Heinrich-Heine-University

Displaying 1-10 of 10 results

  • White Papers // May 2013

    Analysis of DDoS Detection Systems

    While there are plenty of papers describing algorithms for detecting Distributed Denial of Service (DDoS) attacks, here an introduction to the considerations preceding such an implementation is given. Therefore, a brief history of an introduction to DDoS attacks is given, showing that these kinds of attacks are nearly two decades...

    Provided By Heinrich-Heine-University

  • White Papers // Nov 2011

    On the Spatio-Temporal Information Content and Arithmetic Coding of Discrete Trajectories

    The trace of a moving object is commonly referred to as a trajectory. This paper considers the spatio-temporal information content of a discrete trajectory in relation to a movement prediction model for the object under consideration. The information content is the minimal amount of information necessary to reconstruct the trajectory,...

    Provided By Heinrich-Heine-University

  • White Papers // Nov 2011

    Non-Parallelizable and Non-Interactive Client Puzzles From Modular Square Roots

    Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely on public key cryptography and perform expensive authentication handshakes may be an easy target. A well-known countermeasure against DoS attacks are client...

    Provided By Heinrich-Heine-University

  • White Papers // Feb 2011

    Protecting User Privacy in WiFi Sharing Networks

    Wi-Fi sharing communities are an interesting option for mobile Internet access. Today, however, users need to give up privacy in exchange for connectivity: they are required to expose their identity in order to be granted access. This information can be used to track users and to generate usage and movement...

    Provided By Heinrich-Heine-University

  • White Papers // Feb 2011

    RadioActive WiFi Sharing for Autonomous Peers

    Wi-Fi sharing communities offer an attractive alternative to commercial hot-spots and cellular networks for users who seek Internet access while being away from home. The growing number of mobile devices with Internet usage capabilities has formed a basis for the establishment and growth of several such communities. However, critical security...

    Provided By Heinrich-Heine-University

  • White Papers // Nov 2010

    Competition in the Turkish Mobile Telecommunications Market: Price Elasticities and Network Substitution

    This paper estimates demand elasticities for the Turkish mobile telecommunication market. In contrast to most other studies, firm level data is used to estimate dynamic panel data models including instrumental variable techniques. Both short- and long-run elasticities are calculated, yielding a long-run price elasticity of -0.72 for the post-paid market...

    Provided By Heinrich-Heine-University

  • White Papers // Aug 2010

    Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays

    Many overlay-based distributed applications employ TCP for the communication between peer nodes. Typically, the TCP connections of one peer will all share one physical Internet link. Using real-world network experiments, the authors demonstrate that this can lead to undesirable interactions between overlay links, resulting in oscillations and suboptimal throughput. Consequently,...

    Provided By Heinrich-Heine-University

  • White Papers // Mar 2010

    Real-World Evaluation of C2X-Road Side Warning Devices

    Road side warning devices play an important role in car-to-car communication. Interestingly however, a detailed experimental evaluation of such devices is missing. Furthermore, although these devices should be able to perform self-positioning to work properly, little attention has been paid to this: mostly, it is assumed that GPS hardware could...

    Provided By Heinrich-Heine-University

  • White Papers // Mar 2010

    High-Speed Per-Flow Traffic Measurement With Probabilistic Multiplicity Counting

    On today's high-speed backbone network links, measuring per-flow traffic information has become very challenging. Maintaining exact per-flow packet counters on OC-192 or OC-768 links is not practically feasible due to computational and cost constrains. Packet sampling as implemented in today's routers results in large approximation errors. Here, the authors present...

    Provided By Heinrich-Heine-University

  • White Papers // May 2009

    Node Presence Detection With Reduced Overhead

    In this paper, the authors propose a distributed algorithm to detect whether a given node is present or absent in an ad-hoc network. This information is valuable since many proposed protocols and applications for MANETs exhibit worst-case behavior when an intended communication partner is currently not present. Their distributed algorithm...

