20 research outputs found

    Quality of Service and Service Provisioning on a Competitive Market

    Get PDF
    The objective of this paper is to provide an economic and commercial context for QoS research in open distributed environments. The analyses are based on a telecommunications value chain model. The model is used to define possible roles for telecommunications companies, migrating from traditional telephony network operators towards privatised ICT companies in a new economy. Based on these developments, we advocate R&D activities aiming at standardised concepts and engineering principles to establish and control QoS in open distributed environments

    Collecting Contextual Information About a DDoS Attack Event Using Google Alerts

    Get PDF
    Distributed Denial of Service (DDoS) attacks may lead to massive economic damages to victims. In most cases, the damage caused is dictated by the circumstances surrounding the attack (i.e. context). One of the ways of collecting information on the context of an attack can be by using the online articles written about the attack. In this poster, we introduce a dataset collected using Google Alerts that provides contextual information related DDoS attacks. The goal of the poster is to invite other researchers for collaboratio

    Assessing Network Operator Actions to Enhance Digital Sovereignty and Strengthen Network Resilience:A Longitudinal Analysis during the Russia-Ukraine Conflict

    Get PDF
    We conduct longitudinal and temporal analyses on active DNS measurement data to investigate how the Russia-Ukraine conflict impacted the network infrastructures supporting domain names under ICANN’s CZDS new gTLDs. Our findings revealed changes in the physical locations of network infrastructures, utilization of managed DNS services, infrastructure redundancy, and distribution, which started right after the first reported Russian military movements in February 2022. We also found that domains from different countries had varying location preferences when moving their hosting infrastructure. These observed changes suggest that network operators took proactive measures in anticipation of an armed conflict to promote resilience and protect the sovereignty of their networks in response to the conflict

    Measuring Malware Detection Capability for Security Decision Making

    Get PDF
    Organizations face an urgent need to bolster their cybersecurity defenses against the rising threat of ransomware. Implementing advanced antivirus and antimalware tools is crucial for proactive identification and mitigation of malicious software. However, adversaries constantly refine malware to evade detection increasing the complexity of the threat. Hence, developing an effective strategy is nontrivial. To address this challenge, this study conducts various analyses on scan results of publicly shared malware samples. Utilizing metadata from 635K samples sourced from MalwareBazaar and scan results from VirusTotal, we assign family labels using AVClass. Additionally, we examinea 90-day longitudinal dataset alongside the main dataset. Our findings demonstrate that while over 60% of scanner engines detect 67% of samples, certain malware families consistently exhibit lower detection rates. Detection capability improves over time, particularly within the initial 30 days, but remainsinadequate for specific families. Furthermore, we observe that some scanner engines demonstrate nearly flawless detection capability across all malware families, while the majority struggle with efficiently detecting certain types. Moreover, we performed Monte Carlo simulations and revealed that employing multiple scanner engines substantially enhances detection capability, with 3 to 7 scanners being optimal. Finally, simulation analysis in a case study highlights thesignificant impact of hard-to-detect malware on risk and performance, underscoring the importance of effective malware strategies

    Análisis de las decisiones de inversión y de financiación en la empresa

    Get PDF
    S'analitza algunes de les més importants decisions dins del marc de la funció financera de l'empresa, que engloba el conjunt de decisions que pren el responsable financer i que presenta dos vessants d'una banda, les decisions d'inversió i per l'altra, les decisions de finançamentSe analiza algunas de las más importantes decisiones en el marco de la función financiera de la empresa, que engloba el conjunto de decisiones que toma el responsable financiero y que presenta dos opciones de una parte, las decisiones de inversión y por otra, las decisiones de financiació

    El pensar del alma: un regalo de la madre

    Get PDF
    No puedo evitar, al plantearme una conferencia en el seminario de Duoda, una reflexión sobre las atribuciones ideológicas -ideológicas, sí- que se hacen a quienes en él colaboran. Digo ideológicas por cuanto, si bien todo pensamiento o todo discurso es un sistema de ideas y el mío por supuesto lo será o tratará de serlo, también se usa este adjetivo para totalizar en uno sólo cualquier sistema de ideas que quiera expresar un pensamiento. Mi primera reflexión pues, es la de que mi intento de sistematizar mis ideas en torno a ese materno tema del Gratis et amare, se produce en una práctica de libertad de pensar, que poco a poco y no sin dificultad, he ido construyéndome a lo largo de mi experiencia personal y profesional, en distintos espacios institucionales y sociales, entre Jos cuajes se ha podido contar éste de Ouoda

    Protocols for Multimedia Systems: 6th International Conference, PROMS 2001 Enschede, The Netherlands, October 17–19, 2001 Proceedings

    No full text
    The goal of the PROMS series of conferences and workshops is to contribute to scientific, strategic, and practical cooperation between research institutes and industrial companies in the area of multimedia protocols. This is also the goal of PROMS 2001. The basic theme of this conference continues to be multimedia protocols, both at the network and application level, although the increasing interest in wireless, mobility, and quality-of-service as interrelated topics with relevance to multimedia are reflected in the current program. The papers are grouped as follows in sessions for the single track technical program: (1) QoS in the Internet, (2) Multimedia streaming, (3) Multimedia multicast, (4) Wireless networks and host mobility, (5) TCP/IP optimization, and (6) Service development and deployment. The technical program is complemented with two invited presentations: "From Mars to Your TV at Home - Selected Internet Developments" by Erik Huizer and "Which Way to the Wireless Internet?" by Andrew Campbell

    Second generation micropayment systems: lessons learned

    Get PDF
    In the next years the market for low value products such as online music and videos and the role of micropayment systems for selling such products are expected to grow substantially. The first generation micropayment systems appeared around 1994, with systems such as eCash, MilliCent and CyberCoin. These systems were unable to gain market share, however, and disappeared slowly in the late 1990s. The second generation micropayment systems appeared around 1999-2000, and are still operational. In this paper we present an overview of first and second generation micropayment systems, and compare their key characteristics to determine their success or failure. This paper explains why the first generation systems failed and concludes that second generation systems have a better chance for success than their predecessors
    corecore