نتایج جستجو برای: dns traffic analysis

تعداد نتایج: 2901162  

Background: Study on the effectiveness of new methods of low back pain treatment is very important due to its high prevalence. There is no consensus on the most effective treatment for low back pain, despite the existence of different treatments options. Objective: This study aims to assess the effect of 8 weeks of dynamic neuromuscular stabilization (DNS) and core stability (CS) exercises on ...

2007
Georgios Kambourakis Tassos Moschos Dimitris Geneiatakis Stefanos Gritzalis

DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS query messages. In this paper, we present and evaluate a novel and practical method that is able to distinguish between authentic and bogus DNS replies. The propo...

Journal: :Computer Science Review 2022

The Domain Name System (DNS) plays a crucial role in connecting services and users on the Internet. Since its first specification, DNS has been extended numerous documents to keep it fit for today’s challenges demands. And these are many. Revelations of snooping traffic led changes guarantee confidentiality queries. Attacks forge shore up integrity DNS. Finally, denial-of-service attack operati...

Journal: :Computers 2023

Currently, the primary concerns on Internet are security and privacy, particularly in encrypted communications to prevent snooping modification of Domain Name System (DNS) data by hackers who may attack using HTTP protocol gain illegal access information. DNS over HTTPS (DoH) is new that has made remarkable progress encrypting traffic modifying spying. To alleviate these challenges, this study ...

Journal: :Lecture Notes in Computer Science 2021

Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users such as privacy and security, it also causes a problem in that network administrators are prevented from detecting suspicious traffic generated by malware malicious tools. To support their efforts maintaining this paper, we propose novel system identifies tunnel tools through hierarchical classification metho...

2015
Shan Huang Giuseppe Aceto Félix Cuadrado Steve Uhlig Antonio Pescapè

Middleboxes are widely used in today’s Internet, especially for security and performance. Recent studies have uncovered and studied middleboxes in different types of networks. Middleboxes classify, filter and shape traffic, therefore interfering with application performance. In this paper, we propose a tool to detect and locate middlebox interference for specific applications, specifically DNS ...

2007
Diego Souza Campos Paulo Lício de Geus

Buffer overflow attacks are one of the most important attack classes because they enable an attacker to remotely execute arbitrary code at the target host. These attacks generaly disturb the network traffic at the application level by delivering anomalous data to the target applications. This work presents a prototype to detect anomalous network traffic containing executable code at the applica...

2018
Keuntae Lee Seokhwa Kim Jaehoon Jeong Sejun Lee Hyoungshick Kim Jung-Soo Park

This paper proposes a new naming framework for Domain Name System (DNS) Name Autoconfiguration (calledDNSNA) for Internet of Things (IoT) devices in Internet Protocol (IP) version 6 (IPv6) and IP version 4 (IPv4) networks. As the number of IoT devices increases, it can be a burden for users tomanually configure the DNS names of the IoT devices. We propose DNSNA to provide an efficient DNS namem...

2009
Elliott Karpilovsky Alexandre Gerber Dan Pei Jennifer Rexford Aman Shaikh

Our understanding of IPv6 deployment is surprisingly limited. In fact, it is not even clear how we should quantify IPv6 deployment. In this paper, we collect and analyze a variety of data to characterize the penetration of IPv6. We show that each analysis leads to somewhat different conclusions. For example: registry data shows IPv6 address allocations are growing rapidly, yet BGP table dumps i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید