Learn More
Peer-to-peer flow detection algorithm has been studied for several years. Port-based classification, regular expression, graphlet and various machine learning based algorithms have been proposed as solutions. Unfortunately, all previous algorithms have been failed in various aspects especially for the encrypted peer-to-peer traffic. In this paper, we(More)
Strict TCP-friendliness is a problematic issue that discourages multicast deployment on the Internet. In this paper, we therefore propose a new design of multi-rate multicast congestion control (MR-MCC) by revising our previous proposed MR-MCC protocol, namely explicit rate adjustment (ERA). In the new design, a multicast-supportive TCP-friendliness(More)
Overtaking maneuver on roads without a clear view can cause serious accident. Hence, real-time video streaming deliveries between two vehicles over Vehicular Ad Hoc Networks (VANETs) have been proposed as an overtaking maneuver assistance system. The system is also known as a V2V see-through system since it sends real-time video scenes seeing by a front(More)
Network security is usually protected by a firewall, which checks in-out packets against a set of defined policies or rules. Hence, the overall performance of the firewall generally depends on its rule management. For example, the performance can be decreased when there are firewall rule anomalies. The anomalies may happen when two sets of firewall rules(More)
SSL is a protocol for secured traffic connections. By using the SSL, HTTPS has been designed to prevent eavesdroppers and malicious users from web application services. However, man-in-the-middle attack techniques based on stripping and sniffing the HTTPS connections are still possible, causing security problems on web applications. Several scrip-kiddy(More)
A selective forwarding attack is a notorious security problem in MANET environments. The attacking method can seriously cause a failure in MANET transmission. So, several previous schemes have proposed to solve the problem. However, all of the previous schemes still have some drawbacks. Hence, in this paper, we have designed a new challenge and response(More)
Recently, there have been several potential attacks (e.g., bogus message, eavesdropping, source modification, invasion of privacy, and replays) on Wireless Access in Vehicular Environment (WAVE). Several solutions have been previously proposed. However, most of them are based on Public Key Infrastructure (PKI) and authentication in broadcast services. The(More)