Filters








1,927 Hits in 4.4 sec

Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3 [article]

Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer
2017 arXiv   pre-print
Six teams acted as attackers in a security competition leveraging an ICS testbed, with several academic defense systems attempting to detect the ongoing attacks.  ...  We conclude the paper with an evaluation and discussion of the S3, including statistics derived from the data collected in each phase of S3.  ...  SYN flooding is a Denial-of-Service (DoS) attack, where the attacker (the client) continuously try to establish a TCP connection, sending a SYN request to the Ethernet/IP server, the Ethernet/IP server  ... 
arXiv:1702.03067v1 fatcat:cdyry7wizrhhbitmrtce5cqq2m

Web-Ice: integrated data collection and analysis for macromolecular crystallography

A. González, P. Moorhead, S. E. McPhillips, J. Song, K. Sharp, J. R. Taylor, P. D. Adams, N. K. Sauter, S. M. Soltis
2008 Journal of Applied Crystallography  
Blu-Ice,DCSS) to trigger data analysis automatically.  ...  needed for high-throughput procedures, including the selection of the best crystals from a large sample pool, and the calculation of optimal data collection parameters to assure complete spot coverage with  ...  Interaction with the beamline control software Web-Ice can function in three different modes depending on the level of interaction established with the beamline controls.  ... 
doi:10.1107/s0021889807057822 fatcat:gap2l35uxbaglfywf3im7ubizq

ANTS - A Framework for Knowledge Based NAT Traversal

Andreas Muller, Andreas Klenk, Georg Carle
2009 GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference  
Finally, we compare the framework to ICE showing that ANTS is not only more flexible, but also faster due to the decoupled connectivity checks.  ...  The core idea of ANTS is to use previously acquired knowledge about NAT behavior and services for setting up new connections.  ...  Comparing the overall connection setup time of ANTS and ICE. ANTS ICE: 1 Candidate ICE: 2 Candidates ICE: 3 Candidates Conn.  ... 
doi:10.1109/glocom.2009.5425449 dblp:conf/globecom/MullerKC09 fatcat:4fdyhfmn2vdd7d7la23ymgi7xy

A New State-Based Connectivity Model for Peer-to-Peer Networks

Halil ARSLAN, Sinan TÜNCEL
2016 IEICE transactions on information and systems  
Among the solutions proposed for this problem, Interactive Connectivity Establishment (ICE) and Real Time Media Flow Protocol (RTMFP) are the methods most preferred in the literature.  ...  The performance of the designed method was evaluated against three criteria, connectivity check delay, connection packet count and bandwidth, and compared with the ICE method.  ...  In order to overcome problems that appear in protocols like STUN and TURN, Rosenberg defined the "Interactive Connectivity Establishment" (ICE) protocol [13] .  ... 
doi:10.1587/transinf.2015edp7220 fatcat:jbkvaez7yvg5taugldb3zizzqy

Post sockets: Towards an evolvable network transport interface

Brian Trammell, Colin Perkins, Mirja Kuhlewind
2017 2017 IFIP Networking Conference (IFIP Networking) and Workshops  
of Candidate Paths that can potentially be used to establish a connection.  ...  If there are multiple candidates with the same priority, then transient establishment proceeds simultaneously and uses the transient that wins the race to be established.  ... 
doi:10.23919/ifipnetworking.2017.8264874 dblp:conf/networking/TrammellPK17 fatcat:x5c5pw7rurgmbfcfk2erjpx4ai

Behavior and classification of NAT devices and implications for NAT traversal

A. Muller, G. Carle, A. Klenk
2008 IEEE Network  
The Interactive Connectivity Establishment (ICE) framework is categorized and a new framework is introduced that addresses scenarios that are not supported by ICE.  ...  Network Address Translation devices (NAT) emerged to help with the limited availability of IP addresses and were designed with the hypothesis of asymmetric connection establishment in mind.  ...  The Interactive Connectivity Establishment (ICE) [9] is under standardization by the IETF and strives to combine several techniques into a framework flexible enough to work with all network topologies  ... 
doi:10.1109/mnet.2008.4626227 fatcat:j5tqgli2wrgwhgymyr7olrkwma

Challenge and solutions of NAT traversal for ubiquitous and pervasive applications on the Internet

Yaw-Chung Chen, Wen-Kang Jia
2009 Journal of Systems and Software  
How do the ubiquitous and pervasive applications coexist with NAT and interoperate with each other?  ...  All questions pointed to redesign a new NAT framework with a major change to accommodate NAT problems all at once.  ...  (Interactive Connectivity Establishment) , Path-coupled signaling (Martin et al., 2005) , etc.  ... 
doi:10.1016/j.jss.2009.03.078 fatcat:ylpambjz2nhldgvgz6jd6hzfti

Raising The Datagram Api To Support Transport Protocol Evolution

Tom Jones, Gorry Fairhurst, Colin Perkins
2017 Zenodo  
This new API is needed to move forward the base of the system, allowing developers with limited resources to evolve their applications while accessing new Internet functions and network services.  ...  Connectivity Establishment (ICE) algorithm [11] to categorise network impediments and systematically probe connectivity, and a relayed signalling protocol to rendezvous with the remote host and exchange  ...  candidate addresses for connectivity.  ... 
doi:10.5281/zenodo.1220638 fatcat:jaaqsb3m5nfyjksg2rqzhk52ue

