[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1156429guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
ICISP '06: Proceedings of the International Conference on Internet Surveillance and Protection
2006 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
August 26 - 28, 2006
ISBN:
978-0-7695-2649-2
Published:
26 August 2006

Reflects downloads up to 30 Dec 2024Bibliometrics
Abstract

No abstract available.

Article
Preface
Article
Organizing Committee
Article
Monitoring of SIP-Based Communication Using Signalling Information for Performance Measurements

This paper presents a prototype implementation of end-to-end monitoring of performance parameters in SIP-based communication. The approach is to integrate signalling information and measurements of user data traffic. Test measurements illustrate some ...

Article
VIP Bridge: Integrating Several Sensor Networks into One Virtual Sensor Network

Some applications need to collect information from several different sensor networks to provide comprehensive services. In order to simplify the complexity of dealing with heterogeneous sensor networks, a uniform interface should be provided for users. ...

Article
Measurement Based Approach of Congestion Control for Enforcing a Robust QoS in the Inter

How to provide quality of service (QoS), has been a major issue for the Internet for the past decade. But, recent monitoring projects showed that Internet traffic exhibited large variations, and non-stationary traffic, making difficult to guarantee a ...

Article
Monitoring & Forensic Analysis forWireless Networks

This paper describes FLUX: "A Network Forensic Time Machine". Operating like a surveillance camera, FLUX is an infrastructure for capturing and analyzing packets traversing the network. The 'Time Machine' term relates to the amount of dedicated storage ...

Article
Evaluation of a Multi-Queue Web Caching Scheme that Differentiates the Content-Type of Documents

This work presents a caching scheme that differentiates the content-type of the documents and uses a different queue for each of them. In that way, the replacement policy that better performance is achieved for each content-type and cache size can be ...

Article
Complementary Visualization of perfSONAR Network Performance Measurements

Research backbone networks are currently used by a variety of scientists and research projects interested in maximizing the benefit they receive in using the networks. Therefore, it is highly desirable for them to get access to network performance ...

Article
Modeling Internet Traffic: Performance Limits

Traffic modeling is an important tool for performance evaluation of networks. Over the last decade traffic characterization studies revealed the presence of different types of correlations in Internet traffic. In this paper we present traffic modeling ...

Article
Design and Evaluation of an Overload Control System for Crisis-RelatedWeb Server Systems

During recent years we have seen several large-scale crises. The 9/11 terror attacks, tsunamis, storms, floods and bombings have all caused a great deal of damage. A common factor in these crises has been the need for information and one important ...

Article
The Interaction of IGP Weight Optimization with BGP

Link weight optimization is shown to be a key issue in engineering of IGPs using shortest path first routing. The IGP weight optimization problem seeks a weight array resulting an optimal load distribution in the network based on the topology ...

Article
Public Domain P2P File-Sharing Networks Measurements and Modeling

Since P2P file-sharing networks became extremely popular between Internet users, many researchers have tried to model those P2P networks. This article deals with the modeling of public domain P2P filesharing networks in terms of some parameters such as ...

Article
Overload Protection in a SIP Signaling Network

The paper studies performance of a SIP signaling network in an overload condition. The main interest is to find a preferable queuing structure of a SIP proxy server to protect from performance degradation. In the study, two types of queuing structure, ...

Article
Evolution of the Current Telecommunications Networks and the Next Generation Optical Networks

During the years between 1995 and 2000, there had been a strong competition between IP and ATM. MPLS that was approved by IETF in 1997, seems to end this competition with combination of best features of IP and ATM. MPLmS that is the equivalent of MPLS ...

Article
Initial Results from an IPv6 Darknet13

A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background 'noise' on a ...

Article
Traffic Analysis of a Congested Link

While networks capacities are usually planned to cope with the offered traffic, transient link overloads may occur due to link failures or traffic peaks. According to previous analytical and simulation studies, performance degradation is relatively slow ...

Article
Flow-Based Identification of P2P Heavy-Hitters

One major new and often not welcome source of Internet traffic is P2P filesharing traffic. Banning P2P usage is not always possible or enforcible, especially in a university environment. A more restrained approach allows P2P usage, but limits the ...

Article
Crawler Detection: A Bayesian Approach

In this paper, we introduce a probabilistic modeling approach for addressing the problem of Web robot detection from Web-server access logs. More specifically, we construct a Bayesian network that classifies automatically access-log sessions as being ...

Article
On the Power-Law of the Internet and the Prediction of BGP Convergence

Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. With the rapid development of Internet, the convergence problem of BGP attracts more attention, which is an inborn limitation for path vector routing protocol. But previous ...

Article
Monitoring Challenges and Approaches for P2P File-Sharing Systems

Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a ...

Article
Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol

Although Spanning-Tree Protocol (STP) is widely used in switching networks today, it is not until recently that its security performance is studied by researchers. In this paper, the problem of attacks to STP is addressed. The paper proposes a novel ...

Article
Disaster Recovery Sites as a Tool of Managing Extreme Attacks

This paper presents the use of overlay networks as a tool to confront the consequences of extreme network attacks. In particular, it suggests the use of Disaster Recovery Sites, which are becoming a common practice of all major IT infrastructures. The ...

Article
Simple Provisioning, Complex Consolidation - A Pragmatic Step Towards a New Optical Layer

Recent years the permanently increasing data traffic of IP services and broadband applications has become the largest traffic component in transport networks. The requirements of the dominant IP-client result in major changes of the architecture and in ...

Article
A New Planning Methodology for IP Networks with Dynamic Traffic Demand and Full Survivability Guarantee Against Link Failures

Recently the Generalized Survivable Network (GSN) was introduced to guarantee full survivability against link failures for dynamic demand networks. The GSN planning methodology is deterministic and easy to specify - requiring only the specification of ...

Article
Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection

This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks. Such applications utilise anomaly detection techniques which can be applied for transaction authentication and intrusion ...

Article
A Generic Authentication System based on SIM

Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to ...

Article
Using the Discrete Squaring Function in the Delayed Message Authentication Protocol

The Delayed Message Authentication Protocol (DeMA protocol) is a protocol that can be used in order to exchange authentic information between two entities by using a one-way chain (i.e. an array of elements generated by a one-way function) on each ...

Article
Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems

Intrusion Detection Systems (IDSs) detect suspicious activities and possible intrusions in a system or a particular network at the moment at which these happen. To achieve their objectives the different entities that compose the IDS need to communicate ...

Article
Technical Infrastructure of a CSIRT

The goal of this paper is very specific, provide a guide to build a technical infrastructure for a Computer Security Incident Response Team (CSIRT) work, it does not cover the complete process of creating a CSIRT. This paper provides guidance for people ...

Article
SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks

In this paper we propose SEMAFOR, a web based platform for protecting adaptive multimedia content delivery in heterogeneous environments. It aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations