Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In order to promote Java programming educations, the Web-based Java Programming Learning Assistant System (JPLAS) has been implemented. JPLAS provides the code writing problem, where students write Java codes that satisfy the given specifications and submit them to the JPLAS server to obtain the marks using test codes instantly. Unfortunately, JPLAS could be accessed simply when the Internet connections...
The recent development of stream delivery technology made Internet broadcasting services popular. In live Internet broadcasting, broadcasters or viewers often add video or sound effects (we call this kind of live broadcasting, ‘different worlds broadcasting’). Therefore, we have proposed a distributed Internet live broadcasting system with video and audio effects. In this paper, we describe the implementation...
NAT gateway is an important network system in today's IPv4 network when translating a private IPv4 address to a public address. However, traditional NAT system based on Linux Netfilter cannot achieve high network throughput to meet modern requirements such as data centers. To address this challenge, we improve the network performance of NAT system by three ways. First, we leverage DPDK to enable polling...
Content Delivery Networks (CDNs) are able to improve user-oriented application performance through caching and anycast routing or DNS-based user mapping mechanism. With the fact that BGP is widely used for inter autonomous system (AS) routing for CDNs, there is a middle mile bottleneck problem, which cause by the nature limitation of BGP. To solve this problem, we propose an SDN-based tunnel multi-path...
IVANETs (Internet Based Vehicular Adhoc Networks) are the adhoc networks formed by moving vehicles without any permanent infrastructure and are characterized by frequent disconnections, frequent topological changes, as vehicles move at very high speed and can take unpredictable turns on their route. So their cached data items become stale, need to be updated from the server and it results in high...
The content delivery network (CDN) intensively uses cache to push the content close to end users. Over both traditional Internet architecture and emerging cloud-based framework, cache allocation has been the core problem that any CDN operator needs to address. As the first step for cache deployment, CDN operators need to discover or estimate the distribution of user requests in different geographic...
DNS caches are an extremely important tool, providing services for DNS as well as for a multitude of applications, systems and security mechanisms, such as anti-spam defences, routing security (e.g., RPKI), firewalls. Subverting the security of DNS is detrimental to the stability and security of the clients and services, and can facilitate attacks, circumventing even cryptographic mechanisms. We study...
Information Centric Networks (ICN) is very promising for Internet of Things (IoT) deployment, where the data-centric approach is useful in reducing the data retrieval latency as well as the network traffic for IoT services. Also, the innetwork caching capabilities in ICN limits the massive data access to the data producers and so relaxes the need of continuous connectivity E2E connectivity between...
In-network caching is an important feature of ICN (Information Centric Networking). There are prior arts focusing on designing a highly efficient caching strategy by exploiting either node data or content data respectively. However, simply exploiting these data itself is not enough to reduce the cost of network operation and increase the quality of user experience, as there is no consideration on...
Long Term Evolution (LTE) appears to be a practical alternative to IEEE 802.11p for vehicular applications. Vehicular safety applications are based on broadcasting messages, which contain information such as location and speed to the neighboring vehicles. However, as LTE is an infrastructure-based network, all communication should pass through it, which can cause congestion and substantial delays...
Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver benefits to any application in a computer. However, incorporating new protocols to the Internet is a challenging...
The Internet Protocol version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN), which is a promising technology to promote the development of the Internet of Things (IoT), has been proposed to connect millions of IP-based sensing devices over the open Internet. To support the mobility of these resource constrained sensing nodes, the Proxy Mobile IPv6 (PMIPv6) has been proposed as...
Mobile edge computing (MEC) has risen as a promising technology to augment computational capabilities of mobile devices. Meanwhile, in-network caching has become a natural trend of the solution of handling exponentially increasing Internet traffic. The important issues in these two networking paradigms are computation offloading and content caching strategies, respectively. In order to jointly tackle...
Tor hidden Services are used to provide anonymity service to users on the Internet without disclosing the location of the servers so as to enable freedom of speech. However, existing Tor hidden services use decentralized architecture making it easier for an adversary to launch DHT-based attacks. In this paper, we present practical Eclipse attacks on Tor hidden services that allow an adversary with...
Nowadays the Internet is closely related to our daily life. We enjoy the quality of service the provided by The Internet at the same time, but also suffer from the threat of network security. Among the many threats, SQL injection attacks are ranked in the first place. SQL injection attack refers to “when the user sends a request to the server, the malicious SQL command will be inserted into the web...
Unprincipled input handling has caused many of the most prevalent and severe vulnerabilities in the Internet era, and this trend appears to continue in the emerging Internet of Things (IoT). In this paper, we present a methodology to build secure input-handling functionality for application-layer IoT protocols by applying the Language-theoretic Security (LangSec) philosophy. We have built working...
The Internet of Things leads to the inter-connectivity of a wide range of devices. This heterogeneity of hardware and software poses significant challenges to security. Constrained IoT devices often do not have enough resources to carry the overhead of an intrusion protection system or complex security protocols. A typical initial step in network security is a network scan in order to find vulnerable...
Serving as the global Internet's phonebook, the Domain Name Service (DNS) helps to translate human-friendly domain names into machine-readable IP addresses, which makes DNS of great importance to the operation of the Internet and virtually relied on by today's almost all kinds of Internet-based activities. As such, people whoever want to go anywhere over the Internet will need to refer to the DNS...
Many applications nowadays use HTTP. HTTP/2, standardised in February 2015, is an improvment of HTTP/1.1. However it is still running on top of TCP/TLS and can thus suffer from performance issues, such as the number of RTTs for the handshake phase and the Head of Line blocking. Google proposed the QUIC (Quick UDP Internet Connection) protocol, an user level protocol, running on top of UDP, to solve...
Users trying to access censored content may experience different results, depending on the technique adopted to enforce Internet Censorship, that in turn depends on different factors. Administrative control of the network (i.e. the entity managing network devices) is one of such factors. To the best of our knowledge, we are the first to focus on censorship detection on 3G/4G (hereafter mobile) network...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.