Jason But
YOU?
Author Swipe
View article: Harvest-Now, Decrypt-Later: A Temporal Cybersecurity Risk in the Quantum Transition
Harvest-Now, Decrypt-Later: A Temporal Cybersecurity Risk in the Quantum Transition Open
Telecommunication infrastructures rely on cryptographic protocols designed for long-term confidentiality, yet data exchanged today faces future exposure when adversaries acquire quantum or large-scale computational capabilities. This harve…
View article: Demo: An SDN-driven Active Queue Management Architecture for Assisting Mission-Critical Traffic Flows in Industrial Automation Systems
Demo: An SDN-driven Active Queue Management Architecture for Assisting Mission-Critical Traffic Flows in Industrial Automation Systems Open
"Cloud-Fog Automation" envisages a fully digitalized and network-centric paradigm in next-generation industrial automation systems with the goal of providing network determinism. To this end, we designed a Software-Defined Networking (SDN)…
View article: An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks
An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks Open
The Internet of Things (IoT) and blockchain are emerging technologies that have attracted attention in many industries, including healthcare, automotive, and supply chain. IoT networks and devices are typically low-powered and susceptible …
View article: Netgear Powerline AV 200 XAVB2001 RTT measurements with SPP
Netgear Powerline AV 200 XAVB2001 RTT measurements with SPP Open
This report presents work that was performed to analyze the behaviour of traffic traversing Powerline adapters. Powerline adapters are networking equipment which modulate network traffic onto electrical wiring to transfer data. These adapt…
View article: Videoconferencing under FreeBSD
Videoconferencing under FreeBSD Open
This report was the result of some experimentation inspired by the recent purchase by CAIA of Logitech QuickCam Express Webcams. Windows is not the only OS used at CAIA, in fact, FreeBSD is commonly used for experimental purposes and also …
View article: User mounting of removable devices on FreeBSD 5.3
User mounting of removable devices on FreeBSD 5.3 Open
FreeBSD is a UNIX oriented operating system which is also the default desktop Operating System (OS) for many at the Centre for Advanced Internet Architectures (CAIA). While documentation for FreeBSD, its usage and configuration is plentifu…
View article: Rapidly Deployable Satellite-Based Emergency Communications Infrastructure
Rapidly Deployable Satellite-Based Emergency Communications Infrastructure Open
Communication infrastructure is crucial during emergencies because it ensures reliable coordination and information dissemination for effective search and rescue missions. However, these systems rely on physical structures, making them vul…
View article: Priority queuing of network game traffic over a DOCSIS Cable Modem link
Priority queuing of network game traffic over a DOCSIS Cable Modem link Open
Despite the greater bandwidth available for home Internet users, network problems continue to surface with regard to the mix of network applications being run. The ease in which Internet sharing can be configured, coupled with the increase…
View article: ANGEL flow classifier software architecture design document
ANGEL flow classifier software architecture design document Open
The Automated Network Games Enhancement Layer (ANGEL) project aims to leverage Machine Learning (ML) techniques to automate the classification and isolation of interactive (e.g. games, voice over IP) and non-interactive (e.g. web) traffic.…
View article: Analysis of power consumption in consumer ADSL modems
Analysis of power consumption in consumer ADSL modems Open
This report describes an experiment carried out to understand how traffic transfer affects power consumption on consumer-grade ADSL modems. Three ADSL modems were studied: a Linksys AG041, a Cisco 837 and a Netgear DG834G. Parallel streams…
View article: Measuring the processing performance of NetSniff: testbed design
Measuring the processing performance of NetSniff: testbed design Open
NetSniff is an IP traffic analysis tool currently utilised in low traffic scenarios. We wish to explore the possibility of expanding its use to higher traffic situations and networks. This technical report explains our motivation for doing…
View article: VTun UDP packet dissector for Wireshark/Ethereal
VTun UDP packet dissector for Wireshark/Ethereal Open
When testing new protocol implementations, VTun can be used to build large virtual networks with multiple hops and paths using a limited amount of hardware. However, it is often necessary to capture and analyse generated traffic to ensure …
View article: Improving NetSniff capture performance on FreeBSD by increasing the PCAP capture buffer size
Improving NetSniff capture performance on FreeBSD by increasing the PCAP capture buffer size Open
NetSniff is an IP traffic analysis tool that is capable of multi-protocol, live capture analysis. Previous work has revealed that under live capture situations, NetSniff performance was often limited not by available system resources, but …
View article: Generating CAIA technical reports and slide presentations using LATEX
Generating CAIA technical reports and slide presentations using LATEX Open
CAIA has traditionally provided OpenOffice templates to generate Technical Report formatted papers. This approach has limitations, modifying an existing Technical Report for submission to a conference of journal can be time consuming. LATE…
View article: Limitations of existing MPEG-1 ciphers for streaming video
Limitations of existing MPEG-1 ciphers for streaming video Open
Copyright protection is one of the many aspects of implementing a commercially successful video streaming service and encryption of content is one means through which Copyright can be protected. MPEG-1 is one of the many video compression …
View article: Measuring the live capture performance of NetSniff
Measuring the live capture performance of NetSniff Open
NetSniff is an IP traffic analysis tool currently used in low traffic scenarios. Before deployment under higher traffic scenarios, it is important to perform a study into the processing and live capture performance of NetSniff. We have pre…
View article: The effect of round trip time on competing TCP flows
The effect of round trip time on competing TCP flows Open
In this paper we describe experiments to investigate the interactions of competing TCP flows typical of a home network. Using a standard FreeBSD 8.2-RELEASE installation, we explore the relationship between queue sizes, congestion windows,…
View article: 802.11 wireless network access at Swinburne using FreeBSD 5.3
802.11 wireless network access at Swinburne using FreeBSD 5.3 Open
FreeBSD is a UNIX oriented operating system which is also the default desktop Operating System (OS) for many at the Centre for Advanced Internet Architectures (CAIA). While networking is a key feature of FreeBSD and other UNIX type OS's, s…
View article: Analyzing IP traffic captured by Netsniff
Analyzing IP traffic captured by Netsniff Open
This paper tends to be a complete user manual to analyse IP traffic captured by NetSniff over a FreeBSD machine. Netsniff is a multi-network-layered real-time traffic capture and analysis tool developed as part of the ICE3 project. logfile…
View article: ANGEL client manager software architecture design document
ANGEL client manager software architecture design document Open
The Automated Network Games Enhancement Layer (ANGEL) project aims to leverage Machine Learning (ML) techniques to automate the classification and isolation of interactive (e.g. games, voice over IP) and non-interactive (e.g. web) traffic.…
View article: Netsniff: design and implementation concepts
Netsniff: design and implementation concepts Open
This technical report gives an overview of the protocols netsniff currently understands. Also it describes the data netsniff extracts from the parsed protocols. It further gives an overview about the anonymisation schemes currently impleme…
View article: Bittorrent traffic classification
Bittorrent traffic classification Open
Bittorrent currently makes up a large proportion of Internet traffic. The main purpose of my project is to attempt to identify Bittorrent traffic from other kinds of traffic (with particular emphasis on FTP which provides similar functiona…
View article: SCTP NAT automatic test utilities
SCTP NAT automatic test utilities Open
The development of the SCTP NAT automatic test utilities is part of the SONATA[1] project to develop and release a BSD licensed implementation of a Network Address Translation (NAT) module that supports the Stream Control Transmission Prot…
View article: Generic attributes for Skype identification using machine learning
Generic attributes for Skype identification using machine learning Open
Identification of Skype traffic using machine learning is an area of current research interest. Previous Skype classifiers have usually been reliant on version specific features. Consequently, a classifier that works for a specific version…
View article: Measuring the processing performance of NetSniff
Measuring the processing performance of NetSniff Open
NetSniff is an IP traffic analysis tool currently used in low traffic scenarios. Before deployment under higher traffic scenarios, it is important to perform a study into the processing and live traffic capture performance of NetSniff. In …
View article: Installing Microsoft Office 2000 on FreeBSD 5.3
Installing Microsoft Office 2000 on FreeBSD 5.3 Open
FreeBSD, WINE and Microsoft Office typically do not live happily together. Reports on the web indicate that installation and operation is frustrating and fraught with difficulties. As part of a recent bout of enthusiasm, we have spent some…
View article: Requirements for a generic MPEG-1 cipher to function in an existing streaming server environment
Requirements for a generic MPEG-1 cipher to function in an existing streaming server environment Open
Copyright Protection is one of the many aspects of implementing a commercially successful video streaming solution. Copyright protection should be implemented using both passive schemes – such as watermarking – and active schemes – such as…
View article: An evaluation of current MPEG-1 ciphers and their applicability to streaming video
An evaluation of current MPEG-1 ciphers and their applicability to streaming video Open
Copyright protection is one of the many aspects of implementing a commercially successful video streaming service and encryption of content is one means through which Copyright can be protected.MPEG-1 is one of the many video compression t…