نتایج جستجو برای: dns traffic analysis
تعداد نتایج: 2901162 فیلتر نتایج به سال:
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting techniques have appeared in the literature, each with a different take on the impetus behind rate limiting. This paper presents an empirical analysis on different rate limiting schemes using real traffic and attack traces fr...
Dysplastic nodules are premalignant neoplastic nodules found in explanted livers with cirrhosis. Genetic signatures of premalignant dysplastic nodules (DNs) with concurrent hepatocellular carcinoma (HCC) may provide an insight in the molecular evolution of hepatocellular carcinogenesis. We analyzed four patients with multifocal nodular lesions and cirrhotic background by whole-exome sequencing ...
The DNS or Domain Name System is a critical piece of the Internet infrastructure. In recent times there have been numerous attacks on DNS, the Kaminsky attack being one of the more insidious ones. Current solutions to the problem involve patching the DNS software (Bind) and/or using DNSSEC. Unfortunately, these are forklift upgrades of the DNS infrastructure and are not always feasible especial...
Phishing attackers masquerade as genuine senders and try to steal consumers' personal identity data and financial account credentials. In spite of aggressive efforts, technology companies have had limited success in restricting phishing attacks. Unfortunately the nature of phishing attacks changed over time from passive, such as password guessing and eavesdropping to active attacks, such as emp...
Botnets have become the main vehicle to conduct online crimes such as DDoS, spam, phishing and identity theft. Even though numerous efforts have been directed towards detection of botnets, evolving evasion techniques easily thwart detection. Moreover, existing approaches can be overwhelmed by the large amount of data needed to be analyzed. In this paper, we propose a light-weight mechanism to d...
This paper puts forward a purely statistical analysis of name server traffic captured at four different locations: two links to residential networks, and two to the Dutch academic and research institute. Analysis of the system can give insight in the use and performance of the protocol, which is helpful for future improvement. Multiple analyses can show the development of the performance over t...
Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected. In this paper, we present the first such attempt through a study ...
To speed web delivery, websites use content delivery networks (CDNs) to deliver content from servers around the world. How does the CDN direct a client to a nearby server? One approach is to use DNS to return different IP addresses depending on which client queries. This approach is complicated by the DNS architecture, in which the CDN's authoritative name server communicates only with the clie...
Objectives: Dynamic Neuromuscular Stabilization (DNS) approach evaluates and activates the spinal stabilizers to optimize the performance of posture and respiratory system. This study investigated the effects of DNS breathing exercises on upper and lower chest wall mobility (UCM and LCM), trunk extensor endurance, and thoracic kyphosis in a group of sedentary students with poor posture. Method...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید