Now showing items 1-20 of 60

    • A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in named data networking 

      Karami, Amin; Guerrero Zapata, Manel (2015-03-03)
      Article
      Open Access
      Named Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based (host-centric) Internet infrastructure. NDN can overcome the fundamental limitations of ...
    • A methodological approach to policy refinement in policy-based management systems 

      Rubio Loyola, Javier (Universitat Politècnica de Catalunya, 2007-06-29)
      Doctoral thesis
      Open Access
      En la actualidad se están realizando diversos esfuerzos para realizar la visión fu-turista de las redes de telecomunicación autogestionadas. La gestión basada en políticas ha sido reconocida como una herramienta potencial ...
    • A security framework for JXTA-overlay 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Conference report
      Open Access
      At present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ...
    • A security-aware approach to JXTA-overlay primitives 

      Arnedo Moreno, Joan; Matsuo, Keita; Barolli, Leonard; Xhafa Xhafa, Fatos (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      Conference report
      Open Access
      The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability ...
    • A Techno-Economic study of network coding protection schemes 

      Ramirez Almonte, Wilson; Masip Bruin, Xavier; Marín Tordera, Eva; Yannuzzi, Marcelo; Martínez Manzanilla, Anny Gabriela; Sánchez López, Sergio; Siddiqui, Shuaib; López Álvarez, Victor (2014)
      Conference report
      Restricted access - publisher's policy
      The recent advances in optical technologies pave the way to the deployment of high-bandwidth services. As reliability becomes a mandatory requirement for some of these services, network providers must endow their networks ...
    • Adaptive distributed mechanism againts flooding network attacks based on machine learning 

      Berral García, Josep Lluís; Poggi Mastrokalo, Nicolas; Alonso López, Javier; Gavaldà Mestre, Ricard; Torres Viñals, Jordi; Parashar, Manish (ACM Press, NY, 2008)
      Conference report
      Restricted access - publisher's policy
      Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self- defense for networks and distributed systems. In this paper, we focus on early detection and stopping of ...
    • An analysis of the applicability of blockchain to secure IP addresses allocation, delegation and bindings 

      Paillissé Vilanova, Jordi; Rodríguez Natal, Alberto; Ermagan, Vina; Maino, Fabio; Vegoda, Leo; Cabellos Aparicio, Alberto (2018-06-29)
      External research report
      Open Access
      This document analyzes how blockchain technology can be used to secure the allocation, delegation and binding to topological information of the IP address space. The main outcomes of the analysis are that blockchain is ...
    • An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking 

      Karami, Amin; Guerrero Zapata, Manel (2015-04-07)
      Article
      Open Access
      Named Data Networking (NDN) is a candidate next-generation Internet architecture designed to overcome the fundamental limitations of the current IP-based Internet, in particular strong security. The ubiquitous in-network ...
    • Anàlisi, disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB 

      Bellet Chacón, Oriol (Universitat Politècnica de Catalunya, 2011-10)
      Master thesis
      Open Access
      El projecte consisteix en l'anàlisi disseny i implementació d'un sistema de control d'accés a la xarxa cablejada de la FIB que permeti autenticar usuaris, definir el recursos de xarxa oferts a cada usuari en funció de la ...
    • Architecture support for intrusion detection systems 

      Sreekar Shenoy, Govind (Universitat Politècnica de Catalunya, 2012-10-30)
      Doctoral thesis
      Open Access
      System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...
    • Arquitectura de continguts AAA 

      Cabezas, Carlos (2009-06-15)
      Audiovisual
      Open Access
    • Automating root-cause analysis of network anomalies using frequent itemset mining 

      Paredes Oliva, Ignasi; Dimitropoulos, Xenofontas; Molina, Maurizio; Barlet Ros, Pere; Brauckhoff, Daniela (ACM Press. Association for Computing Machinery, 2010)
      Conference lecture
      Open Access
      Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mining to automatically extract and summarize ...
    • Chains of trust in vehicular networks: a secure points of interest dissemination strategy 

      Antolino Rivas, David; Guerrero Zapata, Manel (Elsevier, 2012-08)
      Article
      Restricted access - publisher's policy
      This article describes a scheme which to the best of our knowledge is the first one to use user signatures to share information about Points of Interest in Vehicular Ad hoc Networks. In this scheme, users rate restaurants, ...
    • Contribución a la seguridad en servicios multimedia. Aplicación a entornos multicast 

      Pegueroles Vallés, Josep R. (Universitat Politècnica de Catalunya, 2003-11-21)
      Doctoral thesis
      Open Access
      Usually multimedia services can be divided into two different phases: access to the service and content distribution. The first phase usually takes place over reliable transport protocols and unicast connections. The second ...
    • Criptografía y seguridad en comunicaciones 

      Forné Muñoz, Jorge; Melus Moreno, José Luis; Soriano Ibáñez, Miguel (Asociación de Técnicos de Informática, 1995-07)
      Article
      Open Access
    • Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems 

      Touceda, D.S.; Cámara, J.M.S.; Soriano Ibáñez, Miguel (2012-06)
      Article
      Restricted access - publisher's policy
      Several alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ...
    • Demo abstract: Towards IoT service deployments on edge community network microclouds 

      Khan, Amin M.; Freitag, Fèlix; Vlassov, Vladimir; Ha, Phuong Hoai (Institute of Electrical and Electronics Engineers (IEEE), 2018)
      Conference report
      Open Access
      Internet of Things (IoT) services for personal devices and smart homes provided by commercial solutions are typically proprietary and closed. These services provide little control to the end users, for instance to take ...
    • Desing and Evaluation of Certificate Revocation Systems 

      Muñoz Tapia, José Luis (Universitat Politècnica de Catalunya, 2003-11-26)
      Doctoral thesis
      Open Access
      Este trabajo presenta tanto el estado del arte como un análisis de los principales sistemas de revocación de certificados digitales. El hecho de comprender bien el mecanismo de revocación de un certificado es importante ...
    • Detecting cryptocurrency miners with NetFlow/IPFIX network measurements 

      Zayuelas Muñoz, Jordi; Suárez-Varela Maciá, José Rafael; Barlet Ros, Pere (Institute of Electrical and Electronics Engineers (IEEE), 2019)
      Conference report
      Open Access
      In the last few years, cryptocurrency mining has become more and more important on the Internet activity and nowadays is even having a noticeable impact on the global economy. This has motivated the emergence of a new ...
    • Detecting network performance anomalies with contextual anomaly detection 

      Dimopoulos, Giorgos; Barlet Ros, Pere; Dovrolis, Constantine; Leontiadis, Ilias (Institute of Electrical and Electronics Engineers (IEEE), 2017)
      Conference report
      Open Access
      Network performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate ...