نتایج جستجو برای: http traffic analysis
تعداد نتایج: 2996689 فیلتر نتایج به سال:
| Signiicant research on the Web is performed using logs collected from proxies and servers. Virtually all of these logs are from sites running the 1.0 version (or earlier) of HTTP. After four years a draft-standard speciication of HTTP/1.1 has emerged. However , many proxies and servers still use HTTP/1.0, and most so-called HTTP/1.1 servers do not employ all of the key features available in t...
This paper presents a new HTTP traffic model based on the aggregation concept. The model development, evaluation and application are shown. In addition to the basic HTTP traffic characteristics, the traffic model has an easy and accurate load control. Some examples are provided to present the traffic model usage.
With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for existing malware detection products. Int...
Proxy caching and content distribution networks (CDNs) are two major approaches to improve Web application performance. Unfortunately, we have witnessed the inefficiency of them to the rapid growth of uncacheable HTTP content, resulting from ever-increasing dynamic Web services, cache busting technologies, and the emergency of various HTTP-based applications. Although several approaches have be...
In recent years, with the development of Internet, social networking, online banking, e-commerce and other network applications are growing rapidly. At same time, all kinds malicious web pages constantly emerging. Under new situation, security threats distributed, large-scale complex. New attack modes With more diverse devices access to our life is intelligent convenient, but also brings loopho...
HTTP Attack Detection using N-gram Analysis by Adityaram Oza Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to the problem of network intrusion detection and traffic analysis. Such an approach does not require any knowledge of applications running on web servers or any pre-processing of incoming data. In this project, we apply three ngram based ...
Graph-based techniques and analysis have been used for IP network traffic analysis. The objective of this paper is to study the hosts' interaction behavior and use graph clustering algorithm, the Markov clustering algorithm, to group (cluster) hosts which have interaction using the HTTP protocol. Using real network traces, the clustering results show that MCL algorithm successfully group t...
aims: it is very important to detect the coagulase-negative staphylococci, which produce the hospital infections. being one of the most expensive and time-consuming stages before the polymerase chain reaction (pcr), dna extraction is one of the primary stages of pcr. then, it should be noticed that the elimination of the stage might save time and costs. the aim of this study was to compare two ...
intentional and unintentional injuries;healthy approach references haddon wjr, suchman e, klein d. accident research: methods and approaches. harper & row publishers, chicago, il, usa. 1964. global burden of diseases, world health organization, http://www.who.int/topics/global_burden_of_disease/en/ date of access, sept. 2012. iranian census center. http://www.amar.org.ir/ , date of access augus...
In this paper we propose and implement novel techniques for performance evaluation of web traffic (response time, response code, etc.), with no reassembly of the underlying TCP connection, which severely restricts the traffic analysis throughput. Furthermore, our proposed software for HTTP traffic analysis runs in standard hardware, which is very cost-effective. Besides, we present sub-TCP conn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید