Abstract

One of the most important challenges for network administrators is the identification of applications behind the Internet traffic. This identification serves for many purposes as in network security, traffic engineering and monitoring. The classical methods based on standard port [...]

Abstract

SDN approaches to inter-domain routing promise better traffic engineering, enhanced security, and higher automation. Yet, naïve deployment of SDN on the Internet is dangerous as the control plane expressiveness of BGP is significantly more limited than the data plane expressiveness [...]

Abstract

Part 2: Real World; International audience; In this paper, we present a practical approach to generate the constraint engine for an effective constraint-based intrusion detection system (IDS). The IDS framework was designed for safety-sensitive networks that involve limited-access [...]

Abstract

The paper considers the problem of constructing a full group of failure scenarios for physical infrastructures when subjected to cyber attacks (CAs). Physical infrastructures actually are systems of systems, or network of networks [1]. The main idea of the research rests on the assumption, [...]