    Provided By Heinrich-Heine-University

  • White Papers // Nov 2010

    Competition in the Turkish Mobile Telecommunications Market: Price Elasticities and Network Substitution

    This paper estimates demand elasticities for the Turkish mobile telecommunication market. In contrast to most other studies, firm level data is used to estimate dynamic panel data models including instrumental variable techniques. Both short- and long-run elasticities are calculated, yielding a long-run price elasticity of -0.72 for the post-paid market...

    Provided By Heinrich-Heine-University

  • White Papers // Nov 2011

    On the Spatio-Temporal Information Content and Arithmetic Coding of Discrete Trajectories

    The trace of a moving object is commonly referred to as a trajectory. This paper considers the spatio-temporal information content of a discrete trajectory in relation to a movement prediction model for the object under consideration. The information content is the minimal amount of information necessary to reconstruct the trajectory,...

    Provided By Heinrich-Heine-University

  • White Papers // Nov 2011

    Non-Parallelizable and Non-Interactive Client Puzzles From Modular Square Roots

    Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely on public key cryptography and perform expensive authentication handshakes may be an easy target. A well-known countermeasure against DoS attacks are client...

    Provided By Heinrich-Heine-University

  • White Papers // Feb 2011

    Protecting User Privacy in WiFi Sharing Networks

    Wi-Fi sharing communities are an interesting option for mobile Internet access. Today, however, users need to give up privacy in exchange for connectivity: they are required to expose their identity in order to be granted access. This information can be used to track users and to generate usage and movement...

    Provided By Heinrich-Heine-University

  • White Papers // Feb 2011

    RadioActive WiFi Sharing for Autonomous Peers

    Wi-Fi sharing communities offer an attractive alternative to commercial hot-spots and cellular networks for users who seek Internet access while being away from home. The growing number of mobile devices with Internet usage capabilities has formed a basis for the establishment and growth of several such communities. However, critical security...

    Provided By Heinrich-Heine-University

  • White Papers // Aug 2010

    Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays

    Many overlay-based distributed applications employ TCP for the communication between peer nodes. Typically, the TCP connections of one peer will all share one physical Internet link. Using real-world network experiments, the authors demonstrate that this can lead to undesirable interactions between overlay links, resulting in oscillations and suboptimal throughput. Consequently,...

    Provided By Heinrich-Heine-University

  • White Papers // Mar 2010

    Real-World Evaluation of C2X-Road Side Warning Devices

    Road side warning devices play an important role in car-to-car communication. Interestingly however, a detailed experimental evaluation of such devices is missing. Furthermore, although these devices should be able to perform self-positioning to work properly, little attention has been paid to this: mostly, it is assumed that GPS hardware could...

    Provided By Heinrich-Heine-University

  • White Papers // Mar 2010

    High-Speed Per-Flow Traffic Measurement With Probabilistic Multiplicity Counting

    On today's high-speed backbone network links, measuring per-flow traffic information has become very challenging. Maintaining exact per-flow packet counters on OC-192 or OC-768 links is not practically feasible due to computational and cost constrains. Packet sampling as implemented in today's routers results in large approximation errors. Here, the authors present...

    Provided By Heinrich-Heine-University

  • White Papers // May 2009

    Node Presence Detection With Reduced Overhead

    In this paper, the authors propose a distributed algorithm to detect whether a given node is present or absent in an ad-hoc network. This information is valuable since many proposed protocols and applications for MANETs exhibit worst-case behavior when an intended communication partner is currently not present. Their distributed algorithm...

    Provided By Heinrich-Heine-University

  • White Papers // May 2013

    Analysis of DDoS Detection Systems

    While there are plenty of papers describing algorithms for detecting Distributed Denial of Service (DDoS) attacks, here an introduction to the considerations preceding such an implementation is given. Therefore, a brief history of an introduction to DDoS attacks is given, showing that these kinds of attacks are nearly two decades...

    Provided By Heinrich-Heine-University