963 resultados para IP traceback


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although TCP has emerged as the standard in data communication, the introduction of ATM technology has raised numerous problems regarding the effectiveness of using TCP over A TM networks, especially when video traffic performance is considered. This paper presents a simulation model for transmission performance of video traffic via ATM over TCP/IP. The interactivity between TCP/IP and ATM, generation of MPEG traffic and evaluation of traffic performance are implemented in the model. The design and implementation details of the model are carefully described. The experiments conducted using the model and experimental results are briefly introduced, revealing the capability of our model in simulating network events and in evaluating potential solutions to performance issues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper, using the Unconstrained Shape Matrix Optimization Problem as a test bed, we investigate various aspects of variable aggregation and disaggregation for a class of integer programs that contains binary expansion. We present theoretical and numerical results, and propose an iterative algorithm for exact solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions. However, current Web security systems, like WS-Security are not efficient enough to handle distributed denial of service (DDoS) attacks. Our new approach, service oriented traceback architecture (SOTA), provides a framework to be able to identify the source of an attack. This is accomplished by deploying our defence system at distributed routers, in order to examine the incoming SOAP messages and place our own SOAP header. By this method, we can then use the new SOAP header information, to traceback through the network the source of the attack. According to our experimental performance evaluations, we find that SOTA is quite scaleable, simple and quite effective at identifying the source.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This presentation will start with a brief review of the first phase of this project, which focused largely on the impact on innovation of legal and institutional IP reforms in Asia triggered by the WTO Agreement on Trade Related Intellectual Property Rights (TRIPS) and by subsequent bilateral or multilateral Free Trade Agreements (FTAs). The presentation will then show the emerging issues relevant for the second phase of the project, which in an increasingly diversified IP landscape will lie at the intersection of IP with other disciplines and other areas of law, such as competition law, media law, criminal law, human rights, environmental law and constitutional law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In advanced capitalist societies, intellectual property laws protecting such subject matter as copyright and patents are justified by a combination of theories, which include the provision of economic incentives to foster creativity and innovation and the prevention of unfair competition. IP academics and policy makers have differing views about the appropriate balance between these objectives and public interest considerations such as health, education and the protection of the environment. These different views entered the policy debate in Asian developing countries in connection with an unprecedented introduction and expansion of IP laws over the last 25 years. This paper will use case studies of law reform from Asia, in particular Southeast Asia, to show that the policy considerations of governments in reforming their laws were often quite different from the standard rationale mentioned above. As much of the IP was, at least initially, held by foreigners and introduced to attract foreign investment, national development considerations were joined with the more commonly quoted objectives to promote the rights, creativity and innovation of individuals. Such national development objectives at times coincided and at other times collided with official explanations and received wisdom about the effects of stronger IP rights.

Especially in the early postcolonial period, copyright laws and other IP laws were frequently restricted or simply not implemented, if they conflicted with development policies in areas such as education or public health. Such policies were slowly changing in the wake of WTO-TRIPS and other international agreements. Nevertheless, the implementation and enforcement of the IP laws has been uneven. Specialised institutions such as courts and IP administering agencies compete with other branches of government and administration for limited funding and a rich repertoire of informal dispute settlement procedures has kept the number of court cases relatively low. In some countries, censorship laws have influenced freedom of expression and led to quite idiosyncratic interpretations of intellectual property laws. Governments often also retain a role in the assessment of licensing and technology transfer contracts. And while there are many programs to foster individual creativity, in most cases R & D activities are still largely taking place in government institutions and this has influenced the thinking about intellectual property rights and creativity in the context of employment.

The paper uses a few case studies to examine the implementation of IP laws in selected Asian developing countries to point to the quite different institutional setting for IP law reform in comparison to European or American models. It reaches some tentative conclusions as to the likely effects on creativity and innovation under these different circumstances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

DDoS attack source traceback is an open and challenging problem. Deterministic packet marking (DPM) is a simple and relatively effective traceback scheme among the available traceback methods. However, the existing DPM schemes inheret a critical drawback of scalability in tracing all possible attack sources, which roots at their static mark encoding and attempt to mark all Internet routers for their traceback purpose. We find that a DDoS attack session usually involves a limited number of attack sources, e.g. at the thousand level. In order to achieve the traceback goal, we only need to mark these attack related routers. We therefore propose a novel Marking on Demand (MOD) scheme based on the DPM mechanism to dynamical distribute marking IDs in both temporal and space dimensions. The proposed MOD scheme can traceback to all possible sources of DDoS attacks, which is not possible for the existing DPM schemes. We thoroughly compare the proposed MOD scheme with two dominant DPM schemes through theoretical analysis and experiments. The the results demonstrate that the MOD scheme outperforms the existing DPM schemes. © 2013 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Around one billion people access the Internet using their mobile phones today, and many of the mobile phones are prone to be compromised by hackers due to their inherited vulnerability. It is critical to identify these compromised mobile phones to effectively eliminate cyber attacks. However, we see few research works in the field. In order to address this desperate situation, we design a practical traceback framework to identify active compromised mobiles in the mobile Internet environment in this letter. In the proposed framework, we creatively use the IMEI number of mobile hardware as unique marks for the traceback purpose. Two-layer traceback tables are designed to collect global attack information and identify local attacking bots, respectively. Our analysis and simulation demonstrate that the proposed traceback method is effective and feasible, and it can identify every possible attacking mobile in the current mobile Internet environment with single packet marking.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The contributions to this book show the strategies and policies of countries in the Asia-Pacific region that have to grapple with international standard setting in what has been called the ‘spaghetti bowl’ of criss-crossing free trade agreements. The chapters show how intellectual property is just one among many political and economic factors that are used in trade off discussions. It leads to an often considerable further raising of IP standards in those countries that agree to higher protection levels, often for reasons that have little to do with the provision of incentives for technological progress. A more nuanced picture of IP protection in Asia shows the different interests of high protection countries, ‘first’ and ‘second tier’ newly industrialized and industrializing countries and the rather peculiar position of Australia and New Zealand. The chapter introduces the contributions to this volume according to these various groups of countries and of international law and the political economy of the region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

 Isredza Rahmi A Hamid’s thesis entitled Phishing Detection and Trackback Mechanism. The thesis investigates detection of phishing attacks through email, novel method to profile the attacker and tracking the attack back to the origin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense.A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In this paper, we present a novel attack and traceback mechanism against a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. We call this novel attack a Catabolism Attack and we call our novel traceback mechanism against this attack Anabolism Defense. Our novel detection and traceback mechanism is very powerful and has very high accuracy. Each node can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our defense techniques we have two stages. The first stage is to detect the attack, and the second stage is to find the malicious nodes. Simulation results show this robust mechanism achieves a very high accuracy and detection rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security is a major challenge in Opportunistic Networks because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In this paper, we present a malicious nodes detection mechanism against a special type of packet dropping attack where the malicious node drops one or more packets and then injects new fake packets instead. Our novel detection and traceback mechanism is very powerful and has very high accuracy. Each node can detect and then traceback the malicious nodes based on a solid and powerful idea that is, Merkle tree hashing technique. In our defense techniques we have two stages. The first stage is to detect the attack, and the second stage is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. Simulation results show this robust mechanism achieves a very high accuracy and detection rate.