Learn More
This paper presents a comparative study of two well-known network simulators: OPNET Modeler and Ns-2. Other studies in this area have generally been confined to just one simulator. The motivation of this paper is to provide a guide to researchers undertaking packet-level network simulations. The simulator outputs were compared to the output from a live(More)
In the last decade, denial of service (DoS) becomes one of the most significant security threats in the Internet. The existing limitations of the Internet protocols and the available tools make DoS attack easy to launch and effective in damage. There are many different forms of DoS attack and size of attack could be varying from simple single attacker to a(More)
A heuristic approximation algorithm that can optimise the order of firewall rules to minimise packet matching is presented. It has been noted that firewall operators tend to make use of the fact that some firewall rules match most of the traffic, and conversely that others match little of the traffic. Consequently, ordering the rules such that the highest(More)
—This paper presents a proposition for information-centric networking (ICN) that lies outside the typical trajectory of aiming for a wholesale replacement of IP as the internetworking layer of the Internet. Instead, we propose that a careful exploitation of key ICN benefits, expanding previously funded ICN efforts, will enable individual operators to(More)
Recent years have witnessed explosive growth in traffic demands combined with evolving content characteristics and dissemination patterns. This growth has resulted in an increasing demand for information identification as well as information-based communication functions that can meet this evolution. Consequently, information-centric networking envisions a(More)
This paper presents a proposition for information centric networking (ICN) that lies outside the typical trajectory of aiming for a wholesale replacement of IP as the internetworking layer of the Internet. Instead, we propose that a careful exploitation of key ICN benefits, expanding previously funded ICN efforts, will enable individual operators to improve(More)
—Multicast data delivery can significantly reduce traffic in operators' networks, but has been limited in deployment due to concerns such as the scalability of state management. This paper shows how multicast can be implemented in contemporary software defined networking (SDN) switches, with less state than existing unicast switching strategies, by(More)
The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and(More)