99 research outputs found
Duplicate detection methodology for IP network traffic analysis
Network traffic monitoring systems have to deal with a challenging problem:
the traffic capturing process almost invariably produces duplicate packets. In
spite of this, and in contrast with other fields, there is no scientific
literature addressing it. This paper establishes the theoretical background
concerning data duplication in network traffic analysis: generating mechanisms,
types of duplicates and their characteristics are described. On this basis, a
duplicate detection and removal methodology is proposed. Moreover, an
analytical and experimental study is presented, whose results provide a
dimensioning rule for this methodology.Comment: 7 pages, 8 figures. For the GitHub project, see
https://github.com/Enchufa2/nantool
Efficient sharing of dynamic WSNs
The Ambient middleware supports real-time monitoring and remote maintenance across the Internet via wired and mobile wireless network access technologies. Additionally, the middleware offers easy integration with third-party applications. Ambient Studio utilizes the middleware for remote WSN configuration and monitoring. The ConnectBox utilizes it to monitor and maintain WSNs remotely. This paper describes the Ambient middleware and compares its efficiency with the existing messaging protocols used for instant messaging and web services
Traversing NAT: A Problem
This quasi-experimental before-and-after study measured and analyzed the impacts of adding security to a new bi-directional Network Address Translation (NAT). Literature revolves around various types of NAT, their advantages and disadvantages, their security models, and networking technologiesā adoption. The study of the newly created secure bi-directional model of NAT showed statistically significant changes in the variables than another model using port forwarding. Future research of how data will traverse networks is crucial in an ever-changing world of technology
Exploring the concept of scope to provide better security for internet services.
The Internet was originally designed to support
universal reachability by allowing any host to communicate with any end server over the globe. Unfortunately, this feature has been abused by attackers to overload the servers with malicious traffic. In order to deal with this situation, many mechanisms such as Firewalls and Access Lists have been introduced to restrict serversā accessibility only to legitimate users. This paper discusses some of these mechanisms, highlights their pros and cons and then proposes a new mechanism that attempts to limit a serverās reachability based on its operational scope
DCCP Simultaneous-Open Technique to Facilitate NAT/Middlebox Traversal
https://datatracker.ietf.org/doc/rfc5595/Publisher PD
Remote service usage through SIP with multimedia access as a use case
The IP Multimedia Subsystem is under deployment, as an IP-based service control and access infrastructure, but how it interconnects with residential appliances is currently unclear. With IMS access for the residential appliances they can be used as both service consumers and service providers. In this paper we present a protocol which allows residential services to be remotely invoked, through the IMS, and consumed in a different network, along with a prototype implementation and early results. With our protocol services of two distinct service protocol systems can cooperate
ENAT-PT: An Enhanced NAT-PT Model
NAT-PT would allow IPv4 nodes to communicate with IPv6 nodes transparently by translating the IPv6 address into a registered V4 address. However, NAT-PT would fall flat when the pool of V4 addresses is exhausted. NAPT-PT multiplexes the registered addressā ports and will allow for a maximum of 63K outbound TCP and 63K UDP sessions per IPv4 address, but it is unidirectional. We present in this paper a novel solution ENAT-PTļ¼an enhanced NAT-PTļ¼ļ¼which will allow for a great number of inbound sessions by using a single V4 address. By using ENAT-PT, we can visit V6 networks from a V4 network with a small address pool
- ā¦