Martin J. Reed

Learn More
This paper presents a comparative study of two well-known network simulators: OPNET Modeler and Ns2. Other studies in this area have generally been confined to just one simulator. The motivation of this paper is to provide a guide to researchers undertaking packet-level network simulations. The simulator outputs were compared to the output from a live(More)
A heuristic approximation algorithm that can optimise the order of firewall rules to minimise packet matching is presented. It has been noted that firewall operators tend to make use of the fact that some firewall rules match most of the traffic, and conversely that others match little of the traffic. Consequently, ordering the rules such that the highest(More)
Recent years have witnessed explosive growth in traffic demands combined with evolving content characteristics and dissemination patterns. This growth has resulted in an increasing demand for information identification as well as information-based communication functions that can meet this evolution. Consequently, information-centric networking envisions a(More)
This paper presents a proposition for information centric networking (ICN) that lies outside the typical trajectory of aiming for a wholesale replacement of IP as the internetworking layer of the Internet. Instead, we propose that a careful exploitation of key ICN benefits, expanding previously funded ICN efforts, will enable individual operators to improve(More)
The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and(More)
Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making the forwarding fabric resistant to unauthorized traffic. This resistance can be achieved by dynamically computing the link identifiers on the base of the packet content such as path in-out interfaces and keys of forwarding nodes(More)
In the last decade, denial of service (DoS) becomes one of the most significant security threats in the Internet. The existing limitations of the Internet protocols and the available tools make DoS attack easy to launch and effective in damage. There are many different forms of DoS attack and size of attack could be varying from simple single attacker to a(More)
Information Centric Network is a brand new architecture that focuses on the information objects rather than the location of end users. It aims to replace the current end-to-end model with the publish-subscribe model to solve many issues including security, routing scalability, mobility. One of the main features in this network is the use of a simple and(More)
It is an assumption that selective encryption does not strongly protect confidentiality owing to the partial visibility of some video data. This is because, though encryption keys may be difficult to derive, an enhanced version of selectively encrypted video sequence might be found from knowledge of the unencrypted parts of the sequence. An efficient(More)