The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Device synchronization is a new technology integrated into the cloud which has seen widespread implementation from major cloud vendors but has not been spared of attacks by MITC attacks directed towards cloud synchronization achieved via a myriad of attack vectors. These target the synchronization token which lacks authenticity validation of the token bearer. We explore MITC in Linux systems by partitioning...
A distributed attack initiated by a malicious party whose final purpose is to disrupt the services offered by a system to legitimate users is called DDoS. In recent years, many such attacks have been reported, some of them being able to cause major loses for companies or government institutions. In this paper, we analyze the impact of HOIP and Slowloris based DDoS attacks on both Windows and Linux...
As the number of processors and the size of the memory of computing systems keep increasing, the likelihood of CPU core failures, memory errors, and bus failures increases and can threaten system availability. Software components can be hardened against such failures by running several replicas of a component on hardware replicas that fail independently and that are coordinated by a State-Machine...
NAT gateway is an important network system in today's IPv4 network when translating a private IPv4 address to a public address. However, traditional NAT system based on Linux Netfilter cannot achieve high network throughput to meet modern requirements such as data centers. To address this challenge, we improve the network performance of NAT system by three ways. First, we leverage DPDK to enable polling...
In some industries, recruiting qualified resources can be a problem for SMEs, one option is to start a transformation process, and move from a traditional team to a distributed team, gaining access to a much larger base of possible human resources and business opportunities. Digital transformation can be used to help SMEs in taking the steps needed to become distributed companies. This paper shows...
Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver benefits to any application in a computer. However, incorporating new protocols to the Internet is a challenging...
This paper presents developed detection rules for LLRP (Low Level Reader Protocol) interface, implementation of IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) solution for UHF (Ultra High Frequency) RFID (Radio Frequency Identification) reader using Raspberry Pi 3. Developed security solution is used for securing current RFID readers supporting LLRP. The paper also deals with...
Proposes an approach to assessing the state of plant species (based on an example of assessing the state of large-leaved linden) in urban environment on the basis of fuzzy information from a group of experts. Formalization of the expert information is carried out on the basis of complete orthogonal semantic spaces. The proposed approach allows to avoid mistakes in the assessment of a single expert...
Aiming at realizing intellectualized control of granary ventilation and eliminating the flaws such as low efficiency, technological obsolescence and structural incompleteness in traditional system, this paper brings forward a new control system for granary ventilation with advanced embedded Linux technology, embedded networking technology, and Qt technology. This system uses BeagleBone Black platform...
Web developers generally prefer coding in dynamically compiled or scripting languages, such as Java and JavaScript, because those languages allow them to deploy applications quickly to deliver new features and bug fixes in a timely manner. In this paper, we compared the Go language, a popular statically compiled language, with two dynamically compiled languages, JavaScript and Java. We evaluated the...
Open source and closed software security has been debated for decades, vulnerabilities reported for both types of software has been under scrutiny for years. In this study, a descriptive and correlation study for two selected systems is conducted using SPSS 19. The results show that the severity score average of Linux kernel vulnerabilities is lower by %30 than the severity score average of vulnerabilities...
The advent of Voice over IP (VoIP) telephony has revolutionized the world of telecommunication. It has opened several possibilities of extending the traditional telephony concepts. Advancement in software has made it possible to implement various telephony hardware functions in software. Asterisk, a Linux based implementation of PBX is considered as a key addition to the revolution in the modern telephony...
We have conducted an empirical study of the latest 5GHz IEEE 802.11wireless LAN (WLAN) variants of 802.11n (5GHz) and 802.11ac (Wave 1), underdifferent cell load conditions. We have considered typicalconfigurations of both protocols on a Linux testbed. Under light load, there is no clear difference between 802.11n and 802.11ac in terms ofperformance and energy consumption. However, in some cases of...
Cloud computing is becoming increasingly popular and can be for used for education purposes. We propose an educational cloud based on the supersaturation method. In cloud computing, the supersaturation method is a method of assigning many more logic resources than physical resources. The cost is more important in a supersaturated cloud than the performance. Linux containers such as LXC have recently...
The rate of network packets encapsulating requests from clients can significantly affect the utilization, and thus performance and sleep states of processors in servers deploying a power management policy. To improve energy efficiency, servers may adopt an aggressive power management policy that frequently transitions a processor to a low-performance or sleep state at a low utilization. However, such...
Big volume of bioinformatics data needs high processing powers. BIG-BIO is one of the solutions for addressing these challenges. BIG-BIO is a big data analyst MapReduce Hadoop Cluster for Bioinformatics applications. BIG-BIO is tested by implementing the bioinformatics wordcount problem and its applications using MapReduce programming pattern. BIG-BIO counts the number of occurrence of each word in...
SDN networks rely mainly on a set of software defined modules, running on generic hardware platforms, and managed by a central SDN controller. The tight coupling and lack of isolation between the controller and the underlying host limit the controller resilience against host-based attacks and failures. That controller is a single point of failure and a target for attackers. “Linux-containers” is a...
The paper deals with the increase of protection systems' efficiency by means of the Honeypot technology. The design principles of this technology are described. We propose several ways of the file storages effective organization. Plans of collecting statistical information on malefactor's actions are discussed. Also the efficiency of the suggested approach is estimated.
Dynamic networks can be characterised by many factors such as changes (e.g., vulnerability change, update of applications and services, topology changes). It is of vital importance to assess the security of such dynamic networks in order to improve the security of them. One way to assess the security is to use a graphical security model. However, the existing graphical security models (e.g., attack...
Off-path round-trip time (RTT) measurement has many potential applications, including: improved geolocation capabilities, measuring the performance of parts of the Internet where there is not much measurement infrastructure (e.g., PlanetLab), and providing data plane measurements to better understand global Internet routing. Off-path means that the measurement machine is not on the path being measured...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.