By Topic

International Conference on Internet Surveillance and Protection (ICISP’06)

Date 26-29 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 38
  • International Conference on Internet Surveillance and Protection - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (428 KB)
    Freely Available from IEEE
  • International Conference on Internet Surveillance and Protection - Title

    Publication Year: 2006, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • International Conference on Internet Surveillance and Protection - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • International Conference on Internet Surveillance and Protection - TOC

    Publication Year: 2006, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (61 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s):xix - xxii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Monitoring of SIP-Based Communication Using Signalling Information for Performance Measurements

    Publication Year: 2006, Page(s): 1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    This paper presents a prototype implementation of end-to-end monitoring of performance parameters in SIP-based communication. The approach is to integrate signalling information and measurements of user data traffic. Test measurements illustrate some results that can be obtained per session; packet loss, round-trip delays and their variation, inter-arrival jitter and throughput View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VIP Bridge: Integrating Several Sensor Networks into One Virtual Sensor Network

    Publication Year: 2006, Page(s): 2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Some applications need to collect information from several different sensor networks to provide comprehensive services. In order to simplify the complexity of dealing with heterogeneous sensor networks, a uniform interface should be provided for users. This paper describes a novel approach to integrate these different sensor networks into one virtual sensor network. Users can easily query data thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement Based Approach of Congestion Control for Enforcing a Robust QoS in the Inter

    Publication Year: 2006, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    How to provide quality of service (QoS), has been a major issue for the Internet for the past decade. But, recent monitoring projects showed that Internet traffic exhibited large variations, and non-stationary traffic, making difficult to guarantee a stable and robust QoS. The objective of this paper is then to guaranty a robust QoS which means providing the requested QoS under all circumstances, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring & Forensic Analysis forWireless Networks

    Publication Year: 2006, Page(s): 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    This paper describes FLUX: "A network forensic time machine". Operating like a surveillance camera, FLUX is an infrastructure for capturing and analyzing packets traversing the network. The 'time machine' term relates to the amount of dedicated storage to evidentiary data which can be forensic ally analyzed. The purpose of FLUX is to build intelligence about network usage, uncover anomalous traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of a Multi-Queue Web Caching Scheme that Differentiates the Content-Type of Documents

    Publication Year: 2006, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    This work presents a caching scheme that differentiates the content-type of the documents and uses a different queue for each of them. In that way, the replacement policy that better performance is achieved for each content-type and cache size can be applied. We evaluate by means of simulation the performance of the LRU, LFU-DA, GDSF and GD* replacement policies in the classical caching scheme wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complementary Visualization of perfSONAR Network Performance Measurements

    Publication Year: 2006, Page(s): 6
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Research backbone networks are currently used by a variety of scientists and research projects interested in maximizing the benefit they receive in using the networks. Therefore, it is highly desirable for them to get access to network performance monitoring data which is prepared to serve their needs. The perfSONAR measurement framework, which is jointly developed by the EU-funded GN2 JRA1 projec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Internet Traffic: Performance Limits

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    Traffic modeling is an important tool for performance evaluation of networks. Over the last decade traffic characterization studies revealed the presence of different types of correlations in Internet traffic. In this paper we present traffic modeling methodology by aggregates of bytes using the M/G/infin process for capturing traffic correlations. We use recent traffic traces to construct M/G/inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Evaluation of an Overload Control System for Crisis-RelatedWeb Server Systems

    Publication Year: 2006, Page(s): 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    During recent years we have seen several large-scale crises. The 9/11 terror attacks, tsunamis, storms, floods and bombings have all caused a great deal of damage. A common factor in these crises has been the need for information and one important source of information is usually Web sites. In this work we investigate and design an overload control system for Web sites that are vital in crises. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Interaction of IGP Weight Optimization with BGP

    Publication Year: 2006, Page(s): 9
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Link weight optimization is shown to be a key issue in engineering of IGPs using shortest path first routing. The IGP weight optimization problem seeks a weight array resulting an optimal load distribution in the network based on the topology information and a traffic demand matrix. Several solution methods for various kinds of this problem have been proposed in the literature. However, the intera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public Domain P2P File-Sharing Networks Measurements and Modeling

