475 Hits in 3.9 sec

Internet Infrastructure Security

Jose Nazario, John Kristoff
2012 IEEE Security and Privacy  
their support and guidance from start to finish.  ...  Thanks also to IEEE Security & Privacy editor in chief John Viega for creating this special issue and to Jennifer Stout, Tara Delaney, and the entire IEEE Computer Society Editorial Services staff for  ...  Eventual deployment is likely to pose numerous security and operational challenges yet to be discovered. Two articles in this issue examine IPv6 features from a security perspective.  ... 
doi:10.1109/msp.2012.99 fatcat:gfacgxxvbfgufjegkrbpt2vmla

The 4th workshop on active internet measurements (AIMS-4) report

kc claffy
2012 Computer communication review  
This year we continued to focus on how measurement can illuminate two specific public policy concerns: IPv6 deployment and broadband performance.  ...  to promote cooperative solutions and coordinated strategies to address future data needs of the network and security operations and research communities.  ...  The workshop was supported by the National Science Foundation via grants CNS-0958547 and OCI-0963073, and by the U.S.  ... 
doi:10.1145/2317307.2317315 fatcat:s6o65nye7rahfh5hjsv6cueoja

From Zero to Hero: How Zero-Rating Became a Debate about Human Rights

Linnet Taylor
2016 IEEE Internet Computing  
Acknowledgments Acknowledgment We thank Yasodara Córdova for her valuable insights and suggestions.  ...  Acknowledgment This work was funded by the US National Security Agency and US National Science Foundation through grant IIS-1451172.  ...  and analysis of IPv6 topology.  ... 
doi:10.1109/mic.2016.88 fatcat:imrhaaoac5gifool7wjegaxl5q

Where is the Internet heading to?

Olivier Martin
2010 Journal of Physics, Conference Series  
A review of the state of the Internet in terms of traffic and services trends covering both the Research and Education and the Commercial Internet will first be given.  ...  The problematic behind the IPv4 to IPv6 migration will be explained shortly, a short review of the ongoing efforts to re-design the Internet in a clean-slate approach will then be made.  ...  IPv6 only nodes were not only real but also critical to the graceful deployment of IPv6.  ... 
doi:10.1088/1742-6596/219/6/062019 fatcat:iyv2gtyw7fd6ze76p3mnr6msoa

A survey of anti-spam mechanisms and their usage from a Regional Internet Registry's perspective

Amreesh Phokeer, Alain Aina
2016 2016 IST-Africa Week Conference  
The paper starts with describing the challenges faced by operators followed by the different sources of spam.  ...  This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures.  ...  for Network Service Providers Most of the challenges that service providers face with regards to spam are the same around the world.  ... 
doi:10.1109/istafrica.2016.7530604 fatcat:m6idjodnwzfapl7jl7olx5jjfy

Future applications and middleware, and their impact on the infrastructure

Brian E. Carpenter
2003 Future generations computer systems  
On the way, it has encountered a series of technical and external challenges that have created some barriers to further development.  ...  The Internet today has progressed from being "just a network" through phases as a human communications mechanism and an unrivalled information system to the mere beginning of being a true services network  ...  Acknowledgements Useful comments on this paper were made by François Flückiger and Philippe Janson.  ... 
doi:10.1016/s0167-739x(02)00145-0 fatcat:tes6agfu75czbnsfo4p2sbd6ye

Header of death: security implications of IPv6 extension headers to the open-source firewall

Anazel P. Gamilla, Marlon A. Naagas
2022 Bulletin of Electrical Engineering and Informatics  
IPv6 extension headers (EHs) contain additional information utilized by network devices (such as routers and firewalls) to determine how to direct or process an IPv6 packet.  ...  The common vulnerability scoring system (CVSS) also indicates that the base, temporal, and environment metric groups of IPv6 EHs vulnerabilities were in the critical level of severity.  ...  ACKNOWLEDGEMENTS The authors would like to acknowledge and thank the Central Luzon State University and PCARI PRIME Project for allowing us to use their network equipment and to use their network infrastructure  ... 
doi:10.11591/eei.v11i1.3446 fatcat:hb6lrz6ogffb7dk7kapg4evaw4

Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles [chapter]

Miika Komu, Sasu Tarkoma, Andrey Lukyanenko
2012 Lecture Notes in Computer Science  
We focus on email spam prevention as our use case and how to integrate HIP into SMTP server software.  ...  We present a theoretical framework for investigating scalability and effectiveness of the proposal, and also describe practical experiences with a HIP implementation.  ...  Host Identity Tag (HIT) is an IPv6 address derived directly from the HI by hashing and concatenation.  ... 
doi:10.1007/978-3-642-27937-9_3 fatcat:r7a3ugvvjrbqhbrzwscbfbxhtu

Building IPv6 based tunneling mechanisms for VoIP security

Amzari J. Ghazali, Waleed Al-Nuaimy, Ali Al-Ataby, Majid A. Al-Taee
2016 2016 13th International Multi-Conference on Systems, Signals & Devices (SSD)  
Internet protocol version 6 (IPv6) was developed to resolve the IPv4 address exhaustion problem and support new features.  ...  Secure VoIP-oriented mechanisms on VPN IPv6 have been designed, implemented and tested successfully using open source approaches.  ...  Despite the benefits of using IPv6, there are still challenges and obstacles in implementing and practically using IPv6 VoIP [5] .  ... 
doi:10.1109/ssd.2016.7473737 dblp:conf/IEEEssd/GhazaliAAA16 fatcat:uijke3t73zgrfpxidsjiikclvq

Building rural wireless networks

David Lloyd Johnson, Kobus Roux
2008 Proceedings of the 2008 ACM workshop on Wireless networks and systems for developing regions - WiNS-DR '08  
The paper presents pilot deployments of low-cost wireless rural networks in South Africa and Zambia that are showing very encouraging results in which houses, schools and clinics are connected on shoestring  ...  Some key areas for future development are also discussed such the use of IPv6, power saving mechanisms for battery operated routers, and support for real-time flow over mesh networks.  ...  All Unix based operating systems offer full support for IPv6 but Windows only offers partial IPv6 support on Windows XP (DNS does not function in IPv6) and full support on Windows Vista.  ... 
doi:10.1145/1410064.1410068 dblp:conf/mobicom/JohnsonR08 fatcat:476o6zfcarayrf5xnxkgpkgxwi

Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones

Kevin Borgolte, Shuang Hao, Tobias Fiebig, Giovanni Vigna
2018 2018 IEEE Symposium on Security and Privacy (SP)  
However, the IPv4 address space is exhausted, and a switch to IPv6, the only accepted long-term solution, is inevitable.  ...  Furthermore, from our analysis of the differences between accessing dual-stack hosts via IPv6 and IPv4, we hypothesize that the root cause is that machines automatically and by default take on globally  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1109/sp.2018.00027 dblp:conf/sp/BorgolteHFV18 fatcat:cvxznngoondlbenf64fonkkkmu

In rDNS We Trust: Revisiting a Common Data-Source's Reliability [chapter]

Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna, Anja Feldmann
2018 Lecture Notes in Computer Science  
While highlighting opportunities for future research, we find no immediate challenges to the use of rDNS as active and passive data-source for Internet measurement research.  ...  However, existing work is polarized on its reliability, and new techniques to collect active IPv6 datasets have not yet been sufficiently evaluated.  ...  N00014-15-1-2948, the National Science Foundation (NSF) under grant DGE-1623246 and CNS-1704253, and a Google Security, Privacy and Anti-Abuse Award to Giovanni Vigna.  ... 
doi:10.1007/978-3-319-76481-8_10 fatcat:fo54jo2vejcsrnd6beeakhyxxq

A data quarantine model to secure data in edge computing

Poornima Mahadevappa, Raja Kumar Murugesan
2022 International Journal of Power Electronics and Drive Systems (IJPEDS)  
Gaining centralized control over the edge nodes can be challenging due to security issues and threats.  ...  Further intensification of the attack makes it challenging to mitigate and identify the root cause.  ...  The data analysis includes task deployment defined as a mobile agent and deployed dynamically on the edge nodes.  ... 
doi:10.11591/ijece.v12i3.pp3309-3319 fatcat:xrm6aja2wra3xiwqsnzewnxizy

Flow-Based Network Management: A Report from the IRTF NMRG Workshop

Ricardo de O. Schmidt, Ramin Sadre, Luuk Hendriks
2016 Journal of Network and Systems Management  
Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level traffic measurements for network management.  ...  the original author(s) and source are credited.  ...  Acknowledgements This report was partially supported by the Self-managing Anycast Networks for DNS project ( and by the EU FP7 Mobile Cloud Networking project (#318109).  ... 
doi:10.1007/s10922-016-9365-0 fatcat:jq6whuvwknb4bcvmkus5qbhqrm

Study of Security Issues in Pervasive Environment of Next Generation Internet of Things [article]

Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki
2014 arXiv   pre-print
The network has to be transformed to IPv6 enabled network to address huge number of smart objects. Thus new addressing schemes come up with new attacks.  ...  This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant.  ...  Two of the main security issues in the IoT are privacy and confidentiality. Because of the scale of deployment and mobility, the cloud of "things" is hard to control.  ... 
arXiv:1406.4941v1 fatcat:a3oydi4od5cildrsqzkgdriogi
« Previous Showing results 1 — 15 out of 475 results