99 research outputs found

    Duplicate detection methodology for IP network traffic analysis

    Full text link
    Network traffic monitoring systems have to deal with a challenging problem: the traffic capturing process almost invariably produces duplicate packets. In spite of this, and in contrast with other fields, there is no scientific literature addressing it. This paper establishes the theoretical background concerning data duplication in network traffic analysis: generating mechanisms, types of duplicates and their characteristics are described. On this basis, a duplicate detection and removal methodology is proposed. Moreover, an analytical and experimental study is presented, whose results provide a dimensioning rule for this methodology.Comment: 7 pages, 8 figures. For the GitHub project, see https://github.com/Enchufa2/nantool

    Efficient sharing of dynamic WSNs

    Get PDF
    The Ambient middleware supports real-time monitoring and remote maintenance across the Internet via wired and mobile wireless network access technologies. Additionally, the middleware offers easy integration with third-party applications. Ambient Studio utilizes the middleware for remote WSN configuration and monitoring. The ConnectBox utilizes it to monitor and maintain WSNs remotely. This paper describes the Ambient middleware and compares its efficiency with the existing messaging protocols used for instant messaging and web services

    Traversing NAT: A Problem

    Get PDF
    This quasi-experimental before-and-after study measured and analyzed the impacts of adding security to a new bi-directional Network Address Translation (NAT). Literature revolves around various types of NAT, their advantages and disadvantages, their security models, and networking technologiesā€™ adoption. The study of the newly created secure bi-directional model of NAT showed statistically significant changes in the variables than another model using port forwarding. Future research of how data will traverse networks is crucial in an ever-changing world of technology

    Exploring the concept of scope to provide better security for internet services.

    Get PDF
    The Internet was originally designed to support universal reachability by allowing any host to communicate with any end server over the globe. Unfortunately, this feature has been abused by attackers to overload the servers with malicious traffic. In order to deal with this situation, many mechanisms such as Firewalls and Access Lists have been introduced to restrict serversā€™ accessibility only to legitimate users. This paper discusses some of these mechanisms, highlights their pros and cons and then proposes a new mechanism that attempts to limit a serverā€™s reachability based on its operational scope

    DCCP Simultaneous-Open Technique to Facilitate NAT/Middlebox Traversal

    Get PDF
    https://datatracker.ietf.org/doc/rfc5595/Publisher PD

    Remote service usage through SIP with multimedia access as a use case

    Get PDF
    The IP Multimedia Subsystem is under deployment, as an IP-based service control and access infrastructure, but how it interconnects with residential appliances is currently unclear. With IMS access for the residential appliances they can be used as both service consumers and service providers. In this paper we present a protocol which allows residential services to be remotely invoked, through the IMS, and consumed in a different network, along with a prototype implementation and early results. With our protocol services of two distinct service protocol systems can cooperate

    ENAT-PT: An Enhanced NAT-PT Model

    Get PDF
    NAT-PT would allow IPv4 nodes to communicate with IPv6 nodes transparently by translating the IPv6 address into a registered V4 address. However, NAT-PT would fall flat when the pool of V4 addresses is exhausted. NAPT-PT multiplexes the registered addressā€™ ports and will allow for a maximum of 63K outbound TCP and 63K UDP sessions per IPv4 address, but it is unidirectional. We present in this paper a novel solution ENAT-PTļ¼ˆan enhanced NAT-PTļ¼‰ļ¼Œwhich will allow for a great number of inbound sessions by using a single V4 address. By using ENAT-PT, we can visit V6 networks from a V4 network with a small address pool

    Design and Research of New Network Address Coding

    Get PDF
    • ā€¦
    corecore