The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DNS tunnel is a typical Internet covert channel used by attackers or bots to evade the malicious activities detection. The stolen information is encoded and encapsulated into the DNS packets to transfer. Since DNS traffic is common, most of the firewalls directly allow it to pass and IDS does not trigger an alarm with it. The popular signature-based detection methods and threshold-based methods are...
Malicious domains play a vital component in various cyber crimes. Most of the prior works depend on DNS A (address) records to detect the malicious domains, which are directly resolved to IP addresses. In this paper, we propose a malicious domain detection method focusing on the domains that are not resolved to IP addresses directly but only appear in DNS CNAME (canonical name) records. This kind...
This research provides a concise answer to how to organize a strong infrastructure of information technologies for high availability based on open source software, it's necessary for large organizations to provide high availability, the work will focus on explaining the procedures to provide services for users 24 hours the 365 days. Centralization is a major weakness today because is the only source...
Cloud users may decide to live migrate their virtual machines from a public cloud provider to another due to a lower cost or ceasing operations. Currently, it is not possible to install a second virtualization platform on public cloud infrastructure (IaaS) because nested virtualization and hardwareassisted virtualization are disabled by default. As a result, cloud users' VMs are tightly coupled to...
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
The proposed model of a multi-agent environment for e-learning due to increase in the cybercrime was found to be susceptible to DOS attacks and personification attacks that is dealt by embedding the mitigation mechanism of IP filtering with the proposed model. Developing the e-learning environment in which an algorithm has been implemented to filter the spoofed IPs from the legitimate IPs. The multi-agent...
The optical network management system is very important for optical equipment monitoring and managing, the timeliness and accuracy are very critical parameters. Automatic discovery of network nodes is the embodiment of automation of network management system. However, most of the traditional automatic discovery method is based on the ICMP protocol, which is to ping all the IP addresses in local area...
When a device on network communicates with copious other devices during a time window, this device is called a super point. Super points play important roles in network because they are usually servers, hosts running P2P applications, worms, DDos victims. Super points may change with the time. How to locating these super points from core network efficiently is a hard task. This paper proposed an algorithm...
Economic denial of sustainability (EDoS) appeared to be a new menace of cloud computing. This pristine attack is a breed of DoS or DDoS attack that targets the vulnerabilities of cloud consumers utility pricing model. EDoS attackers steadily send illegitimate traffic to gradually consume cloud resources such as virtual machines, virtual network devices, virtual security devices and databases so that...
A recent study shows, an investigation of Advanced Persistent Threat (APT) activity can be done effectively through malicious DNS traffic analysis. But, most of the experiments are conducted in a limited, simulated environment e.g. small campus network. Since APT is very dynamic and to address traffic grows, a light weight computation architecture is then needed to profile suspected activity in near...
This new observing robot is a robot attached with auto focus webcam camera at front side of its body which is controlled by user from a far distance and designed to be used in indoor environment. The robot is designed by using designed android application on android device with Visual Reality (VR) to control movement of camera and using joystick for the direction of robot. Both controllers transfer...
Most wireless networks are specified as layer 2 (L2), or data link protocol. Recently, IoT and big data processing have promoted the use of wireless sensor networks to connect and send data to data center applications using the Internet. To do so, the implementation of an IP stack on the wireless node, or the gateway of the IP and wireless L2 network, has been proposed. Both approaches are developed...
DNS provides a global-scale distributed lookup service to retrieve data of all types for a given name, be it IP addresses, service records, or cryptographic keys. This service has proven essential in today's operational Internet. Our experience with the design and development of Named Data Networking (NDN) suggests the need for a similar always-on lookup service. To fulfill this need we have designed...
In this paper, we propose a mechanism for autoconfiguration of name-bound virtual networks (NBVNs) for Internet of Things (IoT). Some IoT standardization groups have defined APIs for IoT device communications, in which they indicate the correspondent nodes and resources by names. However, current technologies for the construction of Virtual Networks (VNs) rely on VLANs, IP routing, and OpenFlow control,...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
In recent years, there is a rapid growth in the internet services which has increased incoming traffic in the network and also plays a vital role in increasing the size of the cluster server. The load balancing is a key technology to manage the traffic efficiently. In this paper, we propose an alternative load balancing architecture using OpenFlow switches which are connected to the controller. This...
In the view of converged fast-wired and fast-wireless networks (5G) with a transparent multi homed point of access to the Internet, new scenarios must be considered in the near future. In particular, this paper focuses on an Internet access leveraging simultaneously on different technologies such as ADSL, cable, WiFi, 3G/4G, satellite links, to offer a combined connectivity service. Some solutions...
Building Automation Systems (BAS) are distributed networks of hardware and software that monitor and control heating, ventilation, and air-conditioning (HVAC), as well as lighting and security of smart buildings. BACnet is a standard data communication protocol designed to operate across many types of BAS field panels and controllers. This paper studies BACnet traffic in a real-world BAS from various...
This paper presents an open-source orchestration framework that deploys end-to-end services across OpenStackmanaged data centers and SDN networks controlled either by ONOS or OpenDaylight. The proposed framework improves existing software in two directions. First, it exploits SDN domains not only to implement traffic steering, but also to execute selected network functions (e.g., NAT). Second, it...
The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.