The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data in the digital universe is increasing at an exponential rate. The increasing access to the Internet and the greater network bandwidth give cause for big amounts of data, which need means of knowing the bandwidth and link capacity estimates in order to analyze the current network status. The proper operation and maintenance of a network requires a reliable and efficient monitoring mechanism, which...
Recently, the HTTP based Botnet threat has become a serious challenge for security experts as Bots can be distributed quickly and stealthily. With the HTTP protocol, Bots hide their communication flows within the normal HTTP flows making them more stealthy and difficult to detect. Furthermore, since the HTTP service is being widely used by the Internet applications, it is not easy to block this service...
Reports show that DDoS attacks are ubiquitous on the Internet and may jeopardize networks’ stable operation. In order to understand the nature of this threat and further to enable effective control and management, a whole picture of the Internet-wide attacks is a necessity. Traditional methods use darknets to this end. However, with the IPv4 address space exhaustion, darknets become hard to acquire...
Internet vulnerability studies typically consider highly central nodes as favorable targets of intelligent (malicious) attacks. Heuristics that use redundancy adding k extra links in the topology are a common class of countermeasures seeking to enhance Internet robustness. To identify the nodes to be linked most previous works propose very simple centrality criteria that lack a clear rationale and...
With the introduction of laptops, I-phones and world wide web it has become very easy for everyone to assess the information and so much so that the people have started reading newspapers on the run. The set of websites of Punjabi and Hindi newspapers has been prepared. There are sixty three websites of Punjabi and eighty four websites of Hindi newspapers all over the world. Five software tools have...
NORNET CORE is the world's first, open, large-scale Internet test bed for multi-homed systems and applications. Particularly, it is currently used for research on topics like multi-path transport and resilience. Researchers can run experiments on distributed, programmable nodes that are distributed over various locations and providing access to multiple different Internet service providers (ISP) with...
Due to the spread of unreliable online information on social network services (SNS), the users are faced with a difficult problem for determining if the information is trustworthy or not. At present, the users should make a decision overall by themselves for trustworthiness of information. Therefore, we need a way to systematically evaluate trustworthiness of information on SNS. In this paper, we...
The autonomous cache management in Content-Centric Networking (CCN) results in suboptimal caching decisions and implies cache-ignorant routing. Cache coordination and similar improvements hence have been the subject of several recent studies. The proposed solutions, however, are either impractical due to their massive coordination overhead, or of limited benefit since they cannot realize perfect coordination...
We propose a restoration method that Pacemaker only detects a failure of physical server but a virtual resource arrangement scheduler calls OpenStack APIs to re-build virtual resources on multiple physical servers to restore them. We implemented the proposed method and showed the effectiveness of fast restoration through performance measurements.
Correctly labelled dataseis are commonly required. Three particular scenarios are highlighted, which showcase this need. One of these scenarios is when using supervised Intrusion Detection Systems (TDSs). These systems need labelled datasets for their training process. Also, the real nature of analysed datasets must be known when evaluating the efficiency of IDSs detecting intrusions. The third scenario...
In this paper, we attempt to predict users' quality of experience (QoE) with the log data collected from the web sites of Internet video service providers. To this end, we first collect service log data in the wild from one of the Top 5 most popular providers in China. Then we do a series of data preprocessing to format the original semi-structured log data to structured. We calculate several key...
Cloud services and other online applications are having imperative requirements on wide service coverage, fast content delivery and more importantly low monetary investment. To this end, online relay networks that consist of widespread free edge-servers (edge-ORN for short) are emerging to compete with traditional Content Delivery Networks (CDNs). With an ever-increasing amount of traffic, edge-ORN...
The current Internet trends show that what is exchanged is becoming more important than who are exchanging it. As a result, the Internet is effectively moving from interconnecting machines to interconnecting information. Information-Centric Networking (ICN) has been proposed as a paradigm shift from the host-to-host Internet to a host-to-content one, or in other words from an end-to-end communication...
Workload burstiness and spikes are among the main reasons for service disruptions and decrease in the Quality-of-Service (QoS) of online services. They are hurdles that complicate autonomic resource management of data enters. In this paper, we review the state-of-the-art in online identification of workload spikes and quantifying burstiness. The applicability of some of the proposed techniques is...
Wireless mesh network (WMN) has emerged as a key technology because of their advantages over other wireless networks. Due to the dynamic infrastructure, the traffic volume of the WMN goes in an increasing order, thus balancing the load of the network becomes very crucial. Hence the problem of load balancing is addressed in this paper and for which the cluster based architecture of WMN is considered...
During recent years, establishing proper metrics for measuring system security has received increasing attention. Security logs contain vast amounts of information which are essential for creating many security metrics. Unfortunately, security logs are known to be very large, making their analysis a difficult task. Furthermore, recent security metrics research has focused on generic concepts, and...
Net neutrality has been heavily debated as a potential Internet regulation. Advocates have expressed concerns about the pricing power of ISPs, which might be used to discriminate Content Providers (CPs), and consequently destroy innovations at the edge of the Internet and hurt the user welfare. However, without service differentiation, ISPs do not have incentives to expand infrastructure capacities...
The purpose of this study is to find the level of trust of Indonesian consumers to C2C E-Commerce system in Indonesia. There are four antecedents of consumer trust will be measured and analysed to search the Indonesian C2C E-Commerce trust of Indonesian consumers. This study used the previous study that has been conducted about B2C E-Commerce system in Indonesia and also the similar study that has...
To effectively utilize storage space of edge streaming media servers, cache policies are being studied. Unlike traditional work that focused on hit ratio and overall system bandwidth cost, this paper recognize different significance of users and propose the concept of caching utility as a new metric to evaluate caching strategies. A user based caching algorithm, USCS, involving differentiated service...
The aims of this paper are to: 1) outline and discuss the framework for linking theater e-marketing with customer equity; 2) assess the impact of digital theater services on the metrics connected with Customer Lifetime Value. The results of empirical research suggest that art-oriented young Internet-users, who do not attend traditional theaters, can be attracted to digital theater services. Digital...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.