-
261
Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior
Published 2024-01-01“…By scrutinizing a program’s network traffic configuration, Anteater efficiently pinpoints and intercepts the IP addresses associated with abnormal program access. …”
Get full text
Article -
262
-
263
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Published 2019-11-01“…We apply the proposed detection system on a combined set of three types of dynamic features, namely, (1) list of application programming interface calls; (2) application programming interface sequences; and (3) network traffic, which represents the IP addresses and domain names used by malware to connect to remote command-and-control servers. …”
Get full text
Article -
264
Who owns Internet of Thing devices?
Published 2018-11-01“…In particular, IoT devices in the cyberspace are reachable and visible through IP addresses. This article uniquely exploits to qualify the distribution of owner information of IoT devices based on the observation; consumers may write relevant details into the application-layer service on the IoT devices, such as company or usernames. …”
Get full text
Article -
265
A Blockchain-Enabled Secure Digital Twin Framework for Early Botnet Detection in IIoT Environment
Published 2022-08-01“…A Digital Twin (DT) is designed for a group of devices on the edge layer to collect device data and inspect packet headers using Deep Learning for connections with external unique IP addresses with open connections. Data are synchronized between the DT and a Packet Auditor (PA) for detecting corrupt device data transmission. …”
Get full text
Article -
266
Internet filters and academic freedom : librarian and stakeholder perceptions and their impact on access to information
Published 2021“…Filtering software is used in libraries to block Web-based content; this includes parts or all of certain websites, ranges of IP addresses, as well as key word level sifting of search results that delete or do not return all possible and alternative content. …”
Get full text
Journal Article -
267
Effective Flow Table Space Management Using Policy-Based Routing Approach in Hybrid SDN Network
Published 2022-01-01“…The network architecture employs a policy-based routing algorithm that takes advantage of free IP addresses from the free IP pool. The technique enables efficient use of available flow table space, which is critical in SDN architecture due to the small flow table size. …”
Get full text
Article -
268
Phenomenon of Webometrics Activity of Regional Libraries in Ukraine
Published 2019-01-01“…The main indicators of the quality of the web resource are defined: Alexa Rank, which reflects popularity on the Internet by visiting the pages of the site with unique IP addresses of users. The following indicators are also defined as additional important characteristics: domain rating, domain page rating, ranking of the site by the number of organic words on the first ten pages of search engines and total organic traffic to the site on key requests. …”
Get full text
Article -
269
-
270
Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds
Published 2005“…First,instead of authenticating clients based on whether theysolve the graphical test, Kill-Bots uses the test to quicklyidentify the IP addresses of the attack machines. Thisallows it to block the malicious requests while allowingaccess to legitimate users who are unable or unwillingto solve graphical tests. …”
Get full text
-
271
Outreach-focused enterprise network design I
Published 2024“…The outreach program is meticulously structured to cover crucial topics such as Internet Protocol (IP) addressing, Switchport Security, Virtual Local Area Networks (VLANs), Routing Protocols, Access Control Lists (ACLs) and the utilization of Cisco Packet Tracer simulation software for practical, hands-on learning experiences. …”
Get full text
Final Year Project (FYP) -
272
Automated network profile switcher (ANPROS) / Mohd Zairulhisyam Zakaria
Published 2007“…Network profile contains the configuration setting of network such as IP addresses on local area network. Usually there will be more than one network profile stored in a notebook of mobile user such as home, office or campus networks. …”
Get full text
Thesis -
273
Privacy-Preserving Passive DNS
Published 2020-08-01“…The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. …”
Get full text
Article -
274
Assessing the Security of Campus Networks: The Case of Seven Universities
Published 2021-01-01“…Besides, it also shows that many security risks are concealed in campus networks, such as non-compliance IP addresses and domain names, system vulnerabilities and so on. …”
Get full text
Article -
275
A dynamic network traffic classifier using supervised ML for a Docker-based SDN network
Published 2021-07-01“…ML offers good performance to real-time traffic solutions without depending on well-known TCP or UDP port numbers, IP addresses, or encrypted payloads. In this paper, using three ML techniques, we first classify network flows with 3, 5, and 7 parameters giving up to 97.14% accuracy. …”
Get full text
Article -
276
Design and testing of an experimental IPv4-to-IPv6 transition network / Mustaffa Samad
Published 2006“…This has lead to the depletion of new Internet Protocol (IP) addresses worldwide. To overcome this predicament, the new Internet Protocol version 6 (IPv6) had been introduced. …”
Get full text
Article -
277
An access control for KUKTEM wired LAN AC spot
Published 2006“…Since all users gain access to internet through KUKTEM Wired LAN, due to this the speed of internet connection decreased and network become traffic.So to overcome this kind of problem, the system needs to change to more sophisticated and secure system.Thus,this Wired LAN System (AC-Spot) was developed specifically for KUKTEM users.This system not only control access the internet by users but it become helpful to administrator leT of KUKTEM in order to identify the person,time and IP Addresses of the users who browsing the internet.This Wired LAN System is easy to use because the architecture of the system is user-friendly.This system proved that,it is more efficitmt and secure compare to existing system.Application of this system developed by using PHP(Hypertext Preprocessor),JavaScript,HTML(Hypertext Markup Language)and Microsoft Office Access Generally hoped that,this system become more secure and efficient in KUKTEM internet networks compare to current existing system.…”
Get full text
Undergraduates Project Papers -
278
On Improving the Accuracy of Internet Infrastructure Mapping
Published 2023-01-01“…As a byproduct of our new method reported in this paper, we create a validation dataset that maps hundreds of IP addresses to geo-coordinate landmarks or vantage points, which is highly desirable for IP geolocation research. …”
Get full text
Article -
279
Designing a mapping visualization to integrate physical and cyber domains
Published 2018Get full text
Thesis -
280