نتایج جستجو برای: http traffic analysis

تعداد نتایج: 2996689  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1388

abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...

Journal: :IEICE Transactions on Information and Systems 2015

Journal: :International Journal of Computer Applications 2014

Journal: :The Journal of Korea Information and Communications Society 2011

2012
Tuomo Sipola Antti Juvonen Joel Lehtonen

Dynamic web services are vulnerable to a multitude of intrusions that could be previously unknown. Server logs contain vast amounts of information about network traffic, and finding attacks from these logs improves the security of the services. In this research features are extracted from HTTP query parameters using 2-grams. We propose a framework that uses dimensionality reduction and clusteri...

2011
Marcin Pietrzyk Louis Plissonneau Guillaume Urvoy-Keller Taoufik En-Najjary

Some recent large scale studies on residential networks (ADSL and FTTH) have provided important insights concerning the set of applications used in such networks. For instance, it is now apparent that Web based traffic is dominating again at the expense of P2P traffic in lots of countries due to the surge of HTTP streaming and possibly social networks. In this paper we confront the analysis of ...

2016
Pavlos Lamprakis

Nowadays covert command and control (C&C) communication channels are built using the HTTP/HTTPS protocol, mainly because it is rarely blocked as well as malicious traffic can hide inside huge amounts of daily benign browsing traffic. This thesis addresses the problem of identifying malicious Web traffic and more specifically, post-infection traffic (C&C communication). We have built a system to...

2014
Xinying Liu Aidong Men

HTTP Adaptive Streaming (HAS) has become a prevailing technology for media delivery nowadays. It enables high quality streaming of media content over the internet delivered from conventional HTTP web servers. However, its on-off traffic pattern constructed by segmented transmission can lead to some performance problems, such as instability, inefficiency and unfairness, while multiple clients co...

2013
Yufei Cheng Egemen K. Çetinkaya James P. G. Sterbenz

Traffic generators have been essential for representing realworld traffic in network simulation studies. Furthermore, Internet-like traffic is a necessity when analysing the impact of different kinds of traffic on the network. In this paper, we present the implementation details of our HTTP traffic generator in the ns-3 network simulator. It is able to generate Internet-like as well as user-def...

2012
R. Sukanesh

Hackers uses Distributed Denial of Service (DDoS) and leaves hundreds and thousands of bots to overwhelm the victim in terms of bandwidth and reduce the services that are rendering to the users. To initiate an attack against victim, hackers use the internet as their venue. To address this threat various methods were proposed, but all the earlier method identifies the DDoS attack that exists in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید