Showing 221 - 240 results of 319 for search '"IP address"', query time: 0.09s Refine Results
  1. 221

    Detecting compromised email accounts via login behavior characterization by Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu

    Published 2023-09-01
    “…Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research. Additionally, our framework has the capability to uncover undisclosed malicious IP addresses.…”
    Get full text
    Article
  2. 222

    Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices by Erol Gelenbe, Mert Nakip

    Published 2022-01-01
    “…A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. …”
    Get full text
    Article
  3. 223

    In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time by Yanan Cheng, Yali Liu, Chao Li, Zhaoxin Zhang, Ning Li, Yuejin Du

    Published 2022-04-01
    “…Finally, we propose and implement a system to identify the correct IP addresses of blocked domain names in censored networks based on the characteristics of country-level DNS filtering.…”
    Get full text
    Article
  4. 224

    VoIP Network Forensics of Instant Messaging Calls by Soliman Abd Elmonsef Sarhan, Hassan A. Youness, Ayman M. Bahaa-Eldin, Ayman Elsayed Taha

    Published 2024-01-01
    “…This study proposes a network forensic approach (NFA) for correlating IM calls to identify suspects’ IP addresses. This approach involves capturing and analyzing IM call data, correlating the data with other network traffic, and using the correlation to identify suspects’ IP addresses. …”
    Get full text
    Article
  5. 225

    Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron by Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil, Zeeshan Najam

    Published 2023-02-01
    “…In this study, we address novel application layer DDoS attacks by analyzing the characteristics of incoming packets, including the size of HTTP frame packets, the number of Internet Protocol (IP) addresses sent, constant mappings of ports, and the number of IP addresses using proxy IP. …”
    Get full text
    Article
  6. 226

    Integrated Framework For Secure Distributed Management Of Duplicated Ipv6 Address Detection by Ul Rehman, Shafiq

    Published 2017
    “…Alamat bernegara auto-konfigurasi adalah ciri utama protokol IPv6, yang membolehkan tuan rumah untuk mengkonfigurasi alamat IP secara automatik tanpa perlu apa-apa perkhidmatan tambahan seperti; DHCPv6 Stateless address auto-configuration is the primary feature of IPv6 protocol, which allows hosts to configure IP addresses automatically without the need of any additional services such as; DHCPv6 …”
    Get full text
    Thesis
  7. 227
  8. 228

    The employee workplace registration data system by Aidas Dilius, Vaida Steponavičienė

    Published 2023-07-01
    “…When employees log in to the system, their IP addresses are automatically registered according to their home or company work environment. …”
    Get full text
    Article
  9. 229

    RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks by Zakwan AlArnaout, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly, Ahmed Shdefat

    Published 2022-12-01
    “…This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. …”
    Get full text
    Article
  10. 230

    A Reliable Implementation Method of Dual-host Hot Standby System of Coal Mine by BAO Jian-jun, HUO Zhen-long, FAN Jing

    Published 2010-11-01
    “…The method uses simplex and duplex hybrid operation mode to ensure real-time performance and data consistency, heart-beat connection and peer to peer message delivery mechanism to detect and report system faults, automatic data synchronization technology to decrease artificial intervention and improve maintainability, and virtual IP addressing method to implement transparent access and seamless switching of application layer. …”
    Get full text
    Article
  11. 231

    Classifying Database Users for Intrusion Prediction and Detection in Data Security by Cigdem Bakir*, Veli Hakkoymaz

    Published 2020-01-01
    “…In this study, a common model was created to detect user intrusions by taking into account criteria such as the number of transactions performed, their IP addresses, the amount of data they use, the transaction type they perform and the roles they undertake. …”
    Get full text
    Article
  12. 232

    Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks by Seok-Woo Jang, Gye-Young Kim, Siwoo Byun

    Published 2014-04-01
    “…The proposed approach first visualizes the IP addresses and ports of the senders and receivers into two-dimensional images. …”
    Get full text
    Article
  13. 233

    The effects of additive outliers in INAR(1) process and robust estimation by Marcelo Bourguignon, Klaus L. P. Vasconcellos

    Published 2018-07-01
    “…The proposed methods are applied to a dataset concerning the number of different IP addresses accessing the server of the pages of the Department of Statistics of the University of Würzburg. …”
    Get full text
    Article
  14. 234

    Fast flux service networks detection model by Salleh , Mohd. Zaim

    Published 2010
    “…This architecture enables frequent change of IP addresses and name servers which frustrate the trace back and web taken down from the authorities. …”
    Thesis
  15. 235

    Cascading verification initiated by switching attacks through compromised digital relays by Koji Yamashita, Zhiyuan Yang, Chee‐Wooi Ten, Soummya Kar, Andrew Ginter

    Published 2022-06-01
    “…Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial‐and‐error search. …”
    Get full text
    Article
  16. 236

    Design of security scheme to prevent DNS cache poisoning attacks by Chong, Zhan Ming

    Published 2019
    “…DNS is a protocol that translates domain names that are human readable into numerical Internet Protocol (IP) addresses which are computer readable. DNS efficiently runs all internet applications such as internet surfing, emailing, multimedia applications and many more. …”
    Get full text
    Final Year Project (FYP)
  17. 237

    An approach to improve the state scalability of source specific multicast by Al-Talib, Sahar A., Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2009
    “…The scheme consisted of two stages: Conclusion/Recommendations: The first stage was to cluster the receivers based on their IP addresses and the second stage was to reduce the multicast state at routers. …”
    Get full text
    Article
  18. 238

    AMiner: Search and Mining of Academic Social Networks by Wan, Huaiyu, Zhang, Yutao, Zhang, Jing, Tang, Jie

    Published 2019-03-01
    “…The system has been in operation since 2006 and has been accessed from more than 8 million independent IP addresses residing in more than 200 countries and regions.…”
    Get full text
    Article
  19. 239
  20. 240

    Study and design of IPv6 networks by Do, Xuan Quang

    Published 2013
    “…However, the concern on IPv6 only started rising few years ago, due to the fact that the world needs more IP addresses to serve human use. This report is the result obtained throughout a 1-year project implemented by the student including his self-research and implementation of an IPv6 enterprise network. …”
    Get full text
    Final Year Project (FYP)