-
221
Detecting compromised email accounts via login behavior characterization
Published 2023-09-01“…Our evaluation demonstrates that our method can detect most email accounts that have been accessed by disclosed malicious IP addresses and outperforms similar research. Additionally, our framework has the capability to uncover undisclosed malicious IP addresses.…”
Get full text
Article -
222
Traffic Based Sequential Learning During Botnet Attacks to Identify Compromised IoT Devices
Published 2022-01-01“…A novel online Compromised Device Identification System (CDIS) is presented to identify IoT devices and/or IP addresses that are compromised by a Botnet attack, within a set of sources and destinations that transmit packets. …”
Get full text
Article -
223
In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time
Published 2022-04-01“…Finally, we propose and implement a system to identify the correct IP addresses of blocked domain names in censored networks based on the characteristics of country-level DNS filtering.…”
Get full text
Article -
224
VoIP Network Forensics of Instant Messaging Calls
Published 2024-01-01“…This study proposes a network forensic approach (NFA) for correlating IM calls to identify suspects’ IP addresses. This approach involves capturing and analyzing IM call data, correlating the data with other network traffic, and using the correlation to identify suspects’ IP addresses. …”
Get full text
Article -
225
Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
Published 2023-02-01“…In this study, we address novel application layer DDoS attacks by analyzing the characteristics of incoming packets, including the size of HTTP frame packets, the number of Internet Protocol (IP) addresses sent, constant mappings of ports, and the number of IP addresses using proxy IP. …”
Get full text
Article -
226
Integrated Framework For Secure Distributed Management Of Duplicated Ipv6 Address Detection
Published 2017“…Alamat bernegara auto-konfigurasi adalah ciri utama protokol IPv6, yang membolehkan tuan rumah untuk mengkonfigurasi alamat IP secara automatik tanpa perlu apa-apa perkhidmatan tambahan seperti; DHCPv6 Stateless address auto-configuration is the primary feature of IPv6 protocol, which allows hosts to configure IP addresses automatically without the need of any additional services such as; DHCPv6 …”
Get full text
Thesis -
227
-
228
The employee workplace registration data system
Published 2023-07-01“…When employees log in to the system, their IP addresses are automatically registered according to their home or company work environment. …”
Get full text
Article -
229
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
Published 2022-12-01“…This type of attack uses spoofed Internet Protocol (IP) addresses for SYN packets by exploiting the weakness in Transmission Control Protocol (TCP) 3-Way handshake used by the TCP/IP suite of protocols, which make the web servers unreachable for legitimate users or even worse, it might lead to server crash. …”
Get full text
Article -
230
A Reliable Implementation Method of Dual-host Hot Standby System of Coal Mine
Published 2010-11-01“…The method uses simplex and duplex hybrid operation mode to ensure real-time performance and data consistency, heart-beat connection and peer to peer message delivery mechanism to detect and report system faults, automatic data synchronization technology to decrease artificial intervention and improve maintainability, and virtual IP addressing method to implement transparent access and seamless switching of application layer. …”
Get full text
Article -
231
Classifying Database Users for Intrusion Prediction and Detection in Data Security
Published 2020-01-01“…In this study, a common model was created to detect user intrusions by taking into account criteria such as the number of transactions performed, their IP addresses, the amount of data they use, the transaction type they perform and the roles they undertake. …”
Get full text
Article -
232
Clustering-Based Pattern Abnormality Detection in Distributed Sensor Networks
Published 2014-04-01“…The proposed approach first visualizes the IP addresses and ports of the senders and receivers into two-dimensional images. …”
Get full text
Article -
233
The effects of additive outliers in INAR(1) process and robust estimation
Published 2018-07-01“…The proposed methods are applied to a dataset concerning the number of different IP addresses accessing the server of the pages of the Department of Statistics of the University of Würzburg. …”
Get full text
Article -
234
Fast flux service networks detection model
Published 2010“…This architecture enables frequent change of IP addresses and name servers which frustrate the trace back and web taken down from the authorities. …”
Thesis -
235
Cascading verification initiated by switching attacks through compromised digital relays
Published 2022-06-01“…Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial‐and‐error search. …”
Get full text
Article -
236
Design of security scheme to prevent DNS cache poisoning attacks
Published 2019“…DNS is a protocol that translates domain names that are human readable into numerical Internet Protocol (IP) addresses which are computer readable. DNS efficiently runs all internet applications such as internet surfing, emailing, multimedia applications and many more. …”
Get full text
Final Year Project (FYP) -
237
An approach to improve the state scalability of source specific multicast
Published 2009“…The scheme consisted of two stages: Conclusion/Recommendations: The first stage was to cluster the receivers based on their IP addresses and the second stage was to reduce the multicast state at routers. …”
Get full text
Article -
238
AMiner: Search and Mining of Academic Social Networks
Published 2019-03-01“…The system has been in operation since 2006 and has been accessed from more than 8 million independent IP addresses residing in more than 200 countries and regions.…”
Get full text
Article -
239
-
240
Study and design of IPv6 networks
Published 2013“…However, the concern on IPv6 only started rising few years ago, due to the fact that the world needs more IP addresses to serve human use. This report is the result obtained throughout a 1-year project implemented by the student including his self-research and implementation of an IPv6 enterprise network. …”
Get full text
Final Year Project (FYP)