نتایج جستجو برای: http traffic analysis
تعداد نتایج: 2996689 فیلتر نتایج به سال:
abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...
Dynamic web services are vulnerable to a multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the security of the services. In this research features are extracted from HTTP query parameters using 2-grams. We propose a framework that uses dimensionality reduction and clusteri...
Some recent large scale studies on residential networks (ADSL and FTTH) have provided important insights concerning the set of applications used in such networks. For instance, it is now apparent that Web based traffic is dominating again at the expense of P2P traffic in lots of countries due to the surge of HTTP streaming and possibly social networks. In this paper we confront the analysis of ...
Nowadays covert command and control (C&C) communication channels are built using the HTTP/HTTPS protocol, mainly because it is rarely blocked as well as malicious traffic can hide inside huge amounts of daily benign browsing traffic. This thesis addresses the problem of identifying malicious Web traffic and more specifically, post-infection traffic (C&C communication). We have built a system to...
HTTP Adaptive Streaming (HAS) has become a prevailing technology for media delivery nowadays. It enables high quality streaming of media content over the internet delivered from conventional HTTP web servers. However, its on-off traffic pattern constructed by segmented transmission can lead to some performance problems, such as instability, inefficiency and unfairness, while multiple clients co...
Traffic generators have been essential for representing realworld traffic in network simulation studies. Furthermore, Internet-like traffic is a necessity when analysing the impact of different kinds of traffic on the network. In this paper, we present the implementation details of our HTTP traffic generator in the ns-3 network simulator. It is able to generate Internet-like as well as user-def...
Hackers uses Distributed Denial of Service (DDoS) and leaves hundreds and thousands of bots to overwhelm the victim in terms of bandwidth and reduce the services that are rendering to the users. To initiate an attack against victim, hackers use the internet as their venue. To address this threat various methods were proposed, but all the earlier method identifies the DDoS attack that exists in ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید