The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Behavior-based tracking is an unobtrusive technique that allows observers on the Internet to monitor user activities over long periods of time - in spite of changing IP addresses. Our technique uses semi-supervised machine learning, which allows observers to track users without the need for multiple labeled training sessions. We present evaluation results obtained on a realistic dataset that contains...
In this paper we present the formalisation of three well-known Identity Management protocols - SAML, OpenID and OAuth. The formalisation consists of two steps: formal specification using HLPSL (High-Level Protocol Specification Language) and formal verification using a state-of-the-art verification tool for security protocols called AVISPA (Automated Validation of Internet Security Protocols and Applications)...
Heterogeneity in constrained networks and gateways is perhaps one of the single greatest challenges facing end-to-end management of devices and networks in the IoT. Today, the Lightweight M2M (LWM2M) protocol, leveraged on open Internet standards, has become a strong contender for REST-based IoT management. However, significant challenges exist for remote gateway management, particularly for proxies...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. As the study for solving this problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. As one scheme...
Denial of Service (DoS) attacks are a type of interruption (malicious and/or unintended) that restrict or completely deny services meant for legitimate users. One of the most relevant DoS attacks is Distributed Denial of Service (DDoS) attack which is a variant of DoS, but on a larger scale using previously compromised, malware infected computers known as “bots” or “zombies”. DDoS attack occurs by...
The near future Internet of Things (IoT) allows devices to discover and to establish cooperation autonomously in an opportunistic manner. While the incentive service is available, the front-end inter-organisational devices may help each other not only on sharing information, but they can also share their Internet connection towards saving energy. Considering that different devices may have been configured...
Anticensorship continues to be an arms race between citizens who use circumvention systems and the censors that find and block them. Many recently proposed circumvention systems have found ways to hide from deep-packet inspection (DPI), as well as active probing by the censors. However, many circumvention systems have trouble distributing the necessary resources to its users, and often use centralized...
These years Internet of Things (IoT) has been paid much attention to and the importance of lightweight and efficient authentication protocols has been increasing. In this paper, we propose a novel and flexible hash chain construction, hash chain aggregation (HCA), and a scheme to establish a common key for two users using HCA. Our proposed scheme has the following significant advantages: (1) cryptographic...
With the rapid development of network systems, many of our daily life activities can be performed via the Internet. Online shopping is one of the most common of these activities, which include group buying behavior. Group buying is a trading way, which is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain...
The use of Internet has been increasing day by day and the internet traffic is exponentially increasing. The services providers such as web services providers, email services providers, and cloud service providers have to deal with millions of users per second; and thus, the level of threats to their growing networks is also very high. To deal with this much number of users is a big challenge but...
The use of secure HTTP calls is a first and critical step toward securing the Android application data when the app interacts with the Internet. However, one of the major causes for the unencrypted communication is app developer's errors or ignorance. Could the paradigm of literally repetitive and ineffective emphasis shift towards emphasis as a mechanism? This paper introduces emphaSSL, a simple,...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
In order to promote the development of the IoT, the Internet Engineering Task Force (IETF) has been developing a standard named Internet Protocol Version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN) to enable IP-based devices to connect to the Internet. Besides, to support mobility management, a network-based localized mobility management (NETLMM) protocol named Proxy Mobile IPv6...
Increase in size and complexity of web pages has challenged the efficiency of HTTP. Recent developments to speed up the web have resulted in two promising protocols, HTTP/2 (RFC 7540) at the application layer and QUIC (multiplexed stream transport over UDP). Google servers are using HTTP/2 and QUIC whereas other major sites like Facebook and Twitter have begun using HTTP/2. In this paper, we compare...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Since the amount of information submitted and made public about tourist spots in urban areas is very large compared to that for regional tourist spots, it is difficult for people who do not have much knowledge of or acquaintance with the places concerned to efficiently obtain information necessary for taking tourist trips. This study aims to develop a social recommendation media GIS (Geographic Information...
Nowadays, many school teachers start to execute E-testing in classrooms due to its time and labor-saving. It is not easy that teachers want to block access to the Internet for online cheating activities. Therefore, an offline E-testing system is needed. However, existing offline E-testing systems are always developed ad hoc for particular purpose and procedures. This paper presents a general-purpose...
Distributed Denial-of-Service (DDoS) attacks continue to constitute a pernicious threat to the delivery of services within the Internet domain. These attacks harness the power of thousands, and sometimes tens or hundreds of thousands of compromised computers to attack web-services and online trading sites, resulting in significant down-time and financial loss. The problem of detecting DDoS attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.