-
281
Defending against distributed denial of service (DDoS) attacks
Published 2013“…With such program monitoring the network traffic, systems can be notified of the IP addresses of the DDoS attackers and therefore deny their entries to the system.…”
Get full text
Final Year Project (FYP) -
282
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
Published 2015“…The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. …”
Get full text
Article -
283
DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain
Published 2023-07-01“…The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. …”
Get full text
Article -
284
Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks
Published 2022-05-01“…The NDN protocol routes the content from a producer to a consumer in a network using content names, instead of IP addresses. This facility, combined with content caching, efficiently serves content for very large networks consisting of a hybrid and ad hoc topology with both wired and wireless media. …”
Get full text
Article -
285
Organizational Solution Recommendations to the Problem of Child Pornography on The Internet
Published 2018-01-01“…Another conclusion of this study is that there is a pressing need to establish and umbrella institution which needs to be supported with a national child pornography image database to be used in order to uncover IP addresses and other data belonging to criminals who share, post, sell or view such images online. …”
Get full text
Article -
286
A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packe...
Published 2020-03-01“…In the proposed software-defined networking controlled vehicular named-data networking, IP addressing issue is resolved by named-data networking and global view of the network is attained by software-defined networking. …”
Get full text
Article -
287
An Ensemble of Text Convolutional Neural Networks and Multi-Head Attention Layers for Classifying Threats in Network Packets
Published 2023-10-01“…We also compute the embedding of various header data associated with packets such as IP addresses and ports. Given these features, we combine a text 1D CNN and a multi-head attention network in a novel fashion. …”
Get full text
Article -
288
Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol ver...
Published 2016“…It is not necessary that all instances must be connected to the internet or routed or transmitted simply because an IP addressing scheme is suggested. This is a means for identification that will be globally unique and offers the potential to be connected or routed via the internet. …”
Get full text
Working Paper -
289
The expressive power of the Internet design
Published 2022“…Most fields (e.g. packet length) are unremarkable, some (like the TOS bits) have been redefined several times in the history of the Internet, some (like the options) have atrophied, and some (most obviously the IP addresses) have had a most interesting history in which the only constants are that they are 32 bit fields, that whatever value they have at each end must remain constant for the life of a TCP connection (because of the pseudo-header) and that at any locale in the network, they must provide the basis for some router action. …”
Get full text
Working Paper -
290
-
291
Threat intelligence using machine learning packet dissection
Published 2021“…Categorical variables are the source and destination IP addresses, protocol used and packet info/flag. The use of filters allows to recognize any type of packet. …”
Get full text
Conference or Workshop Item -
292
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
Published 2020“…Internet Protocol version 6 (IPv6) is the most recent IP version that aims to accommodate hundreds of thousands of unique IP addresses for devices in the network. In IPv6 network, Dynamic Host Configuration Protocol version IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients. …”
Get full text
Thesis -
293
Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network
Published 2022-01-01“…There were 451 k login attempts from 178 different countries, with over 70 k source IP addresses and 40 k source port addresses recorded in a large dataset from nine honeypot servers.…”
Get full text
Article -
294
Comparison of Named Data Networking Mobility Methodology in a Merged Cloud Internet of Things and Artificial Intelligence Environment
Published 2022-09-01“…The NDN design has been proposed as a method for replacing Internet Protocol