Raising the datagram API to support transport protocol evolution

Tom Jones, Gorry Fairhurst, Colin Perkins
2017 2017 IFIP Networking Conference (IFIP Networking) and Workshops  
This new API is needed to move forward the base of the system, allowing developers with limited resources to evolve their applications while accessing new network services.  ...  Connectivity Establishment (ICE) algorithm [11] to categorise network impediments and systematically probe connectivity, and a relayed signalling protocol to rendezvous with the remote host and exchange  ...  candidate addresses for connectivity.  ... 
doi:10.23919/ifipnetworking.2017.8264870 dblp:conf/networking/JonesFP17 fatcat:w2du2gapdzh5nj75qz5cy4o2em

NAT-Compatibility Testbed: An Environment to Automatically Verify Direct Connection Rate

Cheng-Yuan Ho, Fu-Yu Wang, Chien-Chao Tseng, Ying-Dar Lin
2011 IEEE Communications Letters  
It measures the DCR of ICE, KeyStone, and PJNATH as 53.7%, 59.87%, and 50.93%, respectively.  ...  Experimental results show that asymmetric and unexpected direct connectivity check results occur in the real Internet.  ...  Interactive Connectivity Establishment (ICE) [5] makes use of both STUN and TURN for any two peers to discover and exchange three candidate transport addresses including host (itself), mapped (on the  ... 
doi:10.1109/lcomm.2010.102810.101700 fatcat:vua653mdpjfbtblyzdtde3rpli

Final Version Of Core Transport System

Naeem Khademi, Zdravko Bozakov, Anna Brunstrom, Øystein Dale, Dragana Damjanovic, Kristian Riktor Evensen, Gorry Fairhurst, Andreas Fischer, Karl-Johan Grinnemo, Tom Jones, Simone Mangiante, Andreas Petlund (+6 others)
2017 Zenodo  
The document describes the components necessary to realise the basic Transport Services provided by the NEAT User API, with the description of a set of NEAT building blocks and their related design choices  ...  The design of this core transport system, which is the final product of Work Package 2, is driven by the Transport Services and API design from Task 1.4, and in close coordination with the overall NEAT  ...  The communication to set up a peer connection includes the gathering of ICE candidates, their exchange with the remote peer and 54 of 131 Project no. 644334 D2.3 Final Version of Core Transport System  ... 
doi:10.5281/zenodo.1216124 fatcat:ekzx6nrsd5h7vedrne3rlv27ba

Core Transport System, With Both Low-Level And High-Level Components

Naeem Khademi, Zdravko Bozakov, Anna Brunstrom, Øystein Dale, Dragana Damjanovic, Kristian Riktor Evensen, Gorry Fairhurst, Karl-Johan Grinnemo, Tom Jones, Simone Mangiante, Andreas Petlund, David Ros (+4 others)
2017 Zenodo  
The design of this core transport system takes into consideration the Transport Services and the API (defined in Task 1.3) and in close coordination with the overall architecture (Task 1.2).  ...  The document describes the components necessary to realise the basic Transport Services provided by the NEAT User API, with the description of a set of NEAT building blocks and their related design choices  ...  Note With precedence 1, NEAT may still attempt to establish an unencrypted connection.  ... 
doi:10.5281/zenodo.1216117 fatcat:2gitsj2bajeh7fqnze6ezr6ylm

Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks

Alexandros Fakis, Georgios Karopoulos, Georgios Kambourakis
2020 Future Internet  
This means that users behind, say, Network Address Translation (NAT) or firewalls normally rely on the Interactive Connectivity Establishment (ICE) framework for the sake of negotiating information about  ...  To establish peer-to-peer connections and achieve real-time web-based communication, the Web Real-Time Communication (WebRTC) framework requires address information of the communicating peers.  ...  There are three types of candidates: 1. Host Candidate: Contains the private IP address and local UDP and TCP ports which are associated with the user's local interface.  ... 
doi:10.3390/fi12050092 fatcat:kwutkzyqmrcdbgaz26eswgkavu

Can: A context-aware NAT traversal scheme

Chien-Chao Tseng, Chia-Liang Lin, Li-Hsing Yen, Jyun-Yan Liu, Cheng-Yuan Ho
2013 Journal of Network and Computer Applications  
We have implemented CAN and conducted extensive experiments with off-the-shelf NAT devices to compare the performance of CAN with Interactivity Connectivity Establishment (ICE), the most acknowledged approach  ...  Experimental results show that CAN outperforms ICE in terms of direct communication ratio, connectivity check delay and message overload when checking connectivity.  ...  The Internet Engineering Task Force (IETF) proposed Interactive Connectivity Establishment (ICE) (Rosenberg, 2010; Maenpaa et al., 2010) to provide NAT traversal capabilities for session-oriented protocol  ... 
doi:10.1016/j.jnca.2013.02.001 fatcat:eswgodo435c77ffe57j2tzywxy

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring

Koji NAKAO, Daisuke INOUE, Masashi ETO, Katsunari YOSHIOKA
2009 IEICE transactions on information and systems  
Basically, it is capable of managing the incident candidate (IC) alerts issued by the several analyzers in the MacS and MicS so that the operators can recognize the possible/assumed incidents as candidates  ...  ( 2 ) 2 Triggered by the IC alert, the correlation manager queries the MacS for packet data connected to the IC alert (namely, all packet data from the attacking host in certain period of time).(3)  ...  He is also an active member of Japan ISMS user group, which was established in the 1st Quarter of 2004.  ... 
doi:10.1587/transinf.e92.d.787 fatcat:gyjnbjwbqjhgjk2giajwxtrnmi
« Previous Showing results 1 — 15 out of 1,927 results