scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 2013"


Journal ArticleDOI
TL;DR: The purpose of this paper is to show that the distributed approach has various challenges that need to be solved, but also various interesting properties and strengths.

1,091 citations


Journal ArticleDOI
TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid.

854 citations


Journal ArticleDOI
TL;DR: This paper carefully analyzed and discussed the properties of a monitoring system for the Cloud, the issues arising from such properties and how such issues have been tackled in literature, and identifies open issues, main challenges and future directions in the field of Cloud monitoring.

543 citations


Journal ArticleDOI
TL;DR: A comprehensive review that broadly discusses the botnet problem, briefly summarizes the previously published studies and supplements these with a wide ranging discussion of recent works and solution proposals spanning the entire botnet research field is presented.

368 citations


Journal ArticleDOI
TL;DR: This paper presents a comprehensive survey of state-of-art techniques aiming to address caching issues, with particular focus on reducing cache redundancy and improving the availability of cached content.

343 citations


Journal ArticleDOI
TL;DR: The basic idea of VMPlanner is to optimize both virtual machine placement and traffic flow routing so as to turn off as many unneeded network elements as possible for power saving in the virtualization-based data centers.

228 citations


Journal ArticleDOI
TL;DR: An in depth review on the application characteristics and traffic requirements of several emerging smart grid applications and highlights some of the key research challenges present in this arena are offered.

217 citations


Journal ArticleDOI
TL;DR: This article evaluated how vulnerable OSNs are to a large-scale infiltration campaign run by socialbots: bots that control OSN accounts and mimic the actions of real users, and built a prototype of a Socialbot Network (SbN): a group of coordinated programmable socialbots.

198 citations


Journal ArticleDOI

[...]

TL;DR: This paper proposes a secure and efficient AKA protocol, called SE-AKA, which can fit in with all of the group authentication scenarios in the LTE networks and cannot only provide strong security including privacy-preservation and KFS/KBS, but also provide a group authentication mechanism which can effectively authenticate group devices.

152 citations


Journal ArticleDOI
TL;DR: This paper focuses on cache pollution attacks, where the adversary's goal is to disrupt cache locality to increase link utilization and cache misses for honest consumers, and illustrates that existing proactive countermeasures are ineffective against realistic adversaries.

139 citations


Journal ArticleDOI
TL;DR: This paper proposes and discusses solutions to support ICN by using Software Defined Networking concepts, focusing on an ICN framework called CONET, which grounds its roots in the CCN/NDN architecture and can interwork with its implementation (CCNx).

Journal ArticleDOI
TL;DR: This paper provides an up-to-date survey of the application of BFs and their variants to improve performance of the approaches proposed to address security problems with different types of networks.

Journal ArticleDOI
TL;DR: Several efficient clustering algorithms for maximizing the lifetime of WSNs, i.e., the duration till a certain percentage of the nodes die, are presented and help provide useful benchmarks for various centralized and distributed clustering scheme designs.

Journal ArticleDOI
TL;DR: Results show that the proposed solution, by leveraging distributed broadcast storm mitigation techniques, simple transport routines, and lightweight soft-state forwarding procedures, brings significant improvements w.r.t. a plain CCN model, confirming the effectiveness and efficiency of the design choices.

Journal ArticleDOI
TL;DR: A survey of the state of the art in alert correlation techniques is presented and an alert correlation architecture capable of modeling current and prospective proposals is suggested.

Journal ArticleDOI
TL;DR: Threats to the stability and security of the content distribution system are analyzed in theory, simulations, and practical experiments, and it is suggested that major architectural refinements are required prior to global ICN deployment in the real world.

Journal ArticleDOI
TL;DR: It is proved that minimizing the number of PPNs is a NP-hard problem and proposed a fast greedy algorithm for scalability and the anonymity of external attackers is evaluated.

Journal ArticleDOI
TL;DR: It is shown that for more than 20 recent botnets and over 87,000 C&C flows, CoCoSpot can recognize more than 88% of the C &C flows at a false positive rate below 0.1%.

Journal ArticleDOI
TL;DR: A novel cross-layer module is proposed to accurately capture both the high heterogeneity of the IoT and the impact of the Internet as part of the network architecture and can achieve a global communication optimum and outperforms existing layered solutions.

Journal ArticleDOI
TL;DR: It is proposed that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs).

Journal ArticleDOI
TL;DR: The experimental evaluation performed confirms that the proposed policies are capable to properly dimension the system resources making the whole system self-adaptable respect to the workload fluctuation, allowing to save up to the 32% of resource allocation cost always in the respect of SLA constraints.

Journal ArticleDOI
TL;DR: A set of building blocks for content delivery is identified and a comparison of content delivery solutions relying on the current Internet infrastructure with novel Information-Centric Networking approaches is compared.

Journal ArticleDOI
TL;DR: A novel way is proposed to identify efficiently and accurately the ''best'' features by first combining the results of some well-known FS techniques to find consistent features, and then using the proposed concept of support to select a smallest set of features and cover data optimality.

Journal ArticleDOI
TL;DR: The evaluation and analysis present the performance bounds of in-network caching on NDN in terms of the practical constraints, such as the link cost, link capacity, and cache size.

Journal ArticleDOI
TL;DR: Simulation results show the scheduling method can achieve better performance than other schemes, and it is suitable for real-time services and it consists of three phases.

Journal ArticleDOI
TL;DR: A novel Real-time Payload-based Intrusion Detection System (RePIDS) that integrates a 3-Tier IFSEng and the MDM approach is proposed that achieves better performance and lower computational complexity when compared against two state-of-the-art payload-based intrusion detection systems.

Journal ArticleDOI
TL;DR: This work proposes a novel approach to automatic protocol reverse engineering based on dynamic program binary analysis and uses it to analyze the previously undocumented C&C protocol of MegaD, a spam botnet that at its peak produced one third of the spam on the Internet.

Journal ArticleDOI
TL;DR: An exploratory study on 10 feature-oriented systems found that the majority of feature interactions could be detected based on feature-based specifications, but some specifications have not been modularized properly and require undesirable workarounds to modularization.

Journal ArticleDOI
TL;DR: Five case studies are presented where macrocells, microcells, picocells and femtocells are deployed based on the number of mobile subscribers present in a region, mobile user traffic in that region and the area of the region where cellular coverage has to be provided.

Journal ArticleDOI
TL;DR: An energy efficient MAC protocol for WSNs is presented that avoids overhearing and reduces contention and delay by asynchronously scheduling the wakeup time of neighboring nodes and an energy consumption analysis for multi-hop networks is provided.