The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents 2-Dimensional visualization to categorize packets of network traffic into normal data pattern and attack data pattern based on the patterns resulted by a brute force attack. Two clustering methods: K-Means and Naïve Bayes methods are used to produce the data to be visualized. Experiments using ISCX and DARPA dataset were conducted. Brute force assaults on some service protocols...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
Recently, ICN attracts the attention of network researchers. The ICN uses contents name as the ID for recognizing the communication partner instead of the traditional IP network using IP address (terminal location). Nowadays, the NDN which is the one of the network technology realizing the ICN policy, has been proposed. In NDN, routers consisting the backbone network collect the contents recent requested...
We propose a new secure online storage scheme based on an open P2P network without a central server. In the proposed scheme, attackers cannot detect target user data in the online storage because the user data is divided into some parts by the secret sharing, and they are distributed to P2P nodes via the anonymous communication. The proposed scheme can prevent the direct attack on the target user...
This paper proposes a Domain Name System (DNS) Name Autoconfiguration called DNSNAv4 for Internet-of-Things (IoT) Devices in Internet Protocol (IP) version 4 (IPv4). The manual configuration of domain names of devices might be a cumbersome burden for users as the number of devices increases. A legacy scheme called DNS Name Autoconfiguration (DNSNA) for IPv6 networks can be used to register DNS names...
Thanks to the fact that Belgium is a densely populated country, and also lags behind in the roll-out of Long Term Evolution (LTE) / 4G, it is still possible to visit areas enjoying different Radio Access Technology (RAT) coverages within a limited territory. This paper reports an analysis of the dataset of web requests collected through a field survey mostly performed in south-western Belgium and...
Web Application becomes the leading solution for the utilization of systems that need access globally, distributed, cost-effective, as well as the diversity of the content that can run on this technology. At the same time web application security have always been a major issue that must be considered due to the fact that 60% of Internet attacks targeting web application platform. One of the biggest...
In order to communicate with another service, a service needs to know the address of other services. This knowledge can be acquired by a process called service discovery (SD). In a microservice architecture (MSA), unlike SOA, a service discovery framework has not been provided out of the box. In a telecom environment additional requirements may arise, besides the basic one of discoverability. In this...
Internet users are interested in content regardless of its location; however, the current client/server architecture still requires requests to be directed to a specific server. Information-centric networking (ICN) is a recent vein that relaxes this requirement through the use of name-based forwarding, where forwarding decisions are based on content names instead of IP addresses. Despite previous...
Named Data Networking (NDN) uses content names as routing entries, and thus the scalability of NDN routing is of primary concern. NDN allows in-network caching as a built-in functionality; however, if network nodes make caching decisions individually, duplicate copies of the same content may exist among nearby nodes. To address these problems, we propose Coordinated Routing and Caching (CoRC) that...
These days, various academic and industrial institutions are sharing the computing resources of cloud data centers. For the sake of security, data center networks need to be separated by institution or department. One conventional approach is using tag-based VLAN standardized in IEEE 802.1Q. However, this approach cannot accommodate scalable networks because of a limitation on the number of VLAN IDs...
Internet has witnessed its paramount function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) and Content-Centric Networking (CCN) emerge as a clean slate network architecture to embrace this shift. Pending Interest Table (PIT) in NDN/CCN keeps track of the Interest packets that are received but yet un-responded, which brings NDN/CCN significant features,...
Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the...
Protection of critical server from cyber attacks is vital, especially in the case of active attacks like Distributed Denial of Service (DDoS). Seamless services are provided by the constant availability of the server which plays an important factor in providing the customer good Quality of Service (QoS). Monitoring and rate limiting the flow of packets will protect the victim systems by allowing only...
Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application...
Cable TV Set-top box is one of major home electronics which can receive public broadcast signals in an emergency situation. The set-top boxes stay in standby mode while not being used. In the standby mode, the set-top boxes cannot receive information broadcasted for emergency. To receive the emergency information, the set-top boxes in the standby mode should be transited to operation mode. WOL (Wake...
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to every system object in systems-on-chip (SoCs). Access decisions are administered by a security logic “server" implemented as an extension of the...
Some public and private services are called part of the Critical Infrastructure (CI), which are considered as the most important services to protect the functioning of a society and the economy. Many CIs provide services via the Internet and thus cyber-attacks can be performed remotely. It is now very simple and free to find and download software, which automates performing cyber-attacks. A recent...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
Internet of Things (IoT) connects a large volume of devices together, via different modes of wired and wireless communication interfaces. The existing transport layer protocols, like TCP and UDP as well as their variants, lack functionality to handle the diverge and heterogeneous communication standards while ensuring the IoT transport requirements like short-lived packet or message transfer, short...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.