The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A virtual private network (VPN) can be defined as a way to provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. This work examines and empirically evaluates the remote access VPNs, namely point to point tunneling protocol (PPTP), layer 2 tunneling protocol...
Service overlay networks (SONs) have recently been proposed to support various value-added services including multicast, resilient routing, QoS support, and DoS resistant communication in the Internet. Access control plays an important role for various SON applications yet most SON proposals do not consider access control or assume that it is a pre-existing service. The lack of a proper access control...
In this paper we propose a solution to strengthen the security of domain name system (DNS) servers associated with one or more top level domains (TLD). The proposed solution has been developed and tested at FCCN, the TLD manager for the .PT domain. Through the implementation of network probes that monitor the network in real-time, we are able to dynamically prevent, detect or limit the scope of attempted...
New threats are constantly appearing on the Internet. System administrators have developed many tools to try to mitigate those threats, however, currently available countermeasures are still limited. Moreover, it is difficult for system administrators to fully understand what happens in their networks in (near) real time. We focus on the monitoring of network traffic sent to unused IP addresses with...
SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure solution for Web-based communication,...
With the fast development of network technology, computer technology, digitized information technology and image processing technology, some online score systems based on the network are developed in recent years. However, they only can be used in the local area network. Thus, a new online score system is designed and implemented to able to be used in the Internet. The structures of this system are...
Applications on network need not only enough quality of service (QoS) but also enough quality of security service (QoSS) because the security is essential for most of applications on network. The purpose of QoSS is to organize various security services together to achieve enough security for applications. As security requirements vary dramatically for different applications, differentiated security...
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on invulnerable addresses. Inspired by the theory of good point set, this paper proposes a new scanning strategy, referred to as good point set scanning (GPSS), for worms. Experimental results...
Delay Tolerant Networks (DTN) arise whenever traditional assumptions about todaypsilas Internet such as continuous end-to-end connectivity, low latencies and low error rates are not applicable. These challenges impose constraints on the choice and implementation of possible security mechanisms in DTNs. The key requirements for a security architecture in DTNs include ensuring the protection of DTN...
This paper presents new, universal, scalable network architecture, called USA, which resolves the growing tensions between the Internet architecture and routing infrastructure. USA separates the identity of end host from its location and adopts name-based addressing to achieve the end-to-end communication. USA also isolates the address space of end sites from core Internet. Each end site possesses...
The VoIP (voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same...
Dynamic host configuration protocol (DHCP) is a dynamic IP address assignment scheme for assigning IP addresses to those non-IP-preconfigured clients. Applied with network address translation (NAT) scheme, a client with auto-configured private IP address on a private network can access to the public networks. This paper proposes an automatic notification scheme based on DHCP that allows the DHCP server...
Traffic Validation Architecture (TVA) is a capability based network architecture that tries to limit Distributed Denial of Service Attacks (DDoS). It considers only the victimpsilas approval in the capability granting process. We propose an extension to the approach by involving two new parameters, the bottleneck linkpsilas status and message type, in the capability granting mechanism. Both these...
In the Internet, the rapid spread of worms is a serious problem. In many cases, worm-infected hosts generate a huge amount of flows with small size to search for other target hosts by scanning. Therefore, we defined hosts generating many flows, i.e., more than or equal to the threshold during a measurement period, as superspreaders, and we proposed a method of identifying superspreaders by flow sampling...
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less false positives than existing network security event detectors (e.g. IDS). We proposed a network security event detection method by analyzing correlation among multiple sessions. Our method can recognize hosts behaviors by...
The growing demand for voice services and multimedia delivery over the Internet has raised SIPpsilas popularity making it a subject of extensive research. SIP is an application layer control signaling protocol, whose main purpose is to create, modify and terminate multimedia sessions. Research has shown that SIP has a number of security issues that must be solved in order to increase its trustworthiness...
Recent papers propose QoS solutions allowing the users to explicitly specify the quality level they request during a so-called explicit QoS service invocation that includes dynamic QoS offering and new mechanisms for authentication, authorization and accounting. In particular, organizations should be able to control their network services and authorize QoS services based on service parameters, as...
IP spoofing has been exploited by distributed denial of service (DDoS) attacks to conceal flooding sources and localities in flooding traffic, and prevent legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victims is essential to their own protection as well as to their avoidance of becoming involuntary DoS reflectors...
Security threats for voice-over IP (VoIP) networks are becoming a major concern as its popularity increases. New attacks are developed that target directly the underlying SIP protocol. To detect such kinds of attacks we present a specification-based detection framework to recognise deviation from its expected behaviour. We present an implementation and show with measurements that this method is capable...
DDOS attacks generate flooding traffic from multiple sources towards selected nodes and cause obstruction in flow of legitimate information within a network. If the victim node is the server at ISP level requiring fast information processing, the entire network operation stops. We use various lines of honeypot based defense against such attacks. The first line of defense detects the presence of attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.