نتایج جستجو برای: http traffic analysis

تعداد نتایج: 2996689  

1999
Balachander Krishnamurthy Jennifer Rexford

| Signiicant research on the Web is performed using logs collected from proxies and servers. Virtually all of these logs are from sites running the 1.0 version (or earlier) of HTTP. After four years a draft-standard speciication of HTTP/1.1 has emerged. However , many proxies and servers still use HTTP/1.0, and most so-called HTTP/1.1 servers do not employ all of the key features available in t...

2007
Kleber V. Cardoso José F. de Rezende

This paper presents a new HTTP traffic model based on the aggregation concept. The model development, evaluation and application are shown. In addition to the basic HTTP traffic characteristics, the traffic model has an easy and accurate load control. Some examples are provided to present the traffic model usage.

Journal: :CoRR 2018
Johann Vierthaler Roman Kruszelnicki Julian Schütte

With malware detection techniques increasingly adopting machine learning approaches, the creation of precise training sets becomes more and more important. Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for existing malware detection products. Int...

2003
Zhaoming Zhu Yonggen Mao Weisong Shi

Proxy caching and content distribution networks (CDNs) are two major approaches to improve Web application performance. Unfortunately, we have witnessed the inefficiency of them to the rapid growth of uncacheable HTTP content, resulting from ever-increasing dynamic Web services, cache busting technologies, and the emergency of various HTTP-based applications. Although several approaches have be...

Journal: :Journal of Applied Data Sciences 2022

In recent years, with the development of Internet, social networking, online banking, e-commerce and other network applications are growing rapidly. At same time, all kinds malicious web pages constantly emerging. Under new situation, security threats distributed, large-scale complex. New attack modes With more diverse devices access to our life is intelligent convenient, but also brings loopho...

Journal: :Computers & Security 2014
Aditya Oza Kevin Ross Richard M. Low Mark Stamp

HTTP Attack Detection using N-gram Analysis by Adityaram Oza Previous research has shown that byte level analysis of HTTP traffic offers a practical solution to the problem of network intrusion detection and traffic analysis. Such an approach does not require any knowledge of applications running on web servers or any pre-processing of incoming data. In this project, we apply three ngram based ...

2014
Yessica Nataliani Theophilus Wellem M. Iliofotou P. Pappu M. Faloutsos M. Mitzenmacher S. Singh D. Q. Le T. Jeong H. E. Roman

Graph-based techniques and analysis have been used for IP network traffic analysis. The objective of this paper is to study the hosts' interaction behavior and use graph clustering algorithm, the Markov clustering algorithm, to group (cluster) hosts which have interaction using the HTTP protocol. Using real network traces, the clustering results show that MCL algorithm successfully group t...

Journal: :افق دانش 0
محمد بکائیان m. bokaeian microbiology department, medicine school, zahedan university of medical sciences, zahedan, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران حامد طهماسبی h. tahmasebi microbiology department, medicine school, zahedan university of medical sciences, zahedan, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران علیرضا محمدزاده a.r. mohammadzadeh microbiology department, medicine school, gonabad university of medical sciences, gonabad, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی گناباد، گناباد، ایران جواد ادبی j. adabi microbiology department, medicine school, zahedan university of medical sciences, zahedan, iranگروه میکروب شناسی، دانشکده پزشکی، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران ناهید سپهری راد n. sepehri rad infectious diseases & tropical medicine research center, zahedan university of medical sciences,مرکر تحقیقات بیماری عفونی- گرمسیری، دانشگاه علوم پزشکی زاهدان، زاهدان، ایران

aims: it is very important to detect the coagulase-negative staphylococci, which produce the hospital infections. being one of the most expensive and time-consuming stages before the polymerase chain reaction (pcr), dna extraction is one of the primary stages of pcr. then, it should be noticed that the elimination of the stage might save time and costs. the aim of this study was to compare two ...

Journal: :ارتقای ایمنی و پیشگیری از مصدومیتها 0
حمید سوری h soori مرکز تحقیقات ارتقاء ایمنی و پیشگیری از مصدومیت ها، دانشکده بهداشت، دانشگاه علوم پزشکی شهید بهشتی، تهران، ایرانسازمان اصلی تایید شده: دانشگاه علوم پزشکی شهید بهشتی (shahid beheshti university of medical sciences)

intentional and unintentional injuries;healthy approach references haddon wjr, suchman e, klein d. accident research: methods and approaches. harper & row publishers, chicago, il, usa. 1964. global burden of diseases, world health organization, http://www.who.int/topics/global_burden_of_disease/en/ date of access, sept. 2012. iranian census center. http://www.amar.org.ir/ , date of access augus...

Journal: :Computer Networks 2017
Carlos Vega Paula Roquero Javier Aracil

In this paper we propose and implement novel techniques for performance evaluation of web traffic (response time, response code, etc.), with no reassembly of the underlying TCP connection, which severely restricts the traffic analysis throughput. Furthermore, our proposed software for HTTP traffic analysis runs in standard hardware, which is very cost-effective. Besides, we present sub-TCP conn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید