نتایج جستجو برای: dns traffic analysis
تعداد نتایج: 2901162 فیلتر نتایج به سال:
Background: Study on the effectiveness of new methods of low back pain treatment is very important due to its high prevalence. There is no consensus on the most effective treatment for low back pain, despite the existence of different treatments options. Objective: This study aims to assess the effect of 8 weeks of dynamic neuromuscular stabilization (DNS) and core stability (CS) exercises on ...
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS query messages. In this paper, we present and evaluate a novel and practical method that is able to distinguish between authentic and bogus DNS replies. The propo...
The Domain Name System (DNS) plays a crucial role in connecting services and users on the Internet. Since its first specification, DNS has been extended numerous documents to keep it fit for today’s challenges demands. And these are many. Revelations of snooping traffic led changes guarantee confidentiality queries. Attacks forge shore up integrity DNS. Finally, denial-of-service attack operati...
Currently, the primary concerns on Internet are security and privacy, particularly in encrypted communications to prevent snooping modification of Domain Name System (DNS) data by hackers who may attack using HTTP protocol gain illegal access information. DNS over HTTPS (DoH) is new that has made remarkable progress encrypting traffic modifying spying. To alleviate these challenges, this study ...
Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users such as privacy and security, it also causes a problem in that network administrators are prevented from detecting suspicious traffic generated by malware malicious tools. To support their efforts maintaining this paper, we propose novel system identifies tunnel tools through hierarchical classification metho...
Middleboxes are widely used in today’s Internet, especially for security and performance. Recent studies have uncovered and studied middleboxes in different types of networks. Middleboxes classify, filter and shape traffic, therefore interfering with application performance. In this paper, we propose a tool to detect and locate middlebox interference for specific applications, specifically DNS ...
Buffer overflow attacks are one of the most important attack classes because they enable an attacker to remotely execute arbitrary code at the target host. These attacks generaly disturb the network traffic at the application level by delivering anomalous data to the target applications. This work presents a prototype to detect anomalous network traffic containing executable code at the applica...
This paper proposes a new naming framework for Domain Name System (DNS) Name Autoconfiguration (calledDNSNA) for Internet of Things (IoT) devices in Internet Protocol (IP) version 6 (IPv6) and IP version 4 (IPv4) networks. As the number of IoT devices increases, it can be a burden for users tomanually configure the DNS names of the IoT devices. We propose DNSNA to provide an efficient DNS namem...
Our understanding of IPv6 deployment is surprisingly limited. In fact, it is not even clear how we should quantify IPv6 deployment. In this paper, we collect and analyze a variety of data to characterize the penetration of IPv6. We show that each analysis leads to somewhat different conclusions. For example: registry data shows IPv6 address allocations are growing rapidly, yet BGP table dumps i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید