By Topic

IEEE Communications Magazine

Issue 7 • 2017

Filter Results

Displaying Results 1 - 25 of 48
  • Front cover

    Publication Year: 2017, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2194 KB)
    Freely Available from IEEE
  • Cover 2

    Publication Year: 2017, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (754 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (310 KB)
    Freely Available from IEEE
  • Spectrum Enterprise

    Publication Year: 2017, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (567 KB)
    Freely Available from IEEE
  • The President's Page

    Publication Year: 2017, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • Interconnections for computer communications and packet networks (rojas-cessa, r.) [book review]

    Publication Year: 2017, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (327 KB)
    Freely Available from IEEE
  • Global Communications Newsletter

    Publication Year: 2017, Page(s):7 - 10
    Request permission for commercial reuse | PDF file iconPDF (2248 KB)
    Freely Available from IEEE
  • Conference Calendar

    Publication Year: 2017, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Traffic Measurements for Cyber Security

    Publication Year: 2017, Page(s):12 - 13
    Request permission for commercial reuse | PDF file iconPDF (1954 KB)
    Freely Available from IEEE
  • Demystifying DDoS as a Service

    Publication Year: 2017, Page(s):14 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB)

    In recent years, we have observed a resurgence of DDoS attacks. These attacks often exploit vulnerable servers (e.g., DNS and NTP) to produce large amounts of traffic with little effort. However, we have also observed the appearance of application-level DDoS attacks, which leverage corner cases in the logic of an application in order to severely reduce the availability of the provided service. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels

    Publication Year: 2017, Page(s):22 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB)

    Cybercriminals deploy botnets for conducting nefarious operations on the Internet. Botnets are managed on a large scale and harness the power of compromised machines, which are controlled through centralized portals known as C&C panels. C&C panels are considered as attackers' primary operating environment through which bots are controlled and updated at regular intervals of time. C&C panels also s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic-Aware Patching for Cyber Security in Mobile IoT

    Publication Year: 2017, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1077 KB)

    The various types of communication technologies and mobility features in IoT on one hand enable fruitful and attractive applications, but on the other hand facilitate malware propagation, thereby raising new challenges in handling IoT-empowered malware for cyber security. Compared to the malware propagation control scheme in traditional wireless networks, where nodes can be directly repaired and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the HTTPS Trust Landscape: A Passive View from the Edge

    Publication Year: 2017, Page(s):36 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    Our society increasingly relies on web-based services like online banking, shopping, and socializing. Many of these services heavily depend on secure end-to-end transactions to transfer personal, financial, and other sensitive information. At the core of ensuring secure transactions are the HTTPS protocol and the "trust" relationships between many involved parties, including users, browsers, serve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable Traffic Sampling Using Centrality Measure on Software-Defined Networks

    Publication Year: 2017, Page(s):43 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB)

    With regard to cyber security, pervasive traffic visibility is one of the most essential functionalities for complex network systems. A traditional network system has limited access to core and edge switches on the network; on the other hand, SDN technology can provide flexible and programmable network management operations. In this article, we consider the practical problem concerning how to achi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?

    Publication Year: 2017, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB)

    Large network security companies often report websites, called Booters, that offer DDoS attacks as a paid service as the primary reason for the increase in occurrence and power of attacks. Although hundreds of active Booters exist today, only a handful of those that promoted massive attacks faced mitigation and prosecution actions. In this tutorial article we focus our attention on Booters that ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comsoc Membership

    Publication Year: 2017, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (525 KB)
    Freely Available from IEEE
  • Measuring the Energy Consumption of Cyber Security

    Publication Year: 2017, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB)

    The Internet is a core tool for developing commercial and social relationships. As a consequence, cyber security must be properly assessed, for instance, to face new and sophisticated threats. To deliver large-scale services, proper countermeasures characterized by a non-negligible energetic impact have to be pursued. From this perspective, this article proposes to investigate the energy required ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Understanding the Existence of a Deep Torrent

    Publication Year: 2017, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Nowadays, a great part of Internet content is not reachable from search engines. Studying the nature of these contents from a cyber security perspective is of high interest, as they could be part of many malware distribution processes, child pornography or copyrighted material exchange, botnet command and control messages, and so on. Although the research community has put a lot of effort into thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Stream-Based IP Flow Analysis

    Publication Year: 2017, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (554 KB)

    Analyzing IP flows is an essential part of traffic measurement for cyber security. Based on information from IP flows, it is possible to discover the majority of concurrent cyber threats in highspeed, large-scale networks. Some major prevailing challenges for IP flow analysis include, but are not limited to, analysis over a large volume of IP flows, scalability issues, and detecting cyber threats ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE-SA

    Publication Year: 2017, Page(s):77 - 7
    Request permission for commercial reuse | PDF file iconPDF (583 KB)
    Freely Available from IEEE
  • Software-Defined Vehicular Networks: Architecture, Algorithms, and Applications: Part 1

    Publication Year: 2017, Page(s):78 - 79
    Request permission for commercial reuse | PDF file iconPDF (675 KB)
    Freely Available from IEEE
  • An Architecture for Hierarchical Software-Defined Vehicular Networks

    Publication Year: 2017, Page(s):80 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB)

    With the recent advances in the telecommunications and auto industries, we have witnessed growing interest in ITS, of which VANETs are an essential component. SDN can bring advantages to ITS through its ability to provide flexibility and programmability to networks through a logically centralized controller entity that has a comprehensive view of the network. However, as the SDN paradigm initially... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 5G Software Defined Vehicular Networks

    Publication Year: 2017, Page(s):87 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB)

    With the emergence of 5G mobile communication systems and software defined networks, not only could the performance of vehicular networks be improved, but also new applications of vehicular networks are required by future vehicles (e.g., pilotless vehicles). To meet requirements of intelligent transportation systems, a new vehicular network architecture integrated with 5G mobile communication tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable and Quick-Response Software Defined Vehicular Network Assisted by Mobile Edge Computing

    Publication Year: 2017, Page(s):94 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB)

    Connected vehicles provide advanced transformations and attractive business opportunities in the automotive industry. Presently, IEEE 802.11p and evolving 5G are the mainstream radio access technologies in the vehicular industry, but neither of them can meet all requirements of vehicle communication. In order to provide low-latency and high-reliability communication, an SDN-enabled network archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Defined Space-Air-Ground Integrated Vehicular Networks: Challenges and Solutions

    Publication Year: 2017, Page(s):101 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    This article proposes a software defined spaceair- ground integrated network architecture for supporting diverse vehicular services in a seamless, efficient, and cost-effective manner. First, the motivations and challenges for integration of space-air-ground networks are reviewed. Second, a software defined network architecture with a layered structure is presented. To protect the legacy services ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine, considered by most to be their most important member benefit, provides timely information on all aspects of communications: monthly feature articles describe technology, systems, services, market trends, development methods, regulatory and policy issues, and significant global events.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies