Recently, business protocol discovery has taken more attention in the field of web services. This activity permits a better description of the web service by giving information about its dynamics. The latter is not supported by theWSDL language which concerns only the static part. The problem is that the only information available to construct the dynamic part is the set of log files saving the runtime interaction of the web service with its clients. In this paper, a new approach based on the Discrete Wavelet Transformation (DWT) is proposed to discover the business protocol of web services. The DWT allows reducing the problem space while preserving essential information. It also overcomes the problem of noise in the log files. The proposed approach has been validated using artificially-generated log files.
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
The article has presented the assumptions underlying the organization of emissions trading of greenhouse gases with a particular emphasis on CO2 emission allowances. Through the analysis of the literature, international activities were undertaken aimed at reducing greenhouse gas emissions into the atmosphere, starting from the First World Climate Conference organized in 1979. The origins and guidelines of the Kyoto Protocol were also given considerable attention. In addition to the description of the key assumptions of the Protocol and its main components, the characteristics of international trade in Kyoto units were also included. The mechanisms involved in international trade and the types of units traded in a detailed manner are described. In the next part of the article, emission trading systems operating in the world are characterized. In the second part of the paper special attention was paid to the conditionings of the European market, i.e. European Emissions Trading System – EU ETS. Historical events were presented that gave rise to the creation of the EU ETS. In the next steps, the types of units that are tradable were described. Furthermore, the trade commodity exchanges on which trade is conducted, the key factors determining the price of individual allowances are also indicated. In the last part of the article, relatively recent issues – the IED Directive and the BAT conclusions have been pointed out. Referring to the applicable regulations, the impact of their implementation on the situation of entities obliged to limit greenhouse gas emissions was analyzed. In the final phase, an attempt was made to assess the impact of IED and BAT to electricity prices.
This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are nointruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.