Swinburne University of Technology

Displaying 1-36 of 36 results

  • White Papers // Apr 2012

    A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises an open environment where customers can deploy IT services in a pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers may exist. Such service providers may record service information in a service process from a customer...

    Provided By Swinburne University of Technology

  • White Papers // Apr 2012

    The Effect of Round Trip Time on Competing TCP Flows

    In this paper, the authors describe experiments to investigate the interactions of competing TCP flows typical of a home network. Using a standard FreeBSD 8.2-RELEASE installation, they explore the relationship between queue sizes, congestion windows, latency, and bandwidth and how they relate to each other in such an environment. They...

    Provided By Swinburne University of Technology

  • White Papers // Apr 2012

    An Empirical Comparison of Packet Loss on End-User Perception of Performance

    In this paper, the authors investigate the impact of randomised packet loss on TCP transfers using FreeBSD 8.2. They, then evaluate these outcomes with respect to web interactivity and responsiveness. They find that even small rates of packet loss have a significant detrimental impact on perceivable performance of a website,...

    Provided By Swinburne University of Technology

  • White Papers // Mar 2012

    Real Time Traffic Classification and Prioritisation on a Home Router Using DIFFUSE

    Quality of Service (QoS) is important in multi-user residential networks that share a common bandwidth-constrained Internet connection. A limited upstream bandwidth can become a bottleneck and the performance of delay-sensitive applications - such as VoIP and online games - can degrade significantly when latency is introduced by other traffic flows....

    Provided By Swinburne University of Technology

  • White Papers // Feb 2012

    A Cost-Effective Mechanism for Cloud Data Reliability Management Based on Proactive Replica Checking

    In current Cloud computing environments, management of data reliability has become a challenge. For data-intensive scientific applications, storing data in the Cloud with the typical 3-replica replication strategy for managing the data reliability would incur huge storage cost. To address this issue, in this paper, the authors present a novel...

    Provided By Swinburne University of Technology

  • White Papers // Feb 2012

    Robust Control of an M/G/1 Processor Sharing Queue With Applications to Energy Management

    The Internet contains many devices that must process multiple jobs at the same time. For many purposes, such devices can be modelled as M/G/1-PS queues. This paper investigates such a queue. The authors consider single-pass, lossless, queueing systems at steady-state subject to Poisson job arrivals at an unknown rate. Service...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2011

    Netgear Powerline AV 200 XAVB2001 RTT Measurements With SPP

    This paper presents work that was performed to analyze the behaviour of traffic traversing Powerline adapters. Powerline adapters are networking equipment which modulate network traffic onto electrical wiring to transfer data. These adapters can provide up to 200 Mbps of bandwidth. In the authors' tests, the adapters synchronized between 168...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2011

    Service Differentiation Without Prioritization in IEEE 802.11 WLANs

    Wireless LANs carry a mixture of traffic, with different delay and throughput requirements. The usual way to provide low-delay services is to give priority to such traffic. However this creates an incentive for throughput sensitive traffic also to use this service, which degrades overall network performance. Wireless networks carry a...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2011

    Collaboration-Based Cloud Computing Security Management Framework

    Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud computing platforms. Moreover, the lack of security constraints in...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2011

    How device misconfiguration drives TCP traffic to parts of 1.0.0.0/8 - an initial investigation

    The Internet community is near the 'Bottom of the barrel' for unallocated IPv4 address prefixes. Network 1.0.0.0/8 was allocated in January 2010 for use on the public Internet, despite being unofficially utilised in various ways for many years. Recent work has revealed this prefix to be quite 'Dirty', with significant...

    Provided By Swinburne University of Technology

  • White Papers // Jun 2011

    Network Stability Under Alpha Fair Bandwidth Allocation With General File Size Distribution

    Rate allocation among a fixed set of end-to-end connections in the Internet is carried out by congestion control, which has a well established model: it optimizes a concave network utility, a particular case of which is the alpha-fair bandwidth allocation. This paper studies the slower dynamics of connections themselves that...

    Provided By Swinburne University of Technology

  • White Papers // Mar 2011

    Balancing Peer and Server Energy Consumption in Large Peer-to-Peer File Distribution Systems

    Network induced energy consumption is a significant fraction of all ICT energy consumption. This paper investigates the most energy efficient way to distribute a file to a large number of recipients. It is shown that using peer-to-peer and naively minimizing the transfer time results in energy consumption that is an...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2011

    SONG: Quake 4 Network Traffic Trace Files

    This paper describes the conditions under which network traffic was generated and captured for a range of traffic traces available on the SONG database. In this case the traffic traces concern network traffic generated by the Quake 4 game running on a central server with between two and seven players...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2010

    A Trust-Based Noise Injection Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises customers that they can present and deploy IT services in pay-as-you-go fashion in open and virtualised cloud environment while saving huge capital investment in their own IT infrastructure. In this sense, protection of customer privacy has become critical and actually one of the most concerned issues because...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2010

    Design of DIFFUSE V0.1 - DIstributed Firewall and Flow-Shaper Using Statistical Evidence

    In recent years a growing number of researchers investigated the performance of machine learning based traffic classification using statistical properties - classification techniques that do not require packet payload inspection. Such techniques assist Internet Service Providers to work within any legal or technical limitations on direct payload inspection. Potential new...

    Provided By Swinburne University of Technology

  • White Papers // Nov 2010

    Emerging Security Challenges of Cloud Virtual Infrastructure

    There are security challenges in the cloud, and a secure cloud is impossible unless the virtual environment is secure. Traditional security solutions do not map well to the virtualized environments because of the complex and ever-dynamic nature of the cloud computing. New virtualization-aware security solutions should be provided to ensure...

    Provided By Swinburne University of Technology

  • White Papers // Nov 2010

    An Analysis of The Cloud Computing Security Problem

    Cloud computing is a new computational paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption. The security problem becomes more complicated under the...

    Provided By Swinburne University of Technology

  • White Papers // Oct 2010

    Improving DNS Performance Using "Stateless" TCP in FreeBSD 9

    The introduction of DNSSEC and the increasing adoption of IPv6 will tend to generate DNS responses too large for standard DNS-over-UDP transport. This will create pressure for clients to switch to TCP for DNS queries, leading to a significant increase in overhead for DNS servers. Huston has proposed a "Stateless"...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2010

    A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling

    A cloud workflow system is a type of platform service which facilitates the automation of distributed applications based on the novel cloud infrastructure. Compared with grid environment, data transfer is a big overhead for cloud workflows due to the market-oriented business model in the cloud environments. In this paper, a...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2010

    A Market-Oriented Hierarchical Scheduling Strategy in Cloud Workflow Systems

    A cloud workflow system is a type of platform service which facilitates the automation of distributed applications based on the novel cloud infrastructure. One of the most important aspects which differentiate a cloud workflow system from its other counterparts is the market-oriented business model. This is a significant innovation which...

    Provided By Swinburne University of Technology

  • White Papers // Aug 2010

    Monitoring of the Local Transmission Control Protocol's State Variables Using L3DGEWorld

    The monitoring of the Transmission Control Protocol (TCP) state variables can provide an understanding of how various traffic flows on a network interact. As discussed in previous work the rate and diversity of the raw information available is incomprehensible in real time, considering human cognitive processing limitations. In this paper,...

    Provided By Swinburne University of Technology

  • White Papers // Apr 2010

    SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System

    Workflow systems are designed to support the process automation of large scale business and scientific applications. In recent years, many workflow systems have been deployed on high performance computing infrastructures such as cluster, Peer-To-Peer (P2P), and grid computing. One of the driving forces is the increasing demand of large scale...

    Provided By Swinburne University of Technology

  • White Papers // Feb 2010

    A Compromised-Time-Cost Scheduling Algorithm in SwinDeW-C for Instance-Intensive Cost-Constrained Workflows on Cloud Computing Platform

    The concept of cloud computing continues to spread widely, as it has been accepted recently. Cloud computing has many unique advantages which can be utilised to facilitate workflow execution. Instance-intensive cost-constrained cloud workflows are workflows with a large number of workflow instances (i.e. instance intensive) bounded by a certain budget...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2010

    A Cost-Effective Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems

    Many scientific workflows are data intensive where a large volume of intermediate data is generated during their execution. Some valuable intermediate data need to be stored for sharing or reuse. Traditionally, they are selectively stored according to the system storage capacity, determined manually. As doing science on cloud has become...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2010

    Application of a Fuzzy Programming Technique to Production Planning in the Textile Industry

