مقالههای Hassan Asgharian
توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقالههای نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده میشوند.
اطلاعات انتشار: پانزدهیمن کنفرانس مهندسی برق ایران، سال ۱۳۸۶
تعداد صفحات: ۶
Deterministic test generation algorithms are highly complex and time–consunung. Test generation requires new approach to generate test vectors under several constraints such as high fault coverage, testing time, and testing power. In this paper, a parallel genetic algorithm–based test ystem is presented to handle constraints mentioned above. This system is capable of high fault coverage for digital circuits. Here, we use an incremental approach to achieve minimum sequence of test vectors to reduce testing time and power consumption. A general fault simulator is employed to calccllate fault coverage. Experimental results show high k ~ dcto verage with ferv test vectors for most of the ISCAS benchmark ircuits. Achieved results show, our system oritperforms over the other traditional automa tic test vector generation algorithms. In some cases we have an improvement in test vector size more than two times compared to other algoritluns.<\div>
اطلاعات انتشار: کنفرانس بین المللی پژوهش های کاربردی در فناوری اطلاعات، کامپیوتر و مخابرات، سال ۱۳۹۴
تعداد صفحات: ۸
Satisfying the end users is the important goal of service providers recently due to the growing use of video and television–based services provided through next generation IP networks, such as IPTV, OTT–TV, Video on Demand, Web TV, Time Shifted TV, Catch up TV and Video Conference; and competition in this area, therefore Quality of experience (QoE) can be considered The most suitable criterion for this purpose.In this article we investigate the relationship between QoE and QoS parameters in IPTV systems thus we can estimate QoE by using Quality of service parameters. Proposed method for estimating QoE is a no reference model and has low processing time so it can estimate the quality of experience in real–time. We discuss in details the proposed model and implementation of our testbed and finally we evaluate this model. Our evaluation shows that the accuracy of this model is acceptable for our context.<\div>
اطلاعات انتشار: International Journal Information and Communication Technology Research، هشتم،شماره۱، Winter ۲۰۱۶، سال ۰
تعداد صفحات: ۹
Session Initiation Protocol (SIP) is the main signaling protocol of the next generation networks. The security issues of SIP–based entities (i.e. proxy servers and clients) have a direct impact on the perceived quality of experience of end users in multimedia sessions. In this paper, our focus is on the SIP flooding attacks including denial of service and distributed denial of service attacks. After classifying various types of SIP attacks based on their sources, we extract four feature sets based on the specification of its attack group, as well as the normal behavior of the SIP state machine specified in RFC 3261. We then minimize the number of derived features in each set to reduce the computational complexity of our proposed approach. This facilitates employing the engineered feature sets in embedded SIP–based devices such as cell phones and smart TVs. We evaluate the performance of the proposed feature sets in detecting SIP attack sequence. For this, we design and implement a real test–bed for SIP–based services to generate normal and attack traffics. The experimental results confirm that the engineered feature sets perform well in terms of detection accuracy and false alarm rates in classifying benign and anomaly traffic in various attack scenarios.
اطلاعات انتشار: Journal of Information Systems and Telecommunication، دوم،شماره۴(پياپي ۸)، Oct-Dec ۲۰۱۴، سال ۰
تعداد صفحات: ۹
The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We focused our studies on the detection of SIP DoS related vulnerabilities in VoIP infrastructures because of their generalization. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framework is provided by the concept of penetration testing and is designed to be flexible and extensible, and has the capability to customize for other similar session based protocols. To satisfy the above objectives, the framework is designed with five main modules for discovery, information modeling, operation, evaluation and report. After setting up a test–bed as a typical VoIP system to show the validity of the proposed framework, this system has been implemented as a SIP vulnerability scanner. We also defined appropriate metrics for gathering the performance statistics of SIP components. Our test–bed is deployed by open–source applications and used for validation and also evaluation of the proposed framework. The main contributions of this paper are its non–destructive manner in identifying vulnerabilities and incorporating the penetration testing ideas and steps in the overall architecture of our framework. We also defined appropriate metrics that help us to identify vulnerabilities in a black box penetration testing.
نمایش نتایج ۱ تا ۴ از میان ۴ نتیجه