نتایج جستجو برای: dns traffic analysis

تعداد نتایج: 2901162  

2005
Cynthia Wong Stan Bielski Ahren Studer Chenxi Wang

One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting techniques have appeared in the literature, each with a different take on the impetus behind rate limiting. This paper presents an empirical analysis on different rate limiting schemes using real traffic and attack traces fr...

2017
Je-Gun Joung Sang Yun Ha Joon Seol Bae Jae-Yong Nam Geum-Youn Gwak Hae-Ock Lee Dae-Soon Son Cheol-Keun Park Woong-Yang Park

Dysplastic nodules are premalignant neoplastic nodules found in explanted livers with cirrhosis. Genetic signatures of premalignant dysplastic nodules (DNs) with concurrent hepatocellular carcinoma (HCC) may provide an insight in the molecular evolution of hepatocellular carcinogenesis. We analyzed four patients with multifocal nodular lesions and cirrhotic background by whole-exome sequencing ...

2010
Tom Leighton Rajesh Krishnan

The DNS or Domain Name System is a critical piece of the Internet infrastructure. In recent times there have been numerous attacks on DNS, the Kaminsky attack being one of the more insidious ones. Current solutions to the problem involve patching the DNS software (Bind) and/or using DNSSEC. Unfortunately, these are forklift upgrades of the DNS infrastructure and are not always feasible especial...

2011
Ram Dantu Joao Cangussu Srikanth Palla

Phishing attackers masquerade as genuine senders and try to steal consumers' personal identity data and financial account credentials. In spite of aggressive efforts, technology companies have had limited success in restricting phishing attacks. Unfortunately the nature of phishing attacks changed over time from passive, such as password guessing and eavesdropping to active attacks, such as emp...

Journal: :Computer Networks 2012
Hyunsang Choi Heejo Lee

Botnets have become the main vehicle to conduct online crimes such as DDoS, spam, phishing and identity theft. Even though numerous efforts have been directed towards detection of botnets, evolving evasion techniques easily thwart detection. Moreover, existing approaches can be overwhelmed by the large amount of data needed to be analyzed. In this paper, we propose a light-weight mechanism to d...

2005
Chris J. Brandhorst Aiko Pras

This paper puts forward a purely statistical analysis of name server traffic captured at four different locations: two links to residential networks, and two to the Dutch academic and research institute. Analysis of the system can give insight in the use and performance of the protocol, which is helpful for future improvement. Multiple analyses can show the development of the performance over t...

2013
Charles Lever Manos Antonakakis Bradley Reaves Patrick Traynor Wenke Lee

Much of the attention surrounding mobile malware has focused on the in-depth analysis of malicious applications. While bringing the community valuable information about the methods used and data targeted by malware writers, such work has not yet been able to quantify the prevalence with which mobile devices are actually infected. In this paper, we present the first such attempt through a study ...

2015
Ethan Katz-Bassett

To speed web delivery, websites use content delivery networks (CDNs) to deliver content from servers around the world. How does the CDN direct a client to a nearby server? One approach is to use DNS to return different IP addresses depending on which client queries. This approach is complicated by the DNS architecture, in which the CDN's authoritative name server communicates only with the clie...

Objectives: Dynamic Neuromuscular Stabilization (DNS) approach evaluates and activates the spinal stabilizers to optimize the performance of posture and respiratory system. This study investigated the effects of DNS breathing exercises on upper and lower chest wall mobility (UCM and LCM), trunk extensor endurance, and thoracic kyphosis in a group of sedentary students with poor posture. Method...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید