Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we elucidate the main performance bottleneck in realizing packet processing which require carrier-scale huge tables to lookup (carrier-scale packet processing) on top of general-purpose servers. Our experimental quantitative analysis using DPDK-Click based packet processing model reveals that performance degradation of the carrier-scale packet processing is mainly caused by increased...
To better understand the Internet infrastructure services is crucial to the design, operation, and management of Internet applications. The lack of better understanding of the actual usage of allocated IP addresses is among many such challenges, due to the wide deployment of IP address multiplexing techniques, such as NAT. To address this issue, we propose a novel analysis approach based on large-scale...
Honeypot technology is one of the main mechanisms of computer security. It is certain resource, which should be attacked or explored illegally. The research provides the version of Honeypot implementation based on proxy-server. The target of paper is emulation of intruder detection system and analysis of potential violator behavior. As a result, statistics of attacks sources has been collected and...
In recent years, video streaming services based on the client server (C/S) model have become common. When distributed through these services, video files need to be watermarked with a unique ID to identify clients, so as to deter illegal video capturing. However, the download bandwidth at servers limit the number of clients that can view video files simultaneously. With peer-to-peer (P2P) communication,...
Building an efficient broker overlay network for publish/subscribe systems to support large-scale distributed applications is a challenging issue today. In this paper, we propose a Fog/Cloud based data delivery model that organizes a hierarchy of brokers and participants for event delivery. We use an ensemble of ZooKeeper servers to facilitate coordination among components and devise new procedures...
Malwares always query DNS names to locate their C&C servers and keep regular communication with them, either for fetching instructions or checking updates. Traditional works consider such regular communication as a single-cycle behavior. However we find that many malwares communicate with their C&C servers in a multi-cycle way, which makes them more like normal and evading existing defense...
APT(Advanced persist threat) is an emerging attack on the Internet. Attackers may combine phishing emails, malware, social engineering and botnets to create a series of attacks in one APT attack which makes it quite difficult for detection. In this way, attackers can remotely control the infected host, or steal sensitive information. In this paper, we proposed a time transform features approach for...
Real-time video streaming communication is the key technology for intelligent device. In this paper, we discuss the video communication on the hardware platform of both IP vidicon and STB, and analyze the IP vidicon system software based on RTSP protocol on sever client. A self-adaptive stream transmission method for STB use client is proposed. It achieves the real-time video communication between...
With widespread availability of mobile communication devices and public WiFi grids, peer to peer services and applications have become feasible and attractive. Educational campuses have strong intranet infrastructure which provides near complete WiFi coverage. While this is adequate for client-server applications and browsing etc, it doesn't support p2p applications. We have proposed a hybrid architecture...
A worm is a standalone program, which is self-replicating malware that distributes itself to other computers and networks. An Internet worm can spread across the network and infect millions of computers in very little time. Damages caused by such attacks are considered very high. Worms affect the network packet and its performance. In this paper, different methods are analyzed to detect Internet worms...
Bit Torrent protocol is widely used for file sharing in peer-to-peer systems. Also, many cloud environments utilizethis protocol. Despite many advantages, among which are goodscalability and performance, BitTorrent has also limitations. Toamend them, this paper proposes TManTorrent protocol — adistributed BitTorrent protocol, which replaces a tracker serverwith a gossiping mechanism, and promotes...
Multipath TCP (MPTCP) brings promising features of throughput improvement and load balancing by utilizing the multiple available paths. However, adding a subflow without awareness of the network state will result in wasting network resources and degrading MPTCP performance. Finding and operating the proper number of subflows are necessary to achieve the best performance of MPTCP. However, an MPTCP...
Prevailing network technologies separate control and data planes embedded within networking devices. Problems with this are expensive maintenance of closed-technology network devices and the inability to enforce coherent network-wide policies. Software Defined Networks (SDN) solves these problems with logical centralization based on open standards that use existing networking equipment. Quality of...
Malicious network intrusions which exfiltrate data from computer networks are extremely damaging for organisations and governments worldwide. Combating these network intrusions and large-scale cyber-attacks requires mining and analysis of large volumes of computer network data. We present a statistical filtering and temporal PageRank technique that improves the probability of discovering network intrusions...
The expansion and democratization of the digital world coupled with the effect of the Internet globalization, has allowed individuals, countries, states and companies to interconnect and interact at incidence levels never previously imagined. Cybercrime, in turn, is unfortunately one the negative aspects of this rapid global interconnection expansion. We often find malicious individuals and/or groups...
In this paper, we propose a model along with a novel methodology to represent and validate a Network-On-Chip (NoC) server processor's Reliability, Availability, and Serviceability (RAS) functions during the pre-silicon design phase. The effectiveness of this methodology is demonstrated in a real-life use case on one of the most advanced NoC Server designs in the industry.
The network traffic has been growing explosively in recent years after users can watch the high quality video from the Internet. It is an important issue to reduce network traffic and increase the user quality of experience (QoE). Therefore, there have been in-network caching schemes to cache the content fetched by users in proxy servers. Recently, software defined networking (SDN) was proposed to...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
Today storage is the worst bottleneck for video surveillance systems, which are integral part of any institution. We trust our privacy and security to Network Video Recording (NVR) devices, which is programmed to overwrite all the way from start once finished up. There are chances that really important video data can be get deleted on the run while the less important still stays somewhere on the storage...
In an increasingly networked society users are spending more and more time on online activities every day. This is enforced by the continuous migration of applications from local environments to web-based offerings. As a consequence the daily life of people and industries are already depending on the availability of online resources. Still end-user devices are not providing detailed insight in networked...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.