuration, making network measurement difficult, and so on. To avoid such weaknesses, we propose a new naming and routing...
Since adversaries may spoof their source IPs in their attacks, traceback schemes have been proposed to identify the attack source. Among these methods, Hybrid IP traceback schemes fuse packet marking and packet logging, using only one packet for traceback and reducing the storage requirements during packet logging. However, if a hybrid traceback scheme logs a packet's digests on a router, the router's...
Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how effective shuffling is and under what circumstances...
Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible for its own behaviors so that the entity is part of larger chains of the system's accountability. In this paper, we propose designs of a multiresolution flow-net scheme to achieve...
Nowadays, Computer Networks tend to be large and diverse systems that communicate using wide selection of protocols. This complexity made the desire for more sophisticated tools to watch and troubleshoot network traffic. Network traffic monitoring is can be quite a network diagnostic tool that monitors local area networks and provides a graphical display of network statistics. While collecting information...
This study addresses the Internet Control Message Protocol (ICMP) performance problems arising in Internet protocol (IP) over Ethernet networks. These problems arise because of the compatibility issue between two different compositional protocols: the IP and Ethernet protocol. The motivation behind addressing the compatibility problem is to improve the security and performance of networks by studying...
It is shown in the literature that network address translation devices have become a convenient way to hide the source of malicious behaviors. In this research, we explore how far we can push a machine learning (ML) approach to identify such behaviors using only network flows. We evaluate our proposed approach on different traffic data sets against passive fingerprinting approaches and show that the...
Bloom Filters have been applied in many fields, including data base, network management, computer network, and computer communication etc., owing to its fast membership query and memory efficiency. In network field, Bloom Filters were used to lookup the forwarding tables in backbone routers and Data Centre switches. These solutions all build many Bloom Filters to achieve fast lookup. The main shortcoming...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.