The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we studied the variability of 17 CAIDA Internet traffic traces which were collected in 2013, 2014, 2015 and 2016. The variability of these traces was measured by using the Index of Variability. Based on the results, we outlined several important observations. In particular, the Index of Variability has the ability to reveal significant differences between traffic traces. It is dynamic...
Algorithms for mining very large graphs, such as those representing online social networks, to discover the relative frequency of small subgraphs within them are of high interest to sociologists, computer scientists and marketeers alike. However, the computation of these network motif statistics via naive enumeration is infeasible for either its prohibitive computational costs or access restrictions...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a new shape of delivering operating systems remotely. Operating systems are executing in a cloud data center. Users desktops and applications can be accessed by using thin client devices. Thin client...
Data deduplication is a technique that removes redundancy of data on the storage. For cloud storage services, enabling deduplication over encrypted data is of vital importance to achieve both cost savings and keeping data confidentiality simultaneously. Recently proposed solutions are not sufficient because of lacking desired level of security and efficiency. In this paper, we propose SEED, a novel...
In this paper, a digital addressable lighting interface (DALI) protocol is studied and applied to a Light Emitting Diode (LED) lighting system. The DALI protocol was introduced and the dimmable LED drivers were realized. The user interface program in this system was developed by using the Microsoft Visual C#. Also, an USB-DALI conversion bridge circuit was built for communication between the computer...
Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation attacks such as, video-recording, key-logging or shoulder surfing attacks. In order to reduce these type of attacks, a number of solutions have been proposed. More used proposed system is the cognitive authentication...
Intelligent Network Application Protocol allows telecom operators to differentiate themselves by providing value-added services in addition to the standard telecom services. In some telecom operators, switch-wide usage of INAP service causes interaction for tandem calls which need to be transited towards adjacent switch instead of INAP query. In this work, we share our experience and design solution...
Mobile agents, which are used for building distributed systems effectively, are autonomous programs that can travel through a computer network to fulfill their tasks. For practical use of mobile agents, protecting agents and platforms is an extremely important matter. Nevertheless, few security techniques exist for the DASH agent framework, which supports agent mobility. Other agent frameworks such...
Nowadays, the ethernet is developing much faster than memory and CPU technologies, protocol processing has become the bottleneck of TCP performance on end systems. Modern NICs usually support offload techniques such as checksum offload and TCP Segmentation Offload(TSO), allowing the end system to offload some processing work onto the NIC hardware. In this paper, we propose an implementation of Large...
Information and Communication Technologies (ICT) are playing an increasing role in our daily lives and it is changing knowledge delivering. For engineers and related careers, where new trends and technologies are delivery continuously, having professional success depends on being updated with them. By adopting web-based learning so that both, students and professionals may accelerate such achievement...
Despite the documented need to train and educate more cybersecurity professionals, we have little rigorous evidence to inform educators on effective ways to engage, educate, or retain cybersecurity students. To begin addressing this gap in our knowledge, we are conducting a series of think-aloud interviews with cybersecurity students to study how students reason about core cybersecurity concepts....
To satisfy more and more complicated requirements on information recording, processing, exchange etc. in newly developed intelligent satellites, a distributed storage system is designed based on SpaceWire network in satellite platform. In this distributed storage system, a SpaceWire router unit serving as the core device of star network connects several nodes, including onboard computers, namely,...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
Providing Authentication to any system leads to provide more security to that system. There are many authentication techniques are available, such as textual password, biometric etc. Almost all securities are covered with textual password, still it has some drawbacks. It is not hard for hackers to hack computer system secured with textual password. When user types password, the hacker can trace the...
Wireless Sensor Networks (WSNs) are made up of number of sensor nodes which can sense the physical quantity, process it and transmit/receive it to base station (BS) via single hop and multiple hops. These sensor nodes needs the power or energy to operate which is generally provided by battery. since these batteries have limited amount of energy so energy consumption in sensor network is a serious...
Clustering is an important technique that helps in reducing the network energy consumption. The Cluster Head (CH) usually performs data fusion, aggregation and communication of the aggregated data to the Base Station. As the CHs communicate with the Base Stations located at larger distances than the member nodes, they generally consume more energy. This leads to energy drainage of CHs at a faster...
Banking Malware, has become a popular and ever more prevalent mechanism to monetise malware development. Since the development of the Zeus malware kit in 2007, the frequency and complexity of banking malware has been increasing. Developing a good understanding of the operation of a malware family is a first step in the reverse engineering required to create tools to extract the malware configuration,...
Methods and ways to perform denial-of-service attack are analyzed and classified in this work. Famous Denial-of-Service attack classifications are reviewed and analyzed. New elements of modern DoS attack classification are proposed.
Extensive use of computer network and huge amount of data had led several works to focus on intrusion detection system, which are based on single dataset or to combine multiple detection techniques to analyze detection rate and false positive flag.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.