Somnuk Puangpronpitag

Learn More
Peer-to-peer flow detection algorithm has been studied for several years. Port-based classification, regular expression, graphlet and various machine learning based algorithms have been proposed as solutions. Unfortunately, all previous algorithms have been failed in various aspects especially for the encrypted peer-to-peer traffic. In this paper, we(More)
Strict TCP-friendliness is a problematic issue that discourages multicast deployment on the Internet. In this paper, we therefore propose a new design of multi-rate multicast congestion control (MR-MCC) by revising our previous proposed MR-MCC protocol, namely explicit rate adjustment (ERA). In the new design, a multicast-supportive TCP-friendliness(More)
ARP Spoof (aka. ARP cache poisoning) is a serious security problem. It can be used for Denial of Service (DoS) or Man In The Middle (MITM) attacks. There have been several solutions, proposed to solve this problem. Yet, all of the previous have some critical drawbacks such as infeasibility, unmanageability, high cost, performance penalty and(More)
Overtaking maneuver on roads without a clear view can cause serious accident. Hence, real-time video streaming deliveries between two vehicles over Vehicular Ad Hoc Networks (VANETs) have been proposed as an overtaking maneuver assistance system. The system is also known as a V2V see-through system since it sends real-time video scenes seeing by a front(More)
SSL is a protocol for secured traffic connections. By using the SSL, HTTPS has been designed to prevent eavesdroppers and malicious users from web application services. However, man-in-the-middle attack techniques based on stripping and sniffing the HTTPS connections are still possible, causing security problems on web applications. Several scrip-kiddy(More)
A selective forwarding attack is a notorious security problem in MANET environments. The attacking method can seriously cause a failure in MANET transmission. So, several previous schemes have proposed to solve the problem. However, all of the previous schemes still have some drawbacks. Hence, in this paper, we have designed a new challenge and response(More)
To provide VoIP traffic with message authentication and confidentiality, Secure Real Time Protocol (SRTP) and a media keying protocol are needed. SDP Security Description (SDES) is the most widely deployed keying protocol. It also needs Transport Layer Secure (TLS) over the VoIP signal protocol (SIP), known as SIPS. However, from several previous studies,(More)