No abstract available.
Preface
Monitoring of SIP-Based Communication Using Signalling Information for Performance Measurements
This paper presents a prototype implementation of end-to-end monitoring of performance parameters in SIP-based communication. The approach is to integrate signalling information and measurements of user data traffic. Test measurements illustrate some ...
VIP Bridge: Integrating Several Sensor Networks into One Virtual Sensor Network
Some applications need to collect information from several different sensor networks to provide comprehensive services. In order to simplify the complexity of dealing with heterogeneous sensor networks, a uniform interface should be provided for users. ...
Measurement Based Approach of Congestion Control for Enforcing a Robust QoS in the Inter
How to provide quality of service (QoS), has been a major issue for the Internet for the past decade. But, recent monitoring projects showed that Internet traffic exhibited large variations, and non-stationary traffic, making difficult to guarantee a ...
Monitoring & Forensic Analysis forWireless Networks
This paper describes FLUX: "A Network Forensic Time Machine". Operating like a surveillance camera, FLUX is an infrastructure for capturing and analyzing packets traversing the network. The 'Time Machine' term relates to the amount of dedicated storage ...
Evaluation of a Multi-Queue Web Caching Scheme that Differentiates the Content-Type of Documents
This work presents a caching scheme that differentiates the content-type of the documents and uses a different queue for each of them. In that way, the replacement policy that better performance is achieved for each content-type and cache size can be ...
Complementary Visualization of perfSONAR Network Performance Measurements
Research backbone networks are currently used by a variety of scientists and research projects interested in maximizing the benefit they receive in using the networks. Therefore, it is highly desirable for them to get access to network performance ...
Modeling Internet Traffic: Performance Limits
Traffic modeling is an important tool for performance evaluation of networks. Over the last decade traffic characterization studies revealed the presence of different types of correlations in Internet traffic. In this paper we present traffic modeling ...
Design and Evaluation of an Overload Control System for Crisis-RelatedWeb Server Systems
During recent years we have seen several large-scale crises. The 9/11 terror attacks, tsunamis, storms, floods and bombings have all caused a great deal of damage. A common factor in these crises has been the need for information and one important ...
The Interaction of IGP Weight Optimization with BGP
Link weight optimization is shown to be a key issue in engineering of IGPs using shortest path first routing. The IGP weight optimization problem seeks a weight array resulting an optimal load distribution in the network based on the topology ...
Public Domain P2P File-Sharing Networks Measurements and Modeling
Since P2P file-sharing networks became extremely popular between Internet users, many researchers have tried to model those P2P networks. This article deals with the modeling of public domain P2P filesharing networks in terms of some parameters such as ...
Overload Protection in a SIP Signaling Network
The paper studies performance of a SIP signaling network in an overload condition. The main interest is to find a preferable queuing structure of a SIP proxy server to protect from performance degradation. In the study, two types of queuing structure, ...
Evolution of the Current Telecommunications Networks and the Next Generation Optical Networks
During the years between 1995 and 2000, there had been a strong competition between IP and ATM. MPLS that was approved by IETF in 1997, seems to end this competition with combination of best features of IP and ATM. MPLmS that is the equivalent of MPLS ...
Initial Results from an IPv6 Darknet13
A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background 'noise' on a ...
Traffic Analysis of a Congested Link
While networks capacities are usually planned to cope with the offered traffic, transient link overloads may occur due to link failures or traffic peaks. According to previous analytical and simulation studies, performance degradation is relatively slow ...
Flow-Based Identification of P2P Heavy-Hitters
One major new and often not welcome source of Internet traffic is P2P filesharing traffic. Banning P2P usage is not always possible or enforcible, especially in a university environment. A more restrained approach allows P2P usage, but limits the ...
Crawler Detection: A Bayesian Approach
In this paper, we introduce a probabilistic modeling approach for addressing the problem of Web robot detection from Web-server access logs. More specifically, we construct a Bayesian network that classifies automatically access-log sessions as being ...
On the Power-Law of the Internet and the Prediction of BGP Convergence
Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol. With the rapid development of Internet, the convergence problem of BGP attracts more attention, which is an inborn limitation for path vector routing protocol. But previous ...
Monitoring Challenges and Approaches for P2P File-Sharing Systems
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a ...
Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol
Although Spanning-Tree Protocol (STP) is widely used in switching networks today, it is not until recently that its security performance is studied by researchers. In this paper, the problem of attacks to STP is addressed. The paper proposes a novel ...
Disaster Recovery Sites as a Tool of Managing Extreme Attacks
This paper presents the use of overlay networks as a tool to confront the consequences of extreme network attacks. In particular, it suggests the use of Disaster Recovery Sites, which are becoming a common practice of all major IT infrastructures. The ...
Simple Provisioning, Complex Consolidation - A Pragmatic Step Towards a New Optical Layer
Recent years the permanently increasing data traffic of IP services and broadband applications has become the largest traffic component in transport networks. The requirements of the dominant IP-client result in major changes of the architecture and in ...
A New Planning Methodology for IP Networks with Dynamic Traffic Demand and Full Survivability Guarantee Against Link Failures
Recently the Generalized Survivable Network (GSN) was introduced to guarantee full survivability against link failures for dynamic demand networks. The GSN planning methodology is deterministic and easy to specify - requiring only the specification of ...
Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection
This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks. Such applications utilise anomaly detection techniques which can be applied for transaction authentication and intrusion ...
A Generic Authentication System based on SIM
Today the Internet is mostly used for services that require low or none security. The commercial and governmental applications have started to emerge but met problems since they require strong authentication, which is both difficult and costly to ...
Using the Discrete Squaring Function in the Delayed Message Authentication Protocol
The Delayed Message Authentication Protocol (DeMA protocol) is a protocol that can be used in order to exchange authentic information between two entities by using a one-way chain (i.e. an array of elements generated by a one-way function) on each ...
Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDSs) detect suspicious activities and possible intrusions in a system or a particular network at the moment at which these happen. To achieve their objectives the different entities that compose the IDS need to communicate ...
Technical Infrastructure of a CSIRT
The goal of this paper is very specific, provide a guide to build a technical infrastructure for a Computer Security Incident Response Team (CSIRT) work, it does not cover the complete process of creating a CSIRT. This paper provides guidance for people ...
SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks
In this paper we propose SEMAFOR, a web based platform for protecting adaptive multimedia content delivery in heterogeneous environments. It aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while ...