The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Passive optical networks are the most promising solution for access networks. Nowadays, Gigabit passive optical networks are very popular for Internet services providers. These networks have currently been limited by transmission speeds (up to 2.5 Gbit/s in downstream) which is not sufficient for all services (such as 4k video transfer etc.) because this speed is shared with all users in the network...
In this paper we present a time behavioral analysis of a simulated botnet network traffic, collected and discovered from NetFlow messages. More specifically said - lifespans. The technique, which we used, is focused on to model command and control communication in a botnet network. The lifespan of this referred traffic is modeled by lifelines using Python language.
This article presents a case study and comparison of simulations carried out by SimPy 3.0 of Python module and OMNeT++ tool to explore the performance. The target of this comparison is in particular configuration of network for future steps what tools would be good to use. Two simple models of a network were created with Python and C++ language.
The article describes the endpoint security of xDSL modems (routers), outlines the set of tests performed by our team and provides test results. Described vulnerabilities can be exploited to perform a wide DoS attack against ISP's customers. The vulnerabilities have been identified in the Ethernet layer, IP platform layer and in the TCP protocol implementations. All described vulnerabilities can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.