2014 5th International Conference on Data Communication Networking (DCNET)最新文献

筛选
英文 中文
A SCTP-based authentication protocol: SCTPAP 基于sctp的认证协议:SCTPAP
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-28 DOI: 10.5220/0005123400470053
M. Rekik, A. Meddeb-Makhlouf, F. Zarai, M. Obaidat, K. Hsiao
{"title":"A SCTP-based authentication protocol: SCTPAP","authors":"M. Rekik, A. Meddeb-Makhlouf, F. Zarai, M. Obaidat, K. Hsiao","doi":"10.5220/0005123400470053","DOIUrl":"https://doi.org/10.5220/0005123400470053","url":null,"abstract":"Multihoming is among the features of SCTP (Stream Control Transmission Protocol), which makes it more robust and efficient than TCP(Transmission Control Protocol)but more vulnerable under attack. Nevertheless, a strong security can degrade the QoS(Quality of Service) by adding additional delay. Therefore, we propose in this paper, a secure authentication protocol that supports the establishment of multiple connections to protect multihoming networks with the least number of messages, number of parameters in each message and number of communicating nodes. The proposed scheme provides lower delay of authentication and protects against several attacks. Our devised protocol is analyzed using SPAN (Security Protocol Animator) for AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. The obtained validation results show that the scheme is safe.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127245875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Routing strategy of a prioritized limited multi-server processor-sharing system 优先级有限多服务器处理器共享系统的路由策略
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-28 DOI: 10.5220/0004998900050012
Y. Shikata, Nobutane Hanayama
{"title":"Routing strategy of a prioritized limited multi-server processor-sharing system","authors":"Y. Shikata, Nobutane Hanayama","doi":"10.5220/0004998900050012","DOIUrl":"https://doi.org/10.5220/0004998900050012","url":null,"abstract":"In this work, routing strategies of an arriving request to a server in a prioritized limited multi-server processor-sharing (PS) system are studied in order to optimize a given performance criterion. In this system, an arriving request enters the dispatcher, which routes this request to each server according to a predetermined strategy. In the prioritized limited PS server, a high-priority request is allocated a service ratio that is m (called the priority ratio) times greater than that of a low-priority request. Moreover, the sum of the number of the requests receiving service is restricted to a fixed value. The arriving request which cannot receive service will be queued (waiting system) or rejected (loss system). In this server, at the arrival (or departure) of a request, the extension (or shortening) of the remaining sojourn time of each request that is receiving service can be calculated using the number of requests and priority ratio. Employing a simulation program to execute these events and calculations enables us to analyze the performance of this system, such as the loss probability, mean sojourn time, and mean waiting time. Based on the evaluation results, the most suitable routing strategy for the loss or waiting system is clarified.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The bio-inspired and social evolution of node and data in a multilayer network 多层网络中节点和数据的生物启发和社会进化
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-28 DOI: 10.5220/0005119600410046
Marialisa Scatá, A. D. Stefano, Evelina Giacchi, A. L. Corte, P. Lio’
{"title":"The bio-inspired and social evolution of node and data in a multilayer network","authors":"Marialisa Scatá, A. D. Stefano, Evelina Giacchi, A. L. Corte, P. Lio’","doi":"10.5220/0005119600410046","DOIUrl":"https://doi.org/10.5220/0005119600410046","url":null,"abstract":"Following a bio-inspired approach, applied to multilayer social networks, the idea is to build a novel paradigm aimed to improve methodologies and analysis in the Information and Communication Technologies. The social network and the multilayer structure allow to carry out an analysis of the complex patterns, in terms of the dynamics involving the main entities, nodes and data. The nodes represent the basic kernel from which generating ties, interactions, flow of information, influences and action strategies that affect the communities. The data, gathered from multiple sources, after their integration, will become complex objects, enclosing different kinds of information. The proposed approach introduces a level of abstraction that originates from the evolution of nodes and data transformed in “social objects”. This new paradigm consists of a multilayer social network, divided into three layers, generating an increasing awareness, from “things” to “knowledge”, extracting as much “knowledge” as possible. This paradigm allows to redesign the ICT in a bio-networks driven approach.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132175237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Remote laboratory for computer networks 计算机网络远程实验室
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-28 DOI: 10.5220/0005113600280035
Ladislav Balík, J. Horalek, V. Sobeslav, Ondrej Hornig
