The Community for Technology Leaders
Internet Surveillance and Protection, International Conference on (2006)
Cap Esterel, Cote d'Azur, France
Aug. 26, 2006 to Aug. 28, 2006
ISBN: 0-7695-2649-7
TABLE OF CONTENTS
Introduction

Preface (PDF)

pp. xviii-xix
Introduction

Organizing Committee (PDF)

pp. xx-xxii
ICISP1: MONIT

Monitoring of SIP-Based Communication Using Signalling Information for Performance Measurements (Abstract)

Thomas Lindh , Royal Institute of Technology, KTH, Sweden
Emma Roos , Royal Institute of Technology, KTH, Sweden
pp. 1

VIP Bridge: Integrating Several Sensor Networks into One Virtual Sensor Network (Abstract)

Sungyoung Lee , Kyung Hee University, Korea
Wu Xiaoling , Kyung Hee University, Korea
Hui Xu , Kyung Hee University, Korea
Zhang Lin , Kyung Hee University, Korea
Jinsung Cho , Kyung Hee University, Korea
Shu Lei , Kyung Hee University, Korea
pp. 2

Monitoring & Forensic Analysis forWireless Networks (Abstract)

John Nelson , University of Limerick, Ireland
Kevin P. Mc Grath , University of Limerick, Ireland
pp. 4
ICISP2: IPERF I

Evaluation of a Multi-Queue Web Caching Scheme that Differentiates the Content-Type of Documents (Abstract)

E. Casilari , Universidad de Málaga, Spain
A. Triviño-Cabrera , Universidad de Málaga, Spain
F.J. González-Cañete , Universidad de Málaga, Spain
pp. 5

Complementary Visualization of perfSONAR Network Performance Measurements (Abstract)

Andreas Hanemann , Leibniz Supercomputing Center, Germany
Olav Kvittem , UNINETT, Norway
Igor Velimirovic , CARNet, Croatia
Luis Marta , Cientifica Nacional (FCCN), Portugal
Vedrin Jeliazkov , Bulgarian Academy of Sciences, Bulgaria
Joe Metzger , Lawrence Berkeley National Laboratory, USA
pp. 6

Modeling Internet Traffic: Performance Limits (Abstract)

J.M Garcia , LAAS-CNR, France
C. Bockstal , LAAS-CNR, France
H. Hassan , LAAS-CNR, France
pp. 7

Design and Evaluation of an Overload Control System for Crisis-RelatedWeb Server Systems (Abstract)

Jianhua Cao , Lund University, Sweden
Martin Höst , Lund University, Sweden
Christian Nyberg , Lund University, Sweden
Maria Kihl , Lund University, Sweden
Mikael Andersson , Lund University, Sweden
pp. 8
ICISP3: IPERF II

The Interaction of IGP Weight Optimization with BGP (Abstract)

Selin Cerav-Erbas , Universite catholique de Louvain, Belgium
Olivier Delcourt , Universit de Liege, Belgium
Bernard Fortz , Universite catholique de Louvain, Belgium
Bruno Quoitin , Universite catholique de Louvain, Belgium
pp. 9

Public Domain P2P File-Sharing Networks Measurements and Modeling (Abstract)

Juan R. Diaz , Polytechnic University of Valencia, Spain
Jose M. Jimenez , Polytechnic University of Valencia, Spain
Fernando Boronat , Polytechnic University of Valencia, Spain
Jaime Lloret , Polytechnic University of Valencia, Spain
pp. 10

Overload Protection in a SIP Signaling Network (Abstract)

Masataka Ohta , Kanagawa University, Japan
pp. 11

Evolution of the Current Telecommunications Networks and the Next Generation Optical Networks (Abstract)

Hüseyin Ekiz , Sakarya Üniversitesi, Turkey
Hayrettin Evirgen , Sakarya Üniversitesi, Turkey
Ali Yavuz Çakir , Osmangazi Üniversitesi, Turkey
Cebrail Taskin , Türk Telekom Genel Müdürlügü, Turkey
pp. 12
ICISP4: TRASI I

Initial Results from an IPv6 Darknet (Abstract)

