Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperAugust 2024
POSTER: Co4U: Efficient and Robust HTTP Message Compression for Edge Computing Networks
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosPages 81–82https://doi.org/10.1145/3672202.3673753Edge computing networks integrate computing, storage, and network resources at network edge nodes to provide infrastructure closer to users, enabling faster data processing, transmission, and service response. An increasing number of companies are ...
- research-articleJuly 2024
Investigating HTTP Covert Channels Through Fuzz Testing
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 19, Pages 1–9https://doi.org/10.1145/3664476.3664493Modern malware increasingly deploys network covert channels to prevent detection or bypass firewalls. Unfortunately, the early discovery of protocol fields and functional behaviors of traffic that can be abused to conceal information is very ...
- short-paperJuly 2024
HTTP/3's Extensible Prioritization Scheme in the Wild
ANRW '24: Proceedings of the 2024 Applied Networking Research WorkshopPages 1–7https://doi.org/10.1145/3673422.3674887For HTTP/2 and HTTP/3, multiple (Web page) resources are loaded by multiplexing them onto a single TCP or QUIC connection. A "prioritization system" is used to properly schedule the order in which the resources are sent. As HTTP/2's "prioritization tree" ...
- research-articleJuly 2024
Who's Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 843–855https://doi.org/10.1145/3634737.3637678HTTP is everywhere, and a consistent interpretation of the protocol's specification is essential for interoperability and security. In 2022, after more than 30 years of evolution, the core HTTP specifications became an Internet Standard. However, apart ...
- research-articleAugust 2024
On Reducing Network Usage with Genetic Improvement
GI '24: Proceedings of the 13th ACM/IEEE International Workshop on Genetic ImprovementPages 23–30https://doi.org/10.1145/3643692.3648262Mobile applications can be very network-intensive. Mobile phone users are often on limited data plans, while network infrastructure has limited capacity. There's little work on optimizing network usage of mobile applications. The most popular approach ...
-
- short-paperMarch 2024
Content Steering: a Standard for Multi-CDN Streaming
MHV '24: Proceedings of the 3rd Mile-High Video ConferencePage 128https://doi.org/10.1145/3638036.3640293DASH-IF Content Steering [4] (to be soon published as ETSI TS 103 998) is a new standard developed by the DASH Industry Forum (DASH-IF), defining means for managing DASH [5] media delivery using multiple content delivery networks (CDNs). At the server-...
- research-articleJanuary 2024
- research-articleApril 2024
Energy consumption of smartphones and IoT devices when using different versions of the HTTP protocol
AbstractHTTP is frequently used by smartphones and IoT devices to access information and Web services. Nowadays, HTTP is used in three major versions, each introducing significant changes with respect to the previous one. We evaluated the energy ...
- research-articleApril 2024
Surveillance Camera Using Wi-Fi Connection
Procedia Computer Science (PROCS), Volume 231, Issue CPages 721–726https://doi.org/10.1016/j.procs.2023.12.147AbstractThis research paper aims to design an energy-efficient surveillance camera utilizing the ESP32-CAM module, incorporating Wi-Fi connectivity, and using 3D printed custom case made from ABS plastic. The central goal is to determine the most ...
- ArticleApril 2024
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
AbstractThe increasing complexity of cyberattacks has prompted researchers to keep pace with this trend by proposing automated cyberattack classification methods. Current research directions favor supervised learning detection methods; however, they are ...
- research-articleOctober 2023
User plane acceleration service for next-generation cellular networks
Telecommunications Systems (TESY), Volume 84, Issue 4Pages 469–485https://doi.org/10.1007/s11235-023-01058-6AbstractReducing end-to-end latency is a key requirement for efficient and reliable new services offered by next-generation mobile networks. In this context, it is critical for mobile network operators (MNOs) to enable faster communications over backhaul ...
- research-articleJuly 2023
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters
The Journal of Supercomputing (JSCO), Volume 80, Issue 2Pages 1788–1817https://doi.org/10.1007/s11227-023-05453-3AbstractDenial of Service (DoS) attacks have evolved from volumetric attacks to target specific applications and can cripple different services with very limited effort. Hypertext Transfer Protocol (HTTP) is vulnerable to a slow rate DoS attack generated ...
- rfcJuly 2023
RFC 9457: Problem Details for HTTP APIs
This document defines a "problem detail" to carry machine-readable details of errors in HTTP response content to avoid the need to define new error response formats for HTTP APIs.
This document obsoletes RFC 7807.
- demonstrationApril 2023
How Streaming Can Improve the World (Wide Web)
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 140–143https://doi.org/10.1145/3543873.3587332Since its beginnings, web pages have been based on files. This means that HTML, CSS, and JavaScript are transferred from server to client as files, which by default need to be fully loaded before the web page is displayed. This render-blocking procedure ...
- research-articleApril 2023
Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses
AbstractThe allure of the metaverse along with Virtual Reality (VR) technologies and speed at which they are deployed may shift focus away from security and privacy fundamentals. In this work we employ classic exploitation techniques against cutting edge ...
- research-articleDecember 2022
A P4-based content-aware approach to mitigate slow HTTP POST attacks
EuroP4 '22: Proceedings of the 5th International Workshop on P4 in EuropePages 8–14https://doi.org/10.1145/3565475.3569075A slow HTTP POST attack is an application-layer distributed denial-of-service attack targeting web servers. The attacker simulates a legitimate user with a slow network speed and continues to send requests, resulting in server resources being ...
- research-articleAugust 2022
IoT platform for failure management in water transmission systems
Expert Systems with Applications: An International Journal (EXWA), Volume 199, Issue Chttps://doi.org/10.1016/j.eswa.2022.116974Highlights- An IoT platform for failure management of water transmission networks is proposed.
In aging water supply systems, many components have exceeded their service life. Consequently, tools are needed to efficiently manage the failures in these systems. This work describes the development and implementation of a web tool ...
- short-paperAugust 2022
Priority-aware forward error correction for HTTP
ANRW '22: Proceedings of the 2022 Applied Networking Research WorkshopArticle No.: 4, Pages 1–3https://doi.org/10.1145/3547115.3547195TCP has been replaced by QUIC in the latest version of HTTP (i.e., HTTP/3) to reduce the Head-Of-Line (HOL) blocking problem. Also, there have been improvements to HTTP's priority mechanism for Web resources, beyond the existing tree-based one, to ...
- rfcJuly 2022
RFC 9264: Linkset: Media Types and a Link Relation Type for Link Sets
This specification defines two formats and associated media types for representing sets of links as standalone documents. One format is based on JSON, and the other is aligned with the format for representing links in the HTTP "Link" header field. This ...
- rfcJune 2022
RFC 9113: HTTP/2
This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field ...