Dragos Ilie | Blekinge Institute of Technology (original) (raw)

Papers by Dragos Ilie

Research paper thumbnail of Performance Comparison of IPv6 Multihoming and Mobility Protocols

Multihoming and mobility protocols enable computing devices to stay always best connected (ABC) t... more Multihoming and mobility protocols enable computing devices to stay always best connected (ABC) to the Internet. The focus of our study is on handover latency and rehoming time required by such protocols. We used simulations in OMNeT++ to study the performance of the following protocols that support multihoming, mobility or a combination thereof: Mobile IPv6 (MIPv6), Multiple Care-of Address Registration (MCoA), Stream Control Transmission Protocol (SCTP), and Host Identity Protocol (HIP). Our results indicate that HIP shows best performance in all scenarios considered.

Research paper thumbnail of Optimization Algorithms with Applications to Unicast QoS Routing in Overlay Networks

Abstract The research report is focused on optimization algorithms with application to quality of... more Abstract The research report is focused on optimization algorithms with application to quality of service (QoS) routing. A brief theoretical background is provided for mathematical tools in relation to optimization theory. The rest of the report provides a survey of different types of optimization algorithms: several numerical methods, a heuristics and a metaheuristic. In particular, we discuss basic descent methods,

Research paper thumbnail of Gnutella Network Traffic - Measurements and Characteristics

Research paper thumbnail of Privacy and DRM Requirements for Collaborative Development of AI Applications

Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018

The use of data is essential for the capabilities of Datadriven Artificial intelligence (AI), Dee... more The use of data is essential for the capabilities of Datadriven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other. This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. 1 INTRODUCTION Collaborative application development across organisations has become a major focus in Data-driven Artificial Intelligence (AI) system design when aiming at sophisticated AI applications[1, 2]. This collaboration process builds on specialisation in AI engineering and on re-useable AI objects, e.g. data set or Deep Learning models. These objects have been gathered or developed by thirdparties not designing the final application. The advantages of the process are potentially significant reductions of development cost and time and access to components that enable engineering for higher AI performance. The appealing features are evidenced by the development of AI pipelines [3], open source machine learning and data visualisation tools such as Orange [4] and the emerge of data marketplaces [5, 6]. This collaborative approach, however, comes at a cost. It imposes at least three fundamental challenges on the design process. First, the use of data intrinsically raises data privacy concerns.

Research paper thumbnail of Peer-to-peer traffic measurements

Blekinge Institute of Technology, Karlskrona, Sweden, Tech. Rep, 2005

Abstract The global Internet has emerged to become an integral part of everyday life. Internet is... more Abstract The global Internet has emerged to become an integral part of everyday life. Internet is now as fundamental a part of the infrastructure as is the telephone system or the road network. Peer-to-Peer (P2P) is the logical antithesis of the Client-Server (CS) paradigm that has been the ostensible predominant paradigm for IP-based networks since their inception. Current research indicates that P2P applications are responsible for a substantial part of the Internet traffic. New P2P services are developed and released at a high pace. ...

Research paper thumbnail of Measurement and analysis of BitTorrent signaling traffic

Proceedings of Nordic Teletraffic Seminar, Aug 1, 2004

BitTorrent is a second generation Peer-to-Peer application that has been recently developed as an... more BitTorrent is a second generation Peer-to-Peer application that has been recently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. The protocol relies on the use of swarming techniques for distributing ...

Research paper thumbnail of Measurement and analysis of Gnutella signaling traffic

IPSI 2004, Sep 1, 2004

Abstract—The paper reports on in-depth measurements and analysis of Gnutella signaling traffic co... more Abstract—The paper reports on in-depth measurements and analysis of Gnutella signaling traffic collected at the Blekinge Institute of Technology (BIT), Karlskrona, Sweden. The measurements are based on a week-long packet trace collected with help of the well-known tcpdump application. Furthermore, a novel approach has been used to measure and analyze Gnutella signaling traffic. Associated with this, a dedicated tcptrace module has been developed and used to decode the packet trace, down to individual Gnutella ...

Research paper thumbnail of Bittorrent session characteristics and models

The paper reports on a modeling and evaluation study of session characteristics of BitTorrent tra... more The paper reports on a modeling and evaluation study of session characteristics of BitTorrent traffic. BitTorrent is a second generation Peer-to-Peer (P2P) application recently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. Results are reported on measuring, modeling and analysis of application layer traces collected at the Blekinge Institute of Technology (BIT) and a local ISP. For doing this, a dedicated measurement infrastructure has been developed at BIT to ...

Research paper thumbnail of Traffic measurements of P2P systems

Swedish National on Computer Networking Workshop (SNCNW04), Nov 1, 2004

Abstract—The paper reports on a measurement infrastructure devel-oped at the Blekinge Institute o... more Abstract—The paper reports on a measurement infrastructure devel-oped at the Blekinge Institute of Technology (BIT) with the purpose to do traffic measurements and analysis on Peer-to-Peer (P2P) traffic. The measurement methodology is based on using application logging as well as link-layer packet capture. This offers the possibility to measure application layer information with link-layer accuracy. Details are reported on this methodology, together with description of the BIT measurement infrastructure. The paper also reports on traffic ...

Research paper thumbnail of Congestion and error control in overlay networks

Organization, 2007

In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an incre... more In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to difficult challenges for the Internet Service Providers (ISPs) to provide good QoS for their clients as well as for the ability to provide differentiated service subscriptions for those clients who are willing to pay more for value added services. Furthermore, a tremendous development of several types of overlay ...

Research paper thumbnail of Internet Content Distribution: Developments and Challenges

4th Swedish National Computer Networking Workshop SNCNW2006, 2006

Abstract—The paper reports on recent developments and challenges focused on multimedia distributi... more Abstract—The paper reports on recent developments and challenges focused on multimedia distribution over IP. These are subject for research within the research project” Routing in Overlay Networks (ROVER)”, recently granted by the EuroNGI Network of Excellence (NoE). Participants in the project are Blekinge Institute of Technology (BTH) in Karlskrona, Sweden, University of Bradford in UK, University of Catalunia in Barcelona, Spain and University of Pisa in Italy. The foundation of multimedia distribution is provided by several components, ...

Research paper thumbnail of M easurem ent and Analysis of BitTorrent

bth.se

BitTorrent is a second generation Peer-to-Peer application that has been re-cently developed as a... more BitTorrent is a second generation Peer-to-Peer application that has been re-cently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. The protocol relies on the use of swarming techniques for distributing ...

Research paper thumbnail of Measurement and Analysis of BitTorrent

Abstract BitTorrent is a second generation Peer-to-Peer application that has been re-cently devel... more Abstract BitTorrent is a second generation Peer-to-Peer application that has been re-cently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. The protocol relies on the use of swarming techniques for distributing ...

Research paper thumbnail of Seamless Roaming

Research paper thumbnail of Performance Comparison of IPv6 Multihoming and Mobility Protocols

Research paper thumbnail of Multimedia protocol decoding

Research paper thumbnail of Performance Comparison of KVM, VMware and XenServer using a Large Telecommunication Application

Research paper thumbnail of A PMIPv6 Approach to Maintain Network Connectivity During VM Live Migration Over the Internet

Research paper thumbnail of Gnutella network traffic: Measurements and characteristics

Research paper thumbnail of NEW FRONTIERS IN CREDIT RISK ANALYSIS

The emergence of credit risks in recent years has burned the world economy leading to the onset o... more The emergence of credit risks in recent years has burned the world economy leading to the onset of one of the toughest global economic crisis. Superficiality and incompetence demonstrated by the banking system in credit risk analysis has seen the highest peaks. Banks had as main objective winning new markets at any cost and risk management and banking marketing have

Research paper thumbnail of Performance Comparison of IPv6 Multihoming and Mobility Protocols

