The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial of Service (DDoS) is a widely employed attacking scheme over network that interrupts services by creating network congestion, draining server resources, or disabling normal functions of network components. An attacker launches the DDoS attack from a large number of compromised while geographically distributed devices by sending low rate seemly legitimate traffic that disturbs server's...
In this paper, we explore the concept of flow-based load balancing of network traffic on multi-homed hosts. In contrast to existing approaches such as MPTCP, our approach is a client-side-only solution, and can therefore easily be deployed. We specifically explore flow-based load balancing for the web traffic use case. Experimental evaluations of our OpenFlow-based load balancer demonstrate the potential...
In this paper, we address the issue of profiling users over the Internet using meta-data logs derived from network flow data (hence preserving a high degree of privacy). In this broader context, we specifically aim to empirically demonstrate that Internet volume and time of usage of humans do exhibit repeatable behavior over time. In our experimental study, Internet usage statistics of octets and...
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However,...
The latest experiences hint that the QoS (Quality of Service) approaches adopted by IMS (IP Multimedia Subsystem) technologies are still suffering from a primary containment factor due to the nondifferentiation between IPTV (Internet Protocol Television) video components. The success of IPTV services depends on how the customer perceives QoS related to the provided stream. The satisfaction of this...
Video streaming over the internet for new 3D immersive media such as Virtual Reality and 360-degree videos has drawn great attention from both consumers and researchers in recent years. One of the biggest challenges in streaming such 3D media is the high bandwidth demands. While traditional 2D video streaming is still dominating network peak traffic, new inventions are accelerating the adoption of...
More than eighty different test environments need to be created and maintained for debugging the Marvell Ethernet PHY chip if the traditional industrial verification methodology is being used. This can easily incite very complicated debugging procedures and cause the problems and concerns of a multitude of engineering resources. The latest Marvell Ethernet PHY IC UVM verification platform integrating...
Internet scale continues to expand, the IPv6 protocol standard is implemented in the network gradually, make the behavior characteristic of the network become more changeful and more unstable, so it can be more detailed to carry on network situation perception system according to network data stream to become the next research direction. The support of IPv6 Network Situation Awareness system is realized...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
Distributed Denial of Service (DDoS) attacks serve to diminish the ability of the network to perform its intended function over time. The paper presents the design, implementation and analysis of a protocol based upon a technique for address agility called DDoS Resistant Multicast (DRM). After describing the our architecture and implementation we show an analysis that quantifies the overhead on network...
Smart objects (SOs) have been utilized widely to transform the physical environment around us to a digital world using the Internet of things (IoT) vision. Integrating a huge number of these devices into the Internet presents a significant necessity for an efficient discovery mechanism with high capability of an autonomous configuration and detection for theses devices and their provided services...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
Over the years the number of elements in a corporate network, the services and the amount of traffic have grown significantly. For this reason, it is increasingly important to analyze the traffic. Packet-based analysis is the traditional option but entails a high resources consumption. In order to palliate this, flow-based analysis arises. It usually implies to deploy a flow exporter, responsible...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. WebRTC is a set of communications protocols and APIs that provides browsers and mobile applications with Real-Time Communications (RTC) capabilities over peer-to-peer connections. The WebRTC API causes a range of client IP addresses to become available to a visited website via JavaScript, even if...
ATSC 3.0 is well designed based on the concept of all-IP to weave broadcast and broadband together. In order to discover the services or contents delivered through the broadband, ATSC 3.0 defines specific signaling, electronic service guide and automatic content recognition specification. In the case of signaling, the detailed discovering information is provided in the service layer signaling with...
Local area network (LAN) access is the top vector for insider threats and misuses according to the Verizon's Data Breach Investigations Report. Address Resolution Protocol (ARP) is often exploited by the attackers who have gained access to the LAN. It is critical for students to learn how attacks on ARP work and know the countermeasures. In an earlier work, authors developed a hands-on lab to help...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.