The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
NFV together with SDN promises to provide more flexible and efficient service provision methods by decoupling the network functions (NFs) from the physical network topology and devices, but requires the real-time and automatic composition and verification for service function chain (SFC). However, most of SFCs today are still typically built through manual configuration processes, which are slow and...
The Domain Name System (DNS) is used almost everywhere in mobile networks to determine the IP addresses of the network elements and thanks to the DNS architecture of the inter-operator IP backbone network, a network element of a public mobile network (PMN) can easily determine IP addresses of any other PMN. The analysis of some customers' complaints showed that it could be the cause of billing mistakes...
Over the years, caching has been leveraged (and established) as an add-on functionality to enhance network performance. However, Information Centric Networking (ICN) conceives caching at network layer (i.e. beyond the premise of end-to-end principle) thereby making it one of the core functionalities. Further, ICN advocates named-content (another core functionality) that allows content-consciousness...
Analyzing and predicting complex network attack strategies require an efficient way to produce realistic and up-to-date data representing a variety of attack behaviors on diverse network configurations. This work develops a simulation system that fuses four context models: the networks, the system vulnerabilities, the attack behaviors, and the attack scenarios, so as to synthesize multistage attack...
The intensive growth of processing power, data storage and transmission capabilities has revolutionized many aspects of science. These resources are essential to achieve high-quality results in many application areas. In this context, the University of Luxembourg (UL) operates since 2007 an High Performance Computing (HPC) facility and the related storage by a very small team. The aspect of bridging...
The amount of data within the Linking Open Data (LOD) cloud is steadily increasing and resembles a rich source of information. Since Context-aware Services (CAS) can highly benefit from background information, e.g., about the environment of a user, it makes sense to leverage that enormous amount of data already present in the LOD cloud to enhance the quality of these services. Within this work, the...
SPam over IP Telephony (SPIT) is an emerging threat in the telecom era of Voice over IP Networks (VoIP). Though evolved from email spam, SPIT is more obstructive and intrusive in nature as they require response from the callee. Contemplating the behavior of SPIT, a provider based system is contributed with the proposed mechanism installed on the SIP proxy server. In this work, a biologically inspired...
In cyber analysis, it is highly desirable to support the analysis of junior analysts by leveraging the experiences of experts. But, there are two major challenges to achieve this goal. First, it is very costly to capture the experience of experts for the complex task of cyber analysis using traditional approaches such as protocol analysis. Second, it is difficult to identify previous experiences of...
Many network operators have recently started to deploy their own Content Delivery Networks (CDNs) within their administrative domain. Having a CDN deployed within an operator's network has the advantage of potentially placing caches very close to the end user, thereby increasing Quality of Service for the user, while at the same time saving delivery costs for the operator. However, if each network...
In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain names by evaluating the...
Botnet is a great threat of the Internet nowadays. For now, Botnet has transformed to the complex one based on HTTP, P2P protocols from the simple Botnets which based on IRC protocol. In this paper, we evaluate the key features of HTTP Botnet and design a new method to detect the HTTP Botnet based on feature analysis. The experiment result shows that our method is effective and efficient on detecting...
To address shortcomings of the current Internet, many researchers are taking a clean-slate approach toward re-designing the Internet. These so-called clean-slate approaches discard the old assumptions, design principles, and constraints of the current Internet, set aside concerns about compatibility with existing software, and rebuild the entire network from scratch. Clean-slate approaches have the...
This paper studies the use of a traffic optimization technique named TCM (Tunneling, Compressing and Multiplexing) to reduce the bandwidth of MMORPGs (Massively Multiplayer Online Role-Playing Games), which employ TCP to provide a soft real-time service. In order to optimize the traffic and to improve bandwidth efficiency, TCM can be applied when the packets of a number of players share the same link,...
In this paper we introduce some attack types, which can be led against VoIP traffic and we present protection forms against them. We have performed an experiment on the proposed protection model, which was focused on signaling DoS attack with aim to cause malfunction of the software exchange Asterisk. For attack we have used software tool SIPp as messages generator to flood the exchange with a huge...
In this paper, we propose a standardization scheme for a new paradigm: Advanced Internet of Things (AIoT), which is based on our proposed Unified Object Description Language (UODL) and allows: 1) identifying and interconnecting every object with a standard format, 2) making it easier and flexible for the third party control and management. The purpose of AIoT scheme is to build a smart world of always-on,...
With the pervasive computing and parallel computing time arrival, the traditional access control mechanism already ragged, this has prompted the dynamic access control technology, this technology makes access alter with the context of the changes, so it need to acquire dynamic context information. This paper gives the definition of the context information in dynamic access control, and on the bases...
Multi-homing is expected to be an important enabler of the future Internet. Already today, terminal devices are equipped with multiple network interfaces and able to use them simultaneously. In the future, mobile multimedia services such as video streaming can maximize the user experienced quality by utilizing the available network resources, concurrently. However, intelligent decision-making as well...
The philosophy upon which the Internet was built places the intelligence close to the edge. As the Internet has matured, intermediate devices or middleboxes, such as firewalls or application gateways, have been introduced, thereby weakening the end-to-end nature of the network. As a result, applications must often modify their behavior to accommodate the middleboxes. This is is especially true in...
Voice over IP (VoIP) and the Session Initiation Protocol (SIP) are establishing themselves as strong players in the field of multimedia communications over IP, leveraged by low cost services and easy management. Nevertheless, the security aspects are not yet fully mastered. In this paper we present an open-source implementation of a VoIP SIP-specific honeypot named Artemisa. The honeypot is designed...
Increasing knowledge of paedophile activity in P2P systems is a crucial societal concern, with important consequences on child protection, policy making, and internet regulation. Because of a lack of traces of P2P exchanges and rigorous analysis methodology, however, current knowledge of this activity remains very limited. We consider here a widely used P2P system, eDonkey, and focus on two key statistics:...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.