Jonathan Stevens , BT Group plc
Matthew Ford , BT Group plc
John Ronan , TSSG/WIT
pp. 13

Traffic Analysis of a Congested Link (Abstract)

Denis Collange , France Télécom R&D
Patrick Brown , France Télécom R&D
pp. 14

Flow-Based Identification of P2P Heavy-Hitters (Abstract)

Thomas Dubendorfer , Swiss Federal Institute of Technology Zurich, Switzerland
Arno Wagner , Swiss Federal Institute of Technology Zurich, Switzerland
Lukas Hammerle , SWITCH, Switzerland
Bernhard Plattner , Swiss Federal Institute of Technology Zurich, Switzerland
pp. 15
ICISP5: TRASI II

Crawler Detection: A Bayesian Approach (Abstract)

Athena Stassopoulou , Intercollege, Cyprus
Marios D. Dikaiakos , University of Cyprus, Cyprus
pp. 16

On the Power-Law of the Internet and the Prediction of BGP Convergence (Abstract)

Jinjing Zhao , National University of Defense Technology, China
Peidong Zhu , National University of Defense Technology, China
Xicheng Lu , National University of Defense Technology, China
pp. 17

Monitoring Challenges and Approaches for P2P File-Sharing Systems (Abstract)

James Walkerdine , Lancaster University, UK
Danny Hughes , Lancaster University, UK
Kevin Lee , University of Manchester, UK
pp. 18
ICISP6: SYNEV

Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol (Abstract)

F. Yan , City University of Hong Kong
K. H. Yeung , City University of Hong Kong
C. Leung , City University of Hong Kong
pp. 19

Disaster Recovery Sites as a Tool of Managing Extreme Attacks (Abstract)

Nikos Alexandris , University of Piraeus, Greece
Emmanouil Serrelis , University of Piraeus, Greece
pp. 20

Simple Provisioning, Complex Consolidation - A Pragmatic Step Towards a New Optical Layer (Abstract)

Tivadar Jakab , Budapest University of Technology and Economics, Hungary
Tamás Kárász , Budapest University of Technology and Economics, Hungary
pp. 21

A New Planning Methodology for IP Networks with Dynamic Traffic Demand and Full Survivability Guarantee Against Link Failures (Abstract)

Kwok-shing Ho , The Chinese University of Hong Kong, Hong Kong
Kwok-wai Cheung , The Chinese University of Hong Kong, Hong Kong
pp. 22
ICISP7: USSAF I

A Generic Authentication System based on SIM (Abstract)

Audun Wangensteen , Norwegian University of Science and Technology, Norway
Lars Lunde , Norwegian University of Science and Technology, Norway
Do van Thanh , Telenor R&D
Ivar Jørstad , Norwegian University of Science and Technology, Norway
pp. 24

Using the Discrete Squaring Function in the Delayed Message Authentication Protocol (Abstract)

Toma-Leonida Dragomir , Politehnica University of Timisoara, Romania
Bogdan Groza , Politehnica University of Timisoara, Romania
Dorina Petrica , Politehnica University of Timisoara, Romania
pp. 25

Cooperative Itinerant Agents (CIA): Security Scheme for Intrusion Detection Systems (Abstract)

Rafael Páez , Technical University of Catalonia, Spain
Jordi Forné , Technical University of Catalonia, Spain
Cristina Satizábal , Technical University of Catalonia, Spain
pp. 26
ICISP8: USSAF II

Technical Infrastructure of a CSIRT (Abstract)

David Penedo , CERT.PT / FCCN, Portugal
pp. 27
ICISP9: RTSEC

Towards New Security Framework for Voice over IP (Abstract)

Carole Bassil , ENST Paris, CNRS, France
Ahmed Serhrouchni , ENST Paris, CNRS, France
Nicolas Rouhana , Saint-Joseph University, Lebanon
pp. 30

TOES: Trustful and Open e-Ordering Service for SMEs (Abstract)

Despina Polemi , University of Pireaus, Greece
Spyridon Papastergiou , University of Pireaus, Greece
pp. 31
Author Index

Author Index (PDF)

pp. 32
84 ms
(Ver )