-
241
Development and application of an environment monitoring system based on IPv6
Published 2022-09-01“…Abstract The widespread use of the Internet of Things (Iot) makes it possible to connect everything but having enough IP addresses is a fundamental requirement of this paradigm. …”
Get full text
Article -
242
Dynamic Server Selection by Using a Client Side Composite DNS-Metric
Published 2018-01-01“…The server selection is based on the calculations of a composite DNS-metric in which servers, whose IP addresses are sent in a DNS response, are ranked from the optimal to the least suitable. …”
Get full text
Article -
243
SISTEM MONITORING DENGAN MESSAGE MASTER MP1629-L PT. APLIKANUSA LINTASARTA JAKARTA SELATAN
Published 2013“…The result of this final project is Simonica is monitoring electricity supply, door status, temperature and air conditions by utilizing PT Aplikanusa Lintasartaâ��s networks with IP addresses that have been set in each device.…”
Thesis -
244
FA-AODV: Flooding Attacks Detection Based Ad Hoc On-Demand Distance Vector Routing Protocol for VANET
Published 2022-12-01“…A malicious node could penetrate into the IP addresses on a Flood Attack based User Datagram Protocol (UDP) to breakdown the data communication between two vehicles. …”
Get full text
Article -
245
A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection
Published 2016-10-01“…This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. …”
Get full text
Article -
246
P4-KBR: A Key-Based Routing System for P4-Programmable Networks
Published 2021-06-01“…In this paper, we propose an in-network key-based routing protocol called P4-KBR, in which end-points (hosts, contents or services) are identified by virtual identifiers (keys) instead of IP addresses, and where P4 network elements are programmed to be able to route the packets adequately. …”
Get full text
Article -
247
COVID-19 Treatments Sold Online Without Prescription Requirements in the United States: Cross-sectional Study Evaluating Availability, Safety and Marketing of Medications
Published 2022-02-01“…Patient safety characteristics, marketing techniques, price, legitimacy, IP addresses, and COVID-19 mentions were recorded. …”
Get full text
Article -
248
Graphical Representation of UWF-ZeekData22 Using Memgraph
Published 2024-03-01“…Node classification is used to predict the connection between IP addresses and ports as a form of attack tactic or non-attack tactic in the MITRE framework, implemented using Memgraph’s graph neural networks. …”
Get full text
Article -
249
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
Published 2006“…In this sense, the detectors that weintroduce are truly adaptive.We then introduce RBS+TRW, an algorithm that combines fan-out rate (RBS)and probability of failure (TRW) of connections to new destinations.RBS+TRW provides a unified framework that at one end acts as a pure RBSand at the other end as pure TRW, and extends RBS's power in detectingworms that scan randomly selected IP addresses.…”
Get full text
-
250
Overview of future internet: named data networking
Published 2019“…It evolved to access data independent from its location, by replacing IP addresses with content named. This paper reviews the most popular Information Centric Networking approaches, called Named Data Networking which is a clean-slate Internet architecture proposed to replace IP with hierarchical named content that utilizes route aggregation to improve scalability and support mobility. …”
Get full text
Conference or Workshop Item -
251
-
252
Design of security scheme to prevent DNS cache poisoning attacks
Published 2017“…DNS is a protocol which translate domain names to IP addresses of which network devices use to communicate with each other. …”
Get full text
Final Year Project (FYP) -
253
Honeynet as a service deployment approach in enabling virtual crime scene investigation
Published 2015“…For the participated organizations, unused IP addresses are being used as IP addresses for the HaaS honeypots. …”
Get full text
Thesis -
254
DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks
Published 2023-03-01“…Domain Name System (DNS) plays a critical role in the Internet ecosystem, translating numerical IP addresses to memorable domain names and vice versa. …”
Get full text
Article -
255
An Information-Centric Semantic Data Collection Tree for Wireless Sensor Networks
Published 2020-10-01“…Current routing and addressing operations in WSNs are based on IP addresses, while data collection and data queries are normally information-centric. …”
Get full text
Article -
256
PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
Published 2012“…A number of attacks to Honeyd originated from several host with private IP addresses from the internal network. Almost all attacks from hosts with Windows XP operating system, and 96.81% of attacks aimed at port 445. …”
Thesis -
257
Threat intelligence using machine learning packet dissection
Published 2021“…Categorical variables are the source and destination IP addresses, protocol used and packet info/flag. The use of filters allows ability to recognize any type of packet (e.g., SYN, ACK, FIN, RST). …”
Get full text
Article -
258
Magnets to Adversaries—An Analysis of the Attacks on Public Cloud Servers
Published 2023-11-01“…This work illustrates that adversary activity is highly versatile in the public cloud environment, with an average of 700 new and unique IP addresses found attacking honeypot infrastructure daily. …”
Get full text
Article -
259
Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App
Published 2021-08-01“…Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.…”
Get full text
Article -
260
BATCP: Bandwidth-Aggregation Transmission Control Protocol
Published 2017-08-01“…BATCP allows the use of multiple TCP connections to accept multiple IP addresses from a multi-homed node, scheduling segments among them based on a scheduling algorithm. …”
Get full text
Article