    Publication Year: 2006, Page(s): 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Since P2P file-sharing networks became extremely popular between Internet users, many researchers have tried to model those P2P networks. This article deals with the modeling of public domain P2P file-sharing networks in terms of some parameters such as their number of users and the number of files inside them along the time. To do so, we have been measuring five public P2P file-sharing networks (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overload Protection in a SIP Signaling Network

    Publication Year: 2006, Page(s): 11
    Cited by:  Papers (18)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    The paper studies performance of a SIP signaling network in an overload condition. The main interest is to find a preferable queuing structure of a SIP proxy server to protect from performance degradation. In the study, two types of queuing structure, which are a simple single FIFO queue and a two class priority queue, are considered. Using the network simulator (ns-2), the paper evaluates a throu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of the Current Telecommunications Networks and the Next Generation Optical Networks

    Publication Year: 2006, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    During the years between 1995 and 2000, there had been a strong competition between IP and ATM. MPLS that was approved by IETF in 1997, seems to end this competition with combination of best features of IP and ATM. MPLmS that is the equivalent of MPLS in optical networks, was designed in 1999. Afterwards, a new version of MPLmS, that is to say GMPLS, was developed in 2000 by IETF. Routing and sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Initial Results from an IPv6 Darknet13

    Publication Year: 2006, Page(s): 13
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB) | HTML iconHTML

    A darknet is an advertised and routed portion of Internet address space that contains no advertised services. Any traffic observed on a darknet is therefore illegitimate and darknets are useful tools for observing the level of background 'noise' on a larger network. Darknets have been used in existing IPv4 networks to help to identify malicious traffic, malware trends, or the consequences of misco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic Analysis of a Congested Link

    Publication Year: 2006, Page(s): 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (573 KB) | HTML iconHTML

    While networks capacities are usually planned to cope with the offered traffic, transient link overloads may occur due to link failures or traffic peaks. According to previous analytical and simulation studies, performance degradation is relatively slow at moderate overloads. The reason is the high variance of the current flow size distribution. We check here these results on a traffic capture. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flow-Based Identification of P2P Heavy-Hitters

    Publication Year: 2006, Page(s): 15
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    One major new and often not welcome source of Internet traffic is P2P filesharing traffic. Banning P2P usage is not always possible or enforcible, especially in a university environment. A more restrained approach allows P2P usage, but limits the available bandwidth. This approach fails when users start to use non-default ports for the client software. We have developed the PeerTracker algorithm t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crawler Detection: A Bayesian Approach

    Publication Year: 2006, Page(s): 16
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    In this paper, we introduce a probabilistic modeling approach for addressing the problem of Web robot detection from Web-server access logs. More specifically, we construct a Bayesian network that classifies automatically access-log sessions as being crawler- or human-induced, by combining various pieces of evidence proven to characterize crawler and human behavior. Our approach uses machine learn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Power-Law of the Internet and the Prediction of BGP Convergence

    Publication Year: 2006, Page(s): 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Border gateway protocol (BGP) is the de facto inter-domain routing protocol. With the rapid development of Internet, the convergence problem of BGP attracts more attention, which is an inborn limitation for path vector routing protocol. But previous work can't give a definite and comprehensive answer to it. This paper presents a new BGP convergence model and analyzes the convergence delay bounds o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Challenges and Approaches for P2P File-Sharing Systems

    Publication Year: 2006, Page(s): 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University of Washington campus network found that file-sharing accounted for more than treble the volume of Web... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol

    Publication Year: 2006, Page(s): 19
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Although spanning-tree protocol (STP) is widely used in switching networks today, it is not until recently that its security performance is studied by researchers. In this paper, the problem of attacks to STP is addressed. The paper proposes a novel solution that partitions a STP network into two tier of switching networks. The reason of the partitioning is to hide the STP operation of the network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.