{"title":"Remote laboratory for computer networks","authors":"Ladislav Balík, J. Horalek, V. Sobeslav, Ondrej Hornig","doi":"10.5220/0005113600280035","DOIUrl":"https://doi.org/10.5220/0005113600280035","url":null,"abstract":"The article introduces the reasons for realisation of the remote laboratory of computer networks which originate from the comparisons of the alternatives of working with the specialised networking hardware. These use the principle of virtualisation or simulation of such devices as an alternative for obtaining competencies from the area of computer networks. Due to this reason, this article discusses other technical solutions and the analysis of usability of such solutions is conducted. For a maximal efficiency of the networking hardware utilization in laboratories it is necessary to make it fully available for students which is the 24/7 regime. This option can be executed using secure technologies and protocols for distant accessing of laboratory hardware. This solution, which is based on using console controllers and single utility interface, is introduced and described in detail in the following paragraphs. Moreover, from the analysis of the pilot operation of remote access to the laboratory equipment of the networking laboratory, suggestions for improvement of the current solution and its usage in fully working condition - access to a greater number of students in unlimited regime - can be obtained.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"51 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards identification of operating systems from the internet traffic: IPFIX monitoring with fingerprinting and clustering 从互联网流量中识别操作系统:基于指纹和集群的IPFIX监控
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-28 DOI: 10.5220/0005099500210027
P. Matoušek, O. Ryšavý, M. Grégr, Martin Vymlátil
{"title":"Towards identification of operating systems from the internet traffic: IPFIX monitoring with fingerprinting and clustering","authors":"P. Matoušek, O. Ryšavý, M. Grégr, Martin Vymlátil","doi":"10.5220/0005099500210027","DOIUrl":"https://doi.org/10.5220/0005099500210027","url":null,"abstract":"This paper deals with identification of operating systems (OSs) from the Internet traffic. Every packet injected on the network carries a specific information in its packet header that reflects the initial settings of a host's operating system. The set of such features forms a fingerprint. The OS fingerprint usually includes an initial TTL time, a TCP initial window time, a set of specific TCP options, and other values obtained from IP and TCP headers. Identification of OSs can be useful for monitoring a traffic on a local network and also for security purposes. In our paper we focus on the passive fingerprinting using TCP SYN packets that is incorporated to a IPFIX probe. Our tool enhances standard IPFIX records by additional information about OSs. Then, it sends the records to an IPFIX collector where network statistics are stored and presented to the network administrator. If identification is not successful, a further HTTP header check is employed and the fingerprinting database in the probe is updated. Our fingerprinting technique can be extended using cluster analysis as presented in this paper. As we show the clustering adds flexibility and dynamics to the fingerprinting. We also discuss the impact of IPv6 protocol on the passive fingerprinting.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Papers, Please…: X.509 certificate revocation in practice 文件,请…:X.509证书撤销实践
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-28 DOI: 10.5220/0005113800360040
Manuel Koschuch, Ronald Wagner
{"title":"Papers, Please…: X.509 certificate revocation in practice","authors":"Manuel Koschuch, Ronald Wagner","doi":"10.5220/0005113800360040","DOIUrl":"https://doi.org/10.5220/0005113800360040","url":null,"abstract":"X.509v3 certificates are the current standard of verifiable associating an entity with a public key, and are widely used in different networking applications: from HTTPS in browsers, SSH connections, to e-mail, PDF and code signing. This wide usage also necessitates the existence of a robust, reliable way to detect and deal with compromised or otherwise invalid certificates. Certificate Revocation Lists (CRLs) and the Online Certificate Status Protocol (OCSP) are the two mechanisms currently deployed to handle revoked certificates. In this position paper we present preliminary results of our research into the practical use of these protocols, using an existing data-set to show that almost 85% of certificates currently in use contain no revocation information, and compare different browsers under different operating systems as to their dealing with unreachable OCSP servers. We find that browser behaviour in this case ranges from opening the site without any warnings whatsoever to totally blocking it, indicating no clear default reaction and no reliable behaviour.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
AVP: An Android virtual playground AVP: Android虚拟游乐场
2014 5th International Conference on Data Communication Networking (DCNET) Pub Date : 2014-08-01 DOI: 10.5220/0005016500130020
F. Gagnon, F. Lafrance, Simon Frenette, Simon Hallé
{"title":"AVP: An Android virtual playground","authors":"F. Gagnon, F. Lafrance, Simon Frenette, Simon Hallé","doi":"10.5220/0005016500130020","DOIUrl":"https://doi.org/10.5220/0005016500130020","url":null,"abstract":"This paper presents a virtual test-bed for the Android platform named AVP - Android Virtual Playground. The focus of AVP is the automatization of the manipulations required to perform a network experiment, in a very broad sense, involving Android virtual devices. A central objective of AVP is data collection during experiments. Together with describing the different steps of using AVP, from the specification of the experiment to the visualization of the results, the paper presents the current capabilities of AVP.","PeriodicalId":394687,"journal":{"name":"2014 5th International Conference on Data Communication Networking (DCNET)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117241116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信