    Many engineering optimization problems can be considered as linear programming problems where all or some of the parameters involved are linguistic in nature. These can only be quantified using fuzzy sets. The aim of this paper is to solve a fuzzy linear programming problem in which the parameters involved are...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2010

    The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

    The adoption and adaptation of digital signal processing technology in consumer digital cameras has improved the performance of automatic adjustments including Auto Focus (AF), Auto Exposure (AE) and zoom tracking, which are important features for high image quality, under various shot conditions. In a digital camera, optical parameters such as...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2009

    File Fragmentation Over an Unreliable Channel

    It has been recently discovered that heavy-tailed file completion time can result from protocol interaction even when file sizes are light-tailed. A key to this phenomenon is the RESTART feature where if a file transfer is interrupted before it is completed, the transfer needs to restart from the beginning. In...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2009

    Packet Size Variability Affects Collisions and Energy Efficiency in WLANs

    Wireless Local Area Networks (WLANs) support a wide range of applications, with various packet sizes. This diversity is set to increase in 802.11e WLANs which effectively allow very large packets controlled by a Transmission OPportunity (TxOP) parameter. This paper presents a new phenomenon which occurs as a result of this...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2009

    Estimating the Capacity of Temperature-Based Covert Channels

    Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilize pre-existing overt data transmissions to carry hidden messages. Recently, Murdoch proposed a temperature-based covert channel where information is transmitted by remotely inducing and measuring changes of temperature of an intermediate/target host. The...

    Provided By Swinburne University of Technology

  • White Papers // Oct 2009

    Performance Analysis of 802.11e EDCA WLANs With Saturated and Non-Saturated Sources

    In WLANs, real-time traffic has always been given higher priority than data traffic. This creates an incentive for data users to pretend to be real-time users, which benefits themselves and degrades the performance of the rest. The authors' paper proposes a tradeoff mechanism which benefits both low-rate real-time traffic and...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2009

    Implementing Path-Exploration Damping in the Quagga Software Routing Suite Version 0.99.13 - Patch Set Version 0.3

    Quagga is a software routing suite which provides implementations of various routing protocols for UNIX based platforms. It supports implementations of RIP, OSPF and BGP version 4. Path-exploration damping (or simply path-damping) is one possible approach to filter out the path hunting phenomenon in BGP, in which a single prefix...

    Provided By Swinburne University of Technology

  • White Papers // Mar 2009

    A Comparative Study Into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models

    Early quality evaluation and support for decisions that affect quality characteristics are among the key incentives to formally specify the architecture of a software-intensive system. The Architecture Analysis and Description Language (AADL) with its Error Annex is a new and promising architecture modeling language that supports analysis of safety and...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2009

    Protecting SSH at the Transport Layer

    SSH daemons are common targets for brute force attacks. Through log monitoring and firewalling, the impact of these attacks on both security and bandwidth consumption can be minimised. The authors consider a number of implementations and employ Stockade as a backend to SSHGuard for blocking attackers. The SSH daemon provides...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2008

    Information Security Governance and Boards of Directors: Are They Compatible?

    This paper presents a critique of emergent views on the roles of the boards of directors in relation to information security. The analysis highlights several concerns about the separation and validation of proper theory and business assertions of information security at board level. New requirements articulated by industry bodies -...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2008

    Covert Channels in Multiplayer First Person Shooter Online Games

    Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilize pre-existing (overt) data transmissions to carry hidden messages. Internet-based covert channels often encode new information into unused (or loosely specified) IP packet header fields, or the time intervals between IP packet arrivals....

    Provided By Swinburne University of Technology

  • Case Studies // Dec 2004

    Analytic Listening: A Case Study of Radio Production

    This paper provides an insight into Radio production. Developing strong analytic listening skills is a critical part of the training necessary to be a successful radio producer. Humans have a very strong preference for visual sensing over all other modes. To learn analytic listening, producers must disengage visual sensing. Experienced...