Multihoming and mobility protocols enable computing devices to stay always best connected (ABC) t... more Multihoming and mobility protocols enable computing devices to stay always best connected (ABC) to the Internet. The focus of our study is on handover latency and rehoming time required by such protocols. We used simulations in OMNeT++ to study the performance of the following protocols that support multihoming, mobility or a combination thereof: Mobile IPv6 (MIPv6), Multiple Care-of Address Registration (MCoA), Stream Control Transmission Protocol (SCTP), and Host Identity Protocol (HIP). Our results indicate that HIP shows best performance in all scenarios considered.

Research paper thumbnail of Optimization Algorithms with Applications to Unicast QoS Routing in Overlay Networks

Abstract The research report is focused on optimization algorithms with application to quality of... more Abstract The research report is focused on optimization algorithms with application to quality of service (QoS) routing. A brief theoretical background is provided for mathematical tools in relation to optimization theory. The rest of the report provides a survey of different types of optimization algorithms: several numerical methods, a heuristics and a metaheuristic. In particular, we discuss basic descent methods,

Research paper thumbnail of Gnutella Network Traffic - Measurements and Characteristics

Research paper thumbnail of Privacy and DRM Requirements for Collaborative Development of AI Applications

Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018

The use of data is essential for the capabilities of Datadriven Artificial intelligence (AI), Dee... more The use of data is essential for the capabilities of Datadriven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other. This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. 1 INTRODUCTION Collaborative application development across organisations has become a major focus in Data-driven Artificial Intelligence (AI) system design when aiming at sophisticated AI applications[1, 2]. This collaboration process builds on specialisation in AI engineering and on re-useable AI objects, e.g. data set or Deep Learning models. These objects have been gathered or developed by thirdparties not designing the final application. The advantages of the process are potentially significant reductions of development cost and time and access to components that enable engineering for higher AI performance. The appealing features are evidenced by the development of AI pipelines [3], open source machine learning and data visualisation tools such as Orange [4] and the emerge of data marketplaces [5, 6]. This collaborative approach, however, comes at a cost. It imposes at least three fundamental challenges on the design process. First, the use of data intrinsically raises data privacy concerns.

Research paper thumbnail of Peer-to-peer traffic measurements

Blekinge Institute of Technology, Karlskrona, Sweden, Tech. Rep, 2005

Abstract The global Internet has emerged to become an integral part of everyday life. Internet is... more Abstract The global Internet has emerged to become an integral part of everyday life. Internet is now as fundamental a part of the infrastructure as is the telephone system or the road network. Peer-to-Peer (P2P) is the logical antithesis of the Client-Server (CS) paradigm that has been the ostensible predominant paradigm for IP-based networks since their inception. Current research indicates that P2P applications are responsible for a substantial part of the Internet traffic. New P2P services are developed and released at a high pace. ...

Research paper thumbnail of Measurement and analysis of BitTorrent signaling traffic

Proceedings of Nordic Teletraffic Seminar, Aug 1, 2004

BitTorrent is a second generation Peer-to-Peer application that has been recently developed as an... more BitTorrent is a second generation Peer-to-Peer application that has been recently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. The protocol relies on the use of swarming techniques for distributing ...

Research paper thumbnail of Measurement and analysis of Gnutella signaling traffic

IPSI 2004, Sep 1, 2004

Abstract—The paper reports on in-depth measurements and analysis of Gnutella signaling traffic co... more Abstract—The paper reports on in-depth measurements and analysis of Gnutella signaling traffic collected at the Blekinge Institute of Technology (BIT), Karlskrona, Sweden. The measurements are based on a week-long packet trace collected with help of the well-known tcpdump application. Furthermore, a novel approach has been used to measure and analyze Gnutella signaling traffic. Associated with this, a dedicated tcptrace module has been developed and used to decode the packet trace, down to individual Gnutella ...

Research paper thumbnail of Bittorrent session characteristics and models

The paper reports on a modeling and evaluation study of session characteristics of BitTorrent tra... more The paper reports on a modeling and evaluation study of session characteristics of BitTorrent traffic. BitTorrent is a second generation Peer-to-Peer (P2P) application recently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. Results are reported on measuring, modeling and analysis of application layer traces collected at the Blekinge Institute of Technology (BIT) and a local ISP. For doing this, a dedicated measurement infrastructure has been developed at BIT to ...

Research paper thumbnail of Traffic measurements of P2P systems

Swedish National on Computer Networking Workshop (SNCNW04), Nov 1, 2004

Abstract—The paper reports on a measurement infrastructure devel-oped at the Blekinge Institute o... more Abstract—The paper reports on a measurement infrastructure devel-oped at the Blekinge Institute of Technology (BIT) with the purpose to do traffic measurements and analysis on Peer-to-Peer (P2P) traffic. The measurement methodology is based on using application logging as well as link-layer packet capture. This offers the possibility to measure application layer information with link-layer accuracy. Details are reported on this methodology, together with description of the BIT measurement infrastructure. The paper also reports on traffic ...

Research paper thumbnail of Congestion and error control in overlay networks

Organization, 2007

In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an incre... more In recent years, Internet has known an unprecedented growth, which, in turn, has lead to an increased demand for real-time and multimedia applications that have high Quality-of-Service (QoS) demands. This evolution lead to difficult challenges for the Internet Service Providers (ISPs) to provide good QoS for their clients as well as for the ability to provide differentiated service subscriptions for those clients who are willing to pay more for value added services. Furthermore, a tremendous development of several types of overlay ...

Research paper thumbnail of Internet Content Distribution: Developments and Challenges

4th Swedish National Computer Networking Workshop SNCNW2006, 2006

Abstract—The paper reports on recent developments and challenges focused on multimedia distributi... more Abstract—The paper reports on recent developments and challenges focused on multimedia distribution over IP. These are subject for research within the research project” Routing in Overlay Networks (ROVER)”, recently granted by the EuroNGI Network of Excellence (NoE). Participants in the project are Blekinge Institute of Technology (BTH) in Karlskrona, Sweden, University of Bradford in UK, University of Catalunia in Barcelona, Spain and University of Pisa in Italy. The foundation of multimedia distribution is provided by several components, ...

Research paper thumbnail of M easurem ent and Analysis of BitTorrent

bth.se

BitTorrent is a second generation Peer-to-Peer application that has been re-cently developed as a... more BitTorrent is a second generation Peer-to-Peer application that has been re-cently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. The protocol relies on the use of swarming techniques for distributing ...

Research paper thumbnail of Measurement and Analysis of BitTorrent

Abstract BitTorrent is a second generation Peer-to-Peer application that has been re-cently devel... more Abstract BitTorrent is a second generation Peer-to-Peer application that has been re-cently developed as an alternative to the classical client-server model to reduce the load burden on content servers and networks. The protocol relies on the use of swarming techniques for distributing ...

Research paper thumbnail of Seamless Roaming

Research paper thumbnail of Performance Comparison of IPv6 Multihoming and Mobility Protocols

Research paper thumbnail of Multimedia protocol decoding

Research paper thumbnail of Performance Comparison of KVM, VMware and XenServer using a Large Telecommunication Application

Research paper thumbnail of A PMIPv6 Approach to Maintain Network Connectivity During VM Live Migration Over the Internet

Research paper thumbnail of Gnutella network traffic: Measurements and characteristics

Research paper thumbnail of NEW FRONTIERS IN CREDIT RISK ANALYSIS

The emergence of credit risks in recent years has burned the world economy leading to the onset o... more The emergence of credit risks in recent years has burned the world economy leading to the onset of one of the toughest global economic crisis. Superficiality and incompetence demonstrated by the banking system in credit risk analysis has seen the highest peaks. Banks had as main objective winning new markets at any cost and risk management and banking marketing have