نتایج جستجو برای: شبیهسازی عددی مستقیم dns

تعداد نتایج: 62200  

2018
Sarah Scheffler Sean Smith Yossi Gilad Sharon Goldberg

To combat Domain Name System (DNS) cache poisoning attacks and exploitation of the DNS as amplifier in denial of service (DoS) attacks, many recursive DNS resolvers are configured as “closed” and refuse to answer queries made by hosts outside of their organization. In this work, we present a technique to induce DNS queries within an organization, using the organization’s email service and the S...

Journal: :J. Network and Computer Applications 2015
Xiaobo Ma Junjie Zhang Zhenhua Li Jianfeng Li Jing Tao Xiaohong Guan John C. S. Lui Donald F. Towsley

As the hidden backbone of today's Internet, the Domain Name System (DNS) provides name resolution service for almost every networked application. To exploit the rich DNS query information for traffic engineering or user behavior analysis, both passive capturing and active probing techniques have been proposed in recent years. Despite its full visibility of DNS behaviors, the passive capturing t...

2015
Christian Grothoff Matthias Wachs Monika Ermert Jacob Appelbaum

On the net, close to everything starts with a request to the Domain Name System (DNS), a core Internet protocol to allow users to access Internet services by names, such as www.example.com, instead of using numeric IP addresses, like 2001:DB8:4145::4242. Developed in the “Internet good old times” the contemporary DNS is like a large network activity chart for the visually impaired. Consequently...

Journal: :CoRR 2009
Ahmed M. Manasrah Awsan Hasan Omar Amer Abouabdalla Sureswaran Ramadass

The botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It is important to build a suitable solution for botnet detection in the DNS traffic an...

2009
Kazuya Takemori Dennis Arturo Ludeña Shinichiro Kubota Kenichi Sugitani Yasuo Musashi

We carried out an entropy study on the DNS query traffic from the Internet to the top domain DNS server in a university campus network through January 1st to March 31st, 2009. The obtained results are: (1) We observed a difference for the entropy changes among the total-, the A-, and the PTR resource records (RRs) based DNS query traffic from the Internet through January 17th to February 1st, 2...

2012
Mei-Hua Hu Jing-Long Huang Kuang-Lin Lin Go-Shine Huang Huei-Shyong Wang Ming-Liang Chou Po-Cheng Hung

Objective: The occurrence of Delayed Neuropsychiatric Sequelae (DNS) after Carbon Monoxide (CO) poisoning is uncommon in children. Early identification of risk factors for the development of DNS in pediatric emergency departments is important. The objective of this study was to analyze risk factors for DNS after CO poisoning. Methods: We retrospectively analyzed children with CO poisoning admit...

2014
Marcel Waldvogel Thomas Zink

SRV records, DNSSEC, and DANE among others fortify the Domain Name System as the central information hub behind the Internet. Largely hidden from the end user, an increasing number of protocol and trust decisions are contingent on DNS. Neglect or attacks on DNS have much more impact today than ever, now endangering security far beyond denial of service. Opportunistic Persistent DNS (opDNS) addr...

2007
Jon Oberheide Manish Karir Zhuoqing Morley Mao

Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection. While the attack traffic gleaned from such deployments has been thoroughly scrutinized, little attention has been paid to DNS queries targeting these addresses. In this paper, we introduce the concept of dark DNS, th...

2010
Tom Leighton Rajesh Krishnan

The DNS or Domain Name System is a critical piece of the Internet infrastructure. In recent times there have been numerous attacks on DNS, the Kaminsky attack being one of the more insidious ones. Current solutions to the problem involve patching the DNS software (Bind) and/or using DNSSEC. Unfortunately, these are forklift upgrades of the DNS infrastructure and are not always feasible especial...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید