internet control
Recently Published Documents


TOTAL DOCUMENTS

92
(FIVE YEARS 26)

H-INDEX

10
(FIVE YEARS 1)

2022 ◽  
Vol 71 (2) ◽  
pp. 2315-2331
Author(s):  
Tengfei Tu ◽  
Wei Yin ◽  
Hua Zhang ◽  
Xingyu Zeng ◽  
Xiaoxiang Deng ◽  
...  

Author(s):  
Ali Gezer

Delay related metrics are significant quality of service criteria for the performance evaluation of networks. Almost all delay related measurement and analysis studies take into consideration the reachable sources of Internet. However, unreachable sources might also shed light upon some problems such as worm propagation. In this study, we carry out a delay measurement study of unreachable destinations and analyse the delay dynamics of unreachable nodes. 2. Internet Control Message Protocol (ICMP) destination unreachable Internet Control Message Protocol-Destination Unreachable (ICMP T3) packets are considered for the delay measurement according to their code types which shows network un reach ability, host un reach ability, port un reach ability, etc. Measurement results show that unreachable sources exhibit totally different delay behaviour compared to reachable IP hosts. A significant part of the unreachable hosts experiences extra 3 seconds Round Trip Time (RTT) delay compared to accessible hosts mostly due to host un reach ability. It is also seen that, approximately 79% of destination un reach ability causes from host un reach ability. Obtained Hurst parameter estimation results reveal that unreachable host RTTs show lower Hurst degree compared to reachable hosts which is approximately a random behaviour. Unreachable sources exhibit totally different distributional characteristic compared to accessible ones which is best fitted with Phased Bi-Exponential distribution.


2021 ◽  
Vol 2131 (2) ◽  
pp. 022078
Author(s):  
P V Razumov ◽  
L V Cherckesova ◽  
O A Safaryan ◽  
I Strubchik

Abstract Reliable and timely detection of cyberattacks is becoming indispensable for securing networks and systems. Internet Control Message Protocol (ICMP) flood attacks continue to be one of the most serious threats in both IPv4 and IPv6 networks. There are various types of cybersecurity attacks based on ICMP protocols. Many ICMP protocols are very similar, so security managers might think they might have the same impact on the victim’s computer systems or servers.


2021 ◽  
pp. 026732312110121
Author(s):  
Víctor Sampedro ◽  
F Javier López-Ferrández ◽  
Patricia Hidalgo

This article analyses the digital shutdown experienced in Catalonia within the framework of the independence referendum of 1 October 2017, which had been declared illegal by Spain’s Constitutional Court. We question the notion of digital disintermediation and examine how Internet control and blackout processes are not exclusive to authoritarian political systems, but have instead begun to develop in Western democracies in situations of socio-political crisis. We analyse the type of shutdown implemented in Catalonia, the players (both institutional and corporate) taking part in the process, and the resistance strategies implemented by civil society to maintain the flow of digital communications. In our conclusion, we reflect upon the implications of the events that took place in Catalonia for the future of digital sovereignty and suggest further lines of research for monitoring similar shutdown processes.


2021 ◽  
Vol 5 (2) ◽  
pp. 66-87
Author(s):  
Sida Liu

Abstract In his book on legal reform in China after Mao, Stanley B. Lubman adopted the metaphor “bird in a cage” to describe the status of Chinese law at the turn of the twenty-first century. This article offers some general reflections on the social transformation of Chinese law since 1999, with the objective of explaining (1) how the legal bird has become a cage, and (2) how this new legal cage has been used to trap birds in Chinese society. It first traces the transformation of the legal bird into a cage in China’s reform era and then tells the stories of four species of birds currently confined in the legal cage, namely, hawks (state officials), crows (rights activists), sparrows (netizens), and ostriches (ordinary citizens). Laws related to the four species are concerned with combating corruption, political stability, internet control, and everyday life, respectively. By focusing on the four species of birds in the legal cage, this article offers a fresh understanding of how law interacts with various individuals and social groups in Chinese society and a sociolegal explanation of the social transformation of China’s legal system from 1999 to 2019.


Author(s):  
N.R. Krasovskaya ◽  
A.A. Gulyaev

In the information society, information is the basis for decision-making at all levels. However, in post-truth society, fake news and deepfakes are often created and distributed via artificial intelligence technologies. Confidence in information is gradually lost, and the creation of a way to accurately recognize its authenticity will become a scientific and technical discovery. The problem of identifying fake information also affects the identification of its primary source, which often uses fake accounts. Counties are concerned about the security of the information space. They are attempting to control the spread of fakes, deepfakes, and the creation of fake accounts in the Internet. Control can be global and nationally bureaucratic. Many countries, to various extents, are trying to control the Internet through national bureaucratic measures. However, everyone realizes that there are not enough global measures to control the Internet.


2020 ◽  
Vol 22 (5) ◽  
pp. 613-638
Author(s):  
Julien Chaisse

Abstract This article analyses the impact of China and, even more importantly, Chinese individuals on the governance of domain names, which form the fundamental structure of the Internet commons. Many commons exist in physical space, but increasingly, commons in digital space will be overexploited, and that is why the Internet and its interconnections, made of an unlimited number of domain names, need to be carefully regulated. Internet domain names are true economic assets which raise important legal issues in China and in the rest of the world. This article reviews the key developments in case law over the last decade with a focus on China. Interestingly, at least 35% of domain name disputes involve a Chinese responding party. The article shows that, despite being a major provider of users, China was never involved in the regulation and design of the Internet. In fact, China has rather emerged as a rule-shaker, given the large involvement of Chinese cybersquatters in the domain names case law. Fundamentally, this article shows that there is a tension between Internet control in China and global interconnection, which has had direct consequences for China’s engagement with ICANN and other institutions in charge of DNS globally.


Author(s):  
Dian Ahkam Sani ◽  
Immilda Lailatul Fijriyah

The development of technology has progressed very rapidly in a short period, as has technology that has recently been developed in various aspects of life, namely the Internet of Things. In the past, controlling household electrical appliances was usually done directly by pressing a button on the house's wall and was very ineffective when the house owner was out of town while the house was empty. With the Internet of Things technology, a system can be applied in everyday life, namely controlling household electrical appliances to turn off and remotely using internet communication via an android smartphone. In this system design, a control design using a series of microcontrollers and relays connected to a smartphone via the internet is used because the microcontroller already has a  Wireless Fidelity (WIFI) module. The results of controlled tests on household electrical appliances can run well. All components of the design of the device are well integrated with smartphones and the internet. Control can be done anywhere and anytime. System response during the day between 1-4 seconds and at night between 1-2 seconds.


Sign in / Sign up

Export Citation Format

Share Document