نتایج جستجو برای: dns traffic analysis
تعداد نتایج: 2901162 فیلتر نتایج به سال:
— Domain Name System (DNS) maps domain names to IP addresses in the Internet. DNS can, however, be used as a Location Manager (LM) for mobility management in wireless mobile networks. The suitability and performance of DNS as a LM for locating mobile hosts (MH) has not been studied in the past. In this paper, we develop an analytical model to measure the performance of DNS as LM for IP diversit...
Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and providing invalid data for DNS lookups. The mechanisms have different accuracy/cost trade-offs. This paper examines a hybrid, two-stage system that redirects traffic that might need to be blocked to a proxy cache, which then takes ...
In this paper we present a plugin for OLSR. This plugin is used for adding an interface for between the olsrd daemon and other applications. Using the plugin, other applications, ranging from network services such as DNS, to broadcast voice traffic can use the broadcast mechanisms from the OLSR protocol. This means that the applications can flood the ad hoc network using the optimized MPR-funct...
A DNase encoded by integrated element CJIE1 inhibits natural transformation of Campylobacter jejuni.
The species Campylobacter jejuni is considered naturally competent for DNA uptake and displays strong genetic diversity. Nevertheless, nonnaturally transformable strains and several relatively stable clonal lineages exist. In the present study, the molecular mechanism responsible for the nonnatural transformability of a subset of C. jejuni strains was investigated. Comparative genome hybridizat...
The advent of grassroots content distribution systems (e.g., Gnutella, FreeNet, Napster, Oceanstore) indicates the need for a distributed data location algorithm [HBMKK00, Cla00, Fan00, K+00a]. In this paper we investigate three methods of data location: distance-vector routing and link-state vector routing using Bloom filters, and a naive cache sharing algorithm. These data location methods ar...
Understanding the network usage patterns of university users is very important today. This paper focuses on research DNS request behaviors in Shanghai, China. Based logs a large number recorded by CERNET, we conduct general analysis behavior browsing from two perspectives: characteristics users’ and market share CDN service providers. We also undertake experiments requests for providers using d...
This abstract aims to provide a comprehensive analysis of the intricacies DDoS attacks, which are increasingly prevalent and malicious cyber-attacks that disrupt normal flow traffic targeted server by exponentially increasing network traffic. To secure distributed systems against intrusion detection mechanisms machine learning techniques commonly employed. The CICDDoS2019 dataset is often utili...
Web caches are generally considered a useful tool because they reduce replication of network traffic flowing from original content sources. In this paper we experimentally characterise the network and transport layer consequences of web caching in the consumer ISP context. We instrumented a small number of Australian, broadband-attached homes to collect round-trip time (RTT) and hop count stati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید