نتایج جستجو برای: dns

تعداد نتایج: 3862  

2001
Nevil Brownlee Kimberly C. Claffy Evi Nemeth

The Domain Name System (DNS) domain names to be used in network transactions (email, web requests, etc.) instead of IP addresses. The root of the DNS distributed database is managed by 13 root nameservers. We passively measure the performance of one of them: F.root-servers.net. These measurements show an astounding number of bogus queries: from 60-85% of observed queries were repeated from the ...

1996
Donald E. Eastlake Charlie Kaufman Donald Eastlake

Domain Name System (DNS) protocol extensions have been defined to authenticate the data in DNS and provide key distribution services (draft-ietf-dnssec-secext-10.txt). DNS Dynamic Update operations have also been defined (draft-ietf-dnsind-dynDNS-*.txt>, but without a detailed description of strong security for the update operation. This draft describes how to use DNS digital signatures coverin...

Journal: :CoRR 2016
Irvin Homem Panagiotis Papapetrou Spyridon Dosis

DNS tunneling techniques are often used for malicious purposes but network security mechanisms have struggled to detect these. Network forensic analysis has thus been used but has proved slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper we present a method to aid forensic analysis through automatin...

2011
Audun Jøsang Kashif Sana Dar

Globally unique domain names and IP addresses that are provided in real time by the DNS (Domain Name System) represent the fundamental signposts for navigating the Internet and for locating remote hosts. It is therefore paradoxical that the traditional method for secure identification of remote hosts is not directly based on DNS, but on the browser PKI which is external to the trust structure o...

1997
Parviz Moin Krishnan Mahesh

We review the direct numerical simulation (DNS) of turbulent flows. We stress that DNS is a research tool, and not a brute-force solution to the Navier-Stokes equations for engineering problems. The wide range of scales in turbulent flows requires that care be taken in their numerical solution. We discuss related numerical issues such as boundary conditions and spatial and temporal discretizati...

2017
Wataru Omori Kenichi Oga Kei Itagaki Minoru Takebayashi

Delayed neuropsychiatric sequelae (DNS) after acute carbon monoxide (CO) poisoning is a complication of CO intoxication. Hyperbaric oxygen (HBO) therapy is one of the only established treatments for CO poisoning, but as there is no specific treatment for DNS, the prognosis of DNS patients is generally poor. A 40-year-old male patient, following attempted suicide by CO poisoning, was referred to...

2007
Ziqian Liu Bradley Huffaker Marina Fomenkov Nevil Brownlee Kimberly C. Claffy

The DNS root nameservers routinely use anycast in order to improve their service to clients and increase their resilience against various types of failures. We study DNS traffic collected over a two-day period in January 2006 at anycast instances for the C, F and K root nameservers. We analyze how anycast DNS service affects the worldwide population of Internet users. To determine whether clien...

2015
Cory J. Butz

Darwinian networks (DNs) are introduced to simplify and clarify working with Bayesian networks (BNs). Rather than modelling the variables in a problem domain, DNs represent the probability tables in the model. The graphical manipulation of the tables then takes on a biological feel. It is shown how DNs can unify modeling and reasoning tasks into a single platform.

Journal: :CoRR 2017
Asaf Nadler Avi Aminov Asaf Shabtai

In the presence of security countermeasures, a malware designed for data exfiltration must do so using a covert channel to achieve its goal. Among existing covert channels stands the domain name system (DNS) protocol. Although the detection of covert channels over the DNS has been thoroughly studied in the last decade, previous research dealt with a specific subclass of covert channels, namely ...

2000
Steven Cheung Karl N. Levitt

Many network applic ationsdep end on the security of the domain name system (DNS). A ttackson DNS can cause denial of service and entity authentication to fail. In our appr oach,we use formal speci c ations to characterize DNS clients and DNS name servers, and to de ne a security goal: A name server should only use DNS data that is consistent with data from name servers that manage the correspo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید