90 research outputs found

    A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    Get PDF
    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate

    Policy issues in interconnecting networks

    Get PDF
    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented

    The Disruptive User - Internet Appliances and the Management of Complexity

    Get PDF
    Bringing networked computing to new users and new contexts entails a disruptive decrease in the level of user patience for complexity. This paper discusses the tensions involved in making devices as easy to use as traditional appliances, within the context of the open and rapidly changing Internet. It distinguishes class 1 appliances, whose function is fixed by the manufacturer, from class 2 appliance, whose functionality is determined by an associated service provider, and posits a third class of appliance that would achieve true ease of use by leaving control with the user while simultaneously automating much of the complexity associated with that control

    Challenges to the End-to-End Internet Model

    Get PDF
    In 1981 Saltzer, Reed, and Clark identified “end-to-end” principles related to the design of modern layered protocols. The Internet today is not as transparent as envisioned by [SALTZER81]. While most of the intelligence remains concentrated in end-systems, users are now deploying more sophisticated processing within the network for a variety of reasons including security, network management, E-commerce, and survivability. Applications and application-layer protocols have been found to interact in unexpected ways with this new intelligent software within the network such as proxies, address translators, packet filters, intrusion detection, and differentiated service functions. In this paper we survey examples of the problems caused by the introduction of this new processing within the network which is counter to the end-to-end Internet model proposed by [SALTZER81]. * 1 2 3 The conflict between the end-to-end Internet model and the introduction of new processing within the network is being addressed on a case-by-case basis in each development effort. There are no indications that new devices installed within the network (which break the end-to-end model) will disappear and in fact there has been dramatic growth in their implementation due to recent denial-ofservice attacks. Transition to IPv6 only solves a subset of these issues, and its deployment is proceeding slowly. Future work is obviously needed to create a consistent environment for protocol development that preserves the transparency provided by the end-to-end Internet model

    Innovation and the Evolution of Market Structure for Internet Access in the United States

    Get PDF
    How and why did the U.S. commercial Internet access market structure evolve during its first decade? Commercial Internet access market structure arose from a propitious combination of inherited market structures from communications and computing, where a variety of firms already flourished and entrepreneurial norms prevailed. This setting nurtured innovative behavior across such key features as pricing, operational practices, and geographic coverage. Inherited regulatory decisions in communications markets had a nurturing effect on innovative activity. On-going regulatory decisions also shaped the market’s evolution, sometimes nurturing innovation and sometimes not. This narrative and analysis informs conjectures about several unique features of U.S. market structure and innovative behavior. It also informs policy debates today about the role of regulation in nurturing or discouraging innovation behavior.

    A Visit to Cyberspace Mall: Who Owns a Web Site Address?

    Get PDF
    The location of a business or other entity on the Internet (its cyberspace address) is identified by its domain name. Many businesses seek to use readily recognizable names as domain names so that potential visitors can quickly locate their web sites. Because a single domain name can identify only one web site, trademark owners and web site owners have clashed over who owns the rights to a particular domain name. The status of these clashes as of January 1997 and possible solutions to the problem considered by that date are reviewed

    Democracy in the Age of the Internet: An Analysis of the Net Neutrality Debate of 2006

    Get PDF
    In 2006, a major telecommunications bill failed because it did not include guarantees for something called “net neutrality.” The purpose of this paper is to describe and explain the politics behind the net neutrality debate of 2006 and to predict its likely future course.Indiana Universit

    Who Runs the Internet?

    Get PDF
    There is no single answer to the question of who runs the Internet. Is it the United States, often seen as the hegemon of the Internet, home to so many of the world’s leading Internet enterprises? Is it China, which erects a “Great Firewall” to assert control over the portion of the Internet available in China? Is it the European Union, which extends its power globally through its data protection regime, designating countries as “adequate” or (implicitly) “inadequate” to receive its data? Is it ICANN, the California not-for-profit organization that controls how Internet addresses are allocated? Is it the World Wide Web Consortium, which develops standards for the web’s communication’s protocols? Is it the United Nations, which periodically asserts pressure through organs like the International Telecommunications Union or through international meetings? Is it the World Trade Organization, which regulates the barriers that governments erect against international trade? Is it telecommunications providers such as AT&T and Comcast on whose wires and beams information flows? Is it Facebook, which recently connected a billion people in one day? Is it Google, where the world often begins its search for information? In reality, all of the above, and many more, can claim a share of Internet governance. This chapter will set out an overview of how the Internet is currently governed, as well as some of the key controversies in both the procedure and substance of Internet governance

    Mutating network scans for the assessment of supervised classifier ensembles

    Get PDF
    As it is well known, some Intrusion Detection Systems (IDSs) suffer from high rates of false positives and negatives. A mutation technique is proposed in this study to test and evaluate the performance of a full range of classifier ensembles for Network Intrusion Detection when trying to recognize new attacks. The novel technique applies mutant operators that randomly modify the features of the captured network packets to generate situations that could not otherwise be provided to IDSs while learning. A comprehensive comparison of supervised classifiers and their ensembles is performed to assess their generalization capability. It is based on the idea of confronting brand new network attacks obtained by means of the mutation technique. Finally, an example application of the proposed testing model is specially applied to the identification of network scans and related mutationsSpanish Ministry of Science and Innovation (TIN2010-21272-C02-01 and CIT-020000-2009-12) (both funded by the European Regional Development Fund). The authors would also like to thank the vehicle interior manufacturer, Grupo Antolin Ingenieria S. A., within the framework of the MAGNO2008 - 1028.- CENIT. Project also funded by the MICINN, the Spanish Ministry of Science and Innovation (PID 560300-2009-11) and the Regional Government of Castile-Leon (CCTT/10/BU/0002). This work was also supported in the framework of the IT4Innovations Centre of Excellence project, reg. no. (CZ.1.05/1.1.00/02.0070) supported by the Operational Program 'Research and Development for Innovations' funded through the Structural Funds of the European Union and the state budget of the Czech Republic.This is a pre-copyedited, author-produced PDF of an article accepted for publication in Logic Journal of the IGPL following peer review. The version of record: Javier Sedano, Silvia González, Álvaro Herrero, Bruno Baruque, and Emilio Corchado, Mutating network scans for the assessment of supervised classifier ensembles, Logic Jnl IGPL, first published online September 3, 2012, doi:10.1093/jigpal/jzs037 is available online at: http://jigpal.oxfordjournals.org/content/early/2012/09/03/jigpal.jzs03
    corecore