    Provided By Swinburne University of Technology

  • Case Studies // Dec 2004

    Analytic Listening: A Case Study of Radio Production

    This paper provides an insight into Radio production. Developing strong analytic listening skills is a critical part of the training necessary to be a successful radio producer. Humans have a very strong preference for visual sensing over all other modes. To learn analytic listening, producers must disengage visual sensing. Experienced...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2010

    Application of a Fuzzy Programming Technique to Production Planning in the Textile Industry

    Many engineering optimization problems can be considered as linear programming problems where all or some of the parameters involved are linguistic in nature. These can only be quantified using fuzzy sets. The aim of this paper is to solve a fuzzy linear programming problem in which the parameters involved are...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2010

    The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

    The adoption and adaptation of digital signal processing technology in consumer digital cameras has improved the performance of automatic adjustments including Auto Focus (AF), Auto Exposure (AE) and zoom tracking, which are important features for high image quality, under various shot conditions. In a digital camera, optical parameters such as...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2010

    A Market-Oriented Hierarchical Scheduling Strategy in Cloud Workflow Systems

    A cloud workflow system is a type of platform service which facilitates the automation of distributed applications based on the novel cloud infrastructure. One of the most important aspects which differentiate a cloud workflow system from its other counterparts is the market-oriented business model. This is a significant innovation which...

    Provided By Swinburne University of Technology

  • White Papers // Feb 2010

    A Compromised-Time-Cost Scheduling Algorithm in SwinDeW-C for Instance-Intensive Cost-Constrained Workflows on Cloud Computing Platform

    The concept of cloud computing continues to spread widely, as it has been accepted recently. Cloud computing has many unique advantages which can be utilised to facilitate workflow execution. Instance-intensive cost-constrained cloud workflows are workflows with a large number of workflow instances (i.e. instance intensive) bounded by a certain budget...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2010

    A Cost-Effective Strategy for Intermediate Data Storage in Scientific Cloud Workflow Systems

    Many scientific workflows are data intensive where a large volume of intermediate data is generated during their execution. Some valuable intermediate data need to be stored for sharing or reuse. Traditionally, they are selectively stored according to the system storage capacity, determined manually. As doing science on cloud has become...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2010

    A Trust-Based Noise Injection Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises customers that they can present and deploy IT services in pay-as-you-go fashion in open and virtualised cloud environment while saving huge capital investment in their own IT infrastructure. In this sense, protection of customer privacy has become critical and actually one of the most concerned issues because...

    Provided By Swinburne University of Technology

  • White Papers // Nov 2010

    Emerging Security Challenges of Cloud Virtual Infrastructure

    There are security challenges in the cloud, and a secure cloud is impossible unless the virtual environment is secure. Traditional security solutions do not map well to the virtualized environments because of the complex and ever-dynamic nature of the cloud computing. New virtualization-aware security solutions should be provided to ensure...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2011

    Collaboration-Based Cloud Computing Security Management Framework

    Although the cloud computing model is considered to be a very promising internet-based computing platform, it results in a loss of security control over the cloud-hosted assets. This is due to the outsourcing of enterprise IT assets hosted on third-party cloud computing platforms. Moreover, the lack of security constraints in...

    Provided By Swinburne University of Technology

  • White Papers // Apr 2010

    SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System

    Workflow systems are designed to support the process automation of large scale business and scientific applications. In recent years, many workflow systems have been deployed on high performance computing infrastructures such as cluster, Peer-To-Peer (P2P), and grid computing. One of the driving forces is the increasing demand of large scale...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2010

    A Revised Discrete Particle Swarm Optimization for Cloud Workflow Scheduling

    A cloud workflow system is a type of platform service which facilitates the automation of distributed applications based on the novel cloud infrastructure. Compared with grid environment, data transfer is a big overhead for cloud workflows due to the market-oriented business model in the cloud environments. In this paper, a...

    Provided By Swinburne University of Technology

  • White Papers // Nov 2010

    An Analysis of The Cloud Computing Security Problem

    Cloud computing is a new computational paradigm that offers an innovative business model for organizations to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing, the model security is still questionable which impacts the cloud model adoption. The security problem becomes more complicated under the...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2009

    File Fragmentation Over an Unreliable Channel

    It has been recently discovered that heavy-tailed file completion time can result from protocol interaction even when file sizes are light-tailed. A key to this phenomenon is the RESTART feature where if a file transfer is interrupted before it is completed, the transfer needs to restart from the beginning. In...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2008

    Information Security Governance and Boards of Directors: Are They Compatible?

    This paper presents a critique of emergent views on the roles of the boards of directors in relation to information security. The analysis highlights several concerns about the separation and validation of proper theory and business assertions of information security at board level. New requirements articulated by industry bodies -...

    Provided By Swinburne University of Technology

  • White Papers // Feb 2012

    A Cost-Effective Mechanism for Cloud Data Reliability Management Based on Proactive Replica Checking

    In current Cloud computing environments, management of data reliability has become a challenge. For data-intensive scientific applications, storing data in the Cloud with the typical 3-replica replication strategy for managing the data reliability would incur huge storage cost. To address this issue, in this paper, the authors present a novel...

    Provided By Swinburne University of Technology

  • White Papers // Mar 2009

    A Comparative Study Into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models

    Early quality evaluation and support for decisions that affect quality characteristics are among the key incentives to formally specify the architecture of a software-intensive system. The Architecture Analysis and Description Language (AADL) with its Error Annex is a new and promising architecture modeling language that supports analysis of safety and...

    Provided By Swinburne University of Technology

  • White Papers // Jun 2011

    Network Stability Under Alpha Fair Bandwidth Allocation With General File Size Distribution

    Rate allocation among a fixed set of end-to-end connections in the Internet is carried out by congestion control, which has a well established model: it optimizes a concave network utility, a particular case of which is the alpha-fair bandwidth allocation. This paper studies the slower dynamics of connections themselves that...

    Provided By Swinburne University of Technology

  • White Papers // Mar 2011

    Balancing Peer and Server Energy Consumption in Large Peer-to-Peer File Distribution Systems

    Network induced energy consumption is a significant fraction of all ICT energy consumption. This paper investigates the most energy efficient way to distribute a file to a large number of recipients. It is shown that using peer-to-peer and naively minimizing the transfer time results in energy consumption that is an...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2011

    Service Differentiation Without Prioritization in IEEE 802.11 WLANs

    Wireless LANs carry a mixture of traffic, with different delay and throughput requirements. The usual way to provide low-delay services is to give priority to such traffic. However this creates an incentive for throughput sensitive traffic also to use this service, which degrades overall network performance. Wireless networks carry a...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2009

    Packet Size Variability Affects Collisions and Energy Efficiency in WLANs

    Wireless Local Area Networks (WLANs) support a wide range of applications, with various packet sizes. This diversity is set to increase in 802.11e WLANs which effectively allow very large packets controlled by a Transmission OPportunity (TxOP) parameter. This paper presents a new phenomenon which occurs as a result of this...

    Provided By Swinburne University of Technology

  • White Papers // Apr 2012

    The Effect of Round Trip Time on Competing TCP Flows

    In this paper, the authors describe experiments to investigate the interactions of competing TCP flows typical of a home network. Using a standard FreeBSD 8.2-RELEASE installation, they explore the relationship between queue sizes, congestion windows, latency, and bandwidth and how they relate to each other in such an environment. They...

    Provided By Swinburne University of Technology

  • White Papers // Apr 2012

    An Empirical Comparison of Packet Loss on End-User Perception of Performance

    In this paper, the authors investigate the impact of randomised packet loss on TCP transfers using FreeBSD 8.2. They, then evaluate these outcomes with respect to web interactivity and responsiveness. They find that even small rates of packet loss have a significant detrimental impact on perceivable performance of a website,...

    Provided By Swinburne University of Technology

  • White Papers // Feb 2012

    Robust Control of an M/G/1 Processor Sharing Queue With Applications to Energy Management

    The Internet contains many devices that must process multiple jobs at the same time. For many purposes, such devices can be modelled as M/G/1-PS queues. This paper investigates such a queue. The authors consider single-pass, lossless, queueing systems at steady-state subject to Poisson job arrivals at an unknown rate. Service...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2011

    Netgear Powerline AV 200 XAVB2001 RTT Measurements With SPP

    This paper presents work that was performed to analyze the behaviour of traffic traversing Powerline adapters. Powerline adapters are networking equipment which modulate network traffic onto electrical wiring to transfer data. These adapters can provide up to 200 Mbps of bandwidth. In the authors' tests, the adapters synchronized between 168...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2011

    How device misconfiguration drives TCP traffic to parts of 1.0.0.0/8 - an initial investigation

    The Internet community is near the 'Bottom of the barrel' for unallocated IPv4 address prefixes. Network 1.0.0.0/8 was allocated in January 2010 for use on the public Internet, despite being unofficially utilised in various ways for many years. Recent work has revealed this prefix to be quite 'Dirty', with significant...

