The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we describe some scenarios and technologies that have been proposed to cope with the requirements of current and next generation data centre infrastructure. In particular, we discuss the extensions that have been implemented at both orchestration and control levels to efficiently manage the data centres resources. We put the focus on the integration between the Orchestrator and the...
Due to the variability of network topologies and services that can be deployed in the transport network, traffic engineering decisions within a software defined networking (SDN) controller need to be influenced by the current network topology, available resources, and end user experience. In this work a holistically approached traffic engineering quality of experience (QoE) feedback application is...
Cybersecurity is a critical concern in society today. One common avenue of attack for malicious hackers is exploiting vulnerable websites. It is estimated that there are over one million websites that are attacked daily. Two emerging targets of such attacks are Supervisory Control and Data Acquisition (SCADA) devices and scientific instruments. Vulnerability assessment tools can help provide owners...
Federated networks have primarily emerged to support cloud computing services, in order to reduce costs for providers, as well as to increase their incomes. Up to now, the research activity has been mostly focused on architectures and cost models, setting aside technological aspects. In this paper, we propose SDNS, an SDN-system that opens the application fields of federated networks to federated...
Vehicular ad-hoc network (VANET) is a new emerging area of research; it consists of many challenging issues for implementing intelligent transportation system in real world scenario. Nowadays academic and industry is concerned about supporting vehicular network with seamless communication so that vehicles in an interconnected form transmit information to avoid traffic jams, accidents etc. and act...
Network Function Virtualization promises to reduce the overall operational and capital expenses experienced by the network operators. Running multiple network functions on top of a standard x86 server instead of dedicated appliances can increase the utilization of the underlying hardware and reduce the maintenance and management costs. However, total cost of ownership calculations are typically a...
Uptime is very important with any computer system, because a solution which is not available cannot be relied upon to provide accurate information in a timely and routine manner — usually resulting in the loss of time, revenue, or data. Highly-available systems and websites rely on eliminating single points of failure, and on reacting quickly to any network, hardware or software issues which may occur...
The Internet of Things (IoT) ecosystem, is constantly growing and attracting interest for next generation information and communication infrastructures. In this paper we focus on the exploitation of IoT platforms for remote healthcare status monitoring within the context of the so called connected health applications. In this context users and most importantly healthcare service providers and first...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). Given the continuous distribution of IoT devices, data confidentiality and user privacy are of utmost importance. However, with the growing complexity of SoCs, the risk of malware infections and trojans introduced at design time increases significantly. A vital threat to system security are so-called...
A distributed attack initiated by a malicious party whose final purpose is to disrupt the services offered by a system to legitimate users is called DDoS. In recent years, many such attacks have been reported, some of them being able to cause major loses for companies or government institutions. In this paper, we analyze the impact of HOIP and Slowloris based DDoS attacks on both Windows and Linux...
Middleboxes are pervasive in today's Internet as they are deployed for an increasing number of reasons. An example is the network address translation (NAT), one of the first task to be performed to cope with the lack of IPv4 addresses. Recently the landscape for NATs has become even more crowded, especially in mobile networks, mainly due to the impossibility of IPv6 to be a large-scale solution to...
Serving user requests from near-by caches or servers has been a powerful technique for localizing Internet traffic with the intent of providing lower delay and higher throughput to end users while also lowering the cost for network operators. This basic concept has led to the deployment of different types of infrastructures of varying degrees of complexity that large CDNs, ISPs, and content providers...
Anycast-based services today are widely used commercially, with several major providers serving thousands of important websites. However, to our knowledge, there has been only limited study of how often anycast fails because routing changes interrupt connections between users and their current anycast site. While the commercial success of anycast CDNs means anycast usually works well, do some users...
With the gradual popularity of location-based social network service, the localization technologies, for example the WLAN-based positioning technique, have become the premise of the service. Nevertheless, the positioning system is vulnerable to spoofing attack resulting in the user's identity divulged, due to the openness of the wireless network. The paper firstly implements a location cheating attack...
Various methods have been proposed for creating and maintaining lists of potentially filtered URLs to allow for measurement of ongoing internet censorship around the world. Whilst testing a known resource for evidence of filtering can be relatively simple, given appropriate vantage points, discovering previously unknown filtered web resources remains an open challenge. We present a novel framework...
The ongoing adoption of cloud-based email services — mainly run by few operators — transforms the largely decentralized email infrastructure into a more centralized one. Yet, little empirical knowledge on this transition and its implications exists. To address this gap, we assess the prevalence and exposure of Internet users to cloud-based email in a measurement study. In a first step, we study the...
Centralized botnets inherently suffer the single point of failure problem. To resolve this, botmasters are generally designed with peer-to-peer architecture to harden the botnet infrastructures. In the last several years, hybrid P2P botnets relying on peer-list exchange represent one of the emerging trends in advanced botnets. Although these botnets are immune to index poisoning, they are still vulnerable...
Linking the growing IPv6 deployment to existing IPv4 addresses is an interesting field of research, be it for network forensics, structural analysis, or reconnaissance. In this work, we focus on classifying pairs of server IPv6 and IPv4 addresses as siblings, i.e., running on the same machine. Our methodology leverages active measurements of TCP timestamps and other network characteristics, which...
This document presents a detailed description of the development and results obtained during the Proof of Concept about the Think! EHR platform, which is marketed by the Marand d.o.o (Marand) company.
NFV together with SDN promises to provide more flexible and efficient service provision methods by decoupling the network functions (NFs) from the physical network topology and devices, but requires the real-time and automatic composition and verification for service function chain (SFC). However, most of SFCs today are still typically built through manual configuration processes, which are slow and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.