The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Knowing the length distributions of traffic flows passing through a network link is useful for some applications such as inferring traffic demands, characterizing source traffic, and detecting traffic anomalies. With high-speed Internet links, efficient and effective packet sampling techniques for traffic measurement are not only desirable, but increasingly becoming a necessity. Packet sampling has...
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert channels have great tamper resistance, they fail to deliver normal network traffic especially when the amounts of covert messages increase. As such, they are vulnerable to detections due to abnormal network traffic. Hence, in this paper, we are motivated to design a protocol-independent...
Worm intrusion has become an increasingly severe threat to the Internet. The active worms propagate quickly, creating potential damage within minutes in a network. Network sniffers are programs that read packets traveling across a network and it analyze packets , which can capture, parse, and display the packet header information. A router-based worm detection system is proposed in which a network...
The detection of covert channel is of increasing interest in light of the recent study of network behaviorism. However, due to the high variation in legitimate network traffic, detecting covert channel is a challenging task. In this paper, we study and analyze a new covert channel detection methodology, based on the property of scale-free networks, with the objective of enhancing the covert channel...
In recent years, China P2P streaming industry, represented by PPlive and PPstream, has been having rapid progress, with the consumer scaled up and enhancement of the financial gain. The development brought the enormous consumption of network bandwidth. P2P streaming traffic identification provides the reliable basis on solving the overspend problem of the network bandwidth. This paper firstly introduces...
Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. To be able to simultaneously and efficiently use such parallel paths, it is essential to facilitate high quality network services at high speeds. So, traffic splitting, having a significant impact on quality of services (QoS), is an important...
It has been recognized that today's Internet routing and addressing system is facing serious scalability problems. The ever increasing network customers, multihoming, and traffic engineering, are driving the growth of Default Free Zone routing table size at an alarming rate. To solve this issue, several solutions have been proposed to separate the current single numbering space, i.e., the "IP...
As more homes are becoming broadband enabled, a huge strain is placed on the underlying IP infrastructure. In being able to predict the types of traffic that nodes might generate, preference can be given to high priority, latency sensitive traffic. Traditionally, a home had a single computer utilizing a link to the Internet. In recent years this single computer was replaced by a multitude of smart...
The future network will support global roaming seamless and service provider portability. An identifier locator (ID/Loc) separation solution can achieve such a goal. Nevertheless, this ID/Loc separation scheme implies the need of adding a mapping system to store and maintain the binding between locators and identifiers. And this approach may introduce large signaling of the location update and the...
In order to plan the network construction reasonable and ensure the quality of network service, it is important to measure the Link-bandwidth utilization and get the flow information. One of the methods to monitor network efficiently is based on flow-conservation, and the problem of searching a solution for this method could be deduced to solving weak vertex cover problem, which has been proved NP-hard...
Stochastic fairness queuing scheduling scheme resolved the connection level fairness problem and are widely used in traditional network, however, with rapid development of P2P services in Internet, this classical algorithms failed in maintaining fairness among hosts. In this paper we proposed an improved SFQ algorithm: Dual Class SFQ to ensure the fairness among hosts using different type of services...
Traditionally, IP Network planning and design is mostly based on average delay or loss constraints which can often be easily calculated. Jitter, on the other hand, is much more difficult to evaluate but this is particularly important to manage the QoS of real-time and interactive services such as VoIP and streaming video. In this paper, we propose a simple model for the delay jitter that is fast enough...
Router is the key equipment in Internet and its cost is an important issue in network community. Line-speed processing is a fundamental rule in modern router design and it influence the router cost dramatically. By taking the real characteristics of Internet traffic into account, this paper proposes methods to lower the requirement of line-speed processing with a factor of g(<<1). Theoretical...
Traffic anomaly detection is one of the most important technologies that should be considered in network security and administration. In this paper, we propose a traffic anomaly detection mechanism that includes traffic monitoring and traffic analysis. We develop an analytical system called WISE-Mon that inspects the traffic behavior by monitoring and analyzing the traffic. We establish a criterion...
Packet classification is one of the crucial components of application such as firewalls, intrusion detection, and differentiated services. For example, an intrusion detection system (IDS) classifies packets either as benign or malicious and alerts the network administrator when hostile traffic is detected. Since existing IDS spend the majority of CPU time in packet classification, an IDS fails to...
Internet is becoming an indispensible infrastructure of essential media, which makes a great burden for ISP's security and traffic management. Especially the situation will be much more serious in NGI (the Next-Generation Internet) because of its innumerable users, mobile device, information appliances (IA) and networked sensors etc with 128-bit IPv6 address. For the reason of lacking scalability,...
Intradomain routing in IP networks follows least-cost paths according to administrative link costs. Routing optimization modifies these values to minimize an objective function for a network with given link capacities and traffic matrix. An example for an objective function is the maximum utilization of all links under failure-free conditions or also after rerouting in case of network failures. Many...
Recent Internet traffic measurement shows that the majority of the TCP flows are short lived. Use of short flow highest priority scheduling provides the performance improvement in the internet traffic. However, long lived flows competing against the short flows starve at some point. We propose a novel two class Queue State Packet Scheduling mechanism, namely QSPS which treats long flows fairly without...
The security of computer networks has been in the focus of research for years. While several sophisticated systems had been developed in the area of intrusion detection, new challenges arised. Pattern matching systems are not able to cope with high bandwidth (10 Gbps +) when analyzing the whole payload. Furthermore, new attack schemes arise by increasingly complex software and systems. New approaches...
Flow-based IP traffic measurement is a very important part of network monitoring. However, traffic measurement devices and flow exporting software have still too low performance to collect all flows. In this paper, we propose an extensible flow export engine, called XFix, on basis of a , -nProbe, which is an efficient flow probe that supports for NetFlow v9/IPFIX. In the engine, we also propose some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.