    Provided By Swinburne University of Technology

  • White Papers // Oct 2010

    Improving DNS Performance Using "Stateless" TCP in FreeBSD 9

    The introduction of DNSSEC and the increasing adoption of IPv6 will tend to generate DNS responses too large for standard DNS-over-UDP transport. This will create pressure for clients to switch to TCP for DNS queries, leading to a significant increase in overhead for DNS servers. Huston has proposed a "Stateless"...

    Provided By Swinburne University of Technology

  • White Papers // Aug 2010

    Monitoring of the Local Transmission Control Protocol's State Variables Using L3DGEWorld

    The monitoring of the Transmission Control Protocol (TCP) state variables can provide an understanding of how various traffic flows on a network interact. As discussed in previous work the rate and diversity of the raw information available is incomprehensible in real time, considering human cognitive processing limitations. In this paper,...

    Provided By Swinburne University of Technology

  • White Papers // Oct 2009

    Performance Analysis of 802.11e EDCA WLANs With Saturated and Non-Saturated Sources

    In WLANs, real-time traffic has always been given higher priority than data traffic. This creates an incentive for data users to pretend to be real-time users, which benefits themselves and degrades the performance of the rest. The authors' paper proposes a tradeoff mechanism which benefits both low-rate real-time traffic and...

    Provided By Swinburne University of Technology

  • White Papers // Jul 2009

    Implementing Path-Exploration Damping in the Quagga Software Routing Suite Version 0.99.13 - Patch Set Version 0.3

    Quagga is a software routing suite which provides implementations of various routing protocols for UNIX based platforms. It supports implementations of RIP, OSPF and BGP version 4. Path-exploration damping (or simply path-damping) is one possible approach to filter out the path hunting phenomenon in BGP, in which a single prefix...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2009

    Protecting SSH at the Transport Layer

    SSH daemons are common targets for brute force attacks. Through log monitoring and firewalling, the impact of these attacks on both security and bandwidth consumption can be minimised. The authors consider a number of implementations and employ Stockade as a backend to SSHGuard for blocking attackers. The SSH daemon provides...

    Provided By Swinburne University of Technology

  • White Papers // Jan 2011

    SONG: Quake 4 Network Traffic Trace Files

    This paper describes the conditions under which network traffic was generated and captured for a range of traffic traces available on the SONG database. In this case the traffic traces concern network traffic generated by the Quake 4 game running on a central server with between two and seven players...

    Provided By Swinburne University of Technology

  • White Papers // Sep 2008

    Covert Channels in Multiplayer First Person Shooter Online Games

    Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilize pre-existing (overt) data transmissions to carry hidden messages. Internet-based covert channels often encode new information into unused (or loosely specified) IP packet header fields, or the time intervals between IP packet arrivals....

    Provided By Swinburne University of Technology

  • White Papers // Dec 2010

    Design of DIFFUSE V0.1 - DIstributed Firewall and Flow-Shaper Using Statistical Evidence

    In recent years a growing number of researchers investigated the performance of machine learning based traffic classification using statistical properties - classification techniques that do not require packet payload inspection. Such techniques assist Internet Service Providers to work within any legal or technical limitations on direct payload inspection. Potential new...

    Provided By Swinburne University of Technology

  • White Papers // Dec 2009

    Estimating the Capacity of Temperature-Based Covert Channels

    Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilize pre-existing overt data transmissions to carry hidden messages. Recently, Murdoch proposed a temperature-based covert channel where information is transmitted by remotely inducing and measuring changes of temperature of an intermediate/target host. The...

    Provided By Swinburne University of Technology

  • White Papers // Mar 2012

    Real Time Traffic Classification and Prioritisation on a Home Router Using DIFFUSE

    Quality of Service (QoS) is important in multi-user residential networks that share a common bandwidth-constrained Internet connection. A limited upstream bandwidth can become a bottleneck and the performance of delay-sensitive applications - such as VoIP and online games - can degrade significantly when latency is introduced by other traffic flows....

    Provided By Swinburne University of Technology

  • White Papers // Apr 2012

    A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises an open environment where customers can deploy IT services in a pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers may exist. Such service providers may record service information in a service process from a customer...

    Provided By Swinburne University of Technology