نتایج جستجو برای: dns

تعداد نتایج: 3862  

Journal: :Applied Mathematics & Information Sciences 2013

Journal: :Belügyi Szemle 2015

Journal: :Journal of Digital Forensics, Security and Law 2012

2013
M. Krochmal

One of the goals of the authors of Multicast DNS (mDNS) and DNS-Based Service Discovery (DNS-SD) was to retire AppleTalk and the AppleTalk Name Binding Protocol (NBP) and to replace them with an IP-based solution. This document presents a brief overview of the capabilities of AppleTalk NBP and outlines the properties required of an IP-based replacement.

2005
D. M. Coward M. Lilley E. J. Howell R. R. Burman D. G. Blair

Gravitational waves generated by the final merger of double neutron star (DNS) binary systems are a key target for the gravitational wave (GW) interferometric detectors, such as LIGO, and the next generation detectors, Advanced LIGO. The cumulative GW signal from DNS mergers in interferometric data will manifest as ‘geometrical noise’: a non-continuous stochastic background with a unique statis...

2013
Roee Hay Jonathan Kalechstain Gabi Nakibly

We begin by describing the basics of the DNS protocol. We continue with a survey of known attacks on DNS, and finalize with a genuine, deterministic attack against BIND’s SRTT (Smoothed Round Trip Time) algorithm. Our method enables derandomization of the target name server thus reduces the expected time of DNS cache poisoning attacks.

2012
Samuel Marchal Thomas Engel

In this paper we present an architecture for large scale DNS monitoring. The analysis of DNS traffic is becoming of first importance currently, as it allows to monitor the main part of the interactions on the Internet. DNS traffic can reveal anomalies such as worm infected hosts, botnets or spam participating hosts. The efficiency and the speed of detection of such anomalies rely on the capacit...

2009
Yanbin Lu

In current DNS environment, each DNS query generated by a user reveals the origin and target of that query. Over time, a user’s browsing behavior and target domain name’s popularity might be exposed to entities with little or no trust. This paper presents the design and evaluation of a PrivacyPreserving Domain Name System (PPDNS), which prevents privacy leaks during domain name resolution with ...

2012
Andreas Berger Eduard Natale

The DNS infrastructure is a key component of the Internet and is thus used by a multitude of services, both legitimate and malicious. Recently, several works demonstrated that malicious DNS activity usually exhibits observable dynamics that may be exploited for detection and mitigation. Clearly, reliable differentiation requires legitimate activity to not show these dynamics. In this paper, we ...

Journal: :Computer Communications 2014
Jehyun Lee Heejo Lee

Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious software controlled remotely is addressed as one of the most critical methods for executing the malicious activities. Since blocking domain names for command and control (C&C) of the malwares by analyzing their Domain Name System (DNS) activities has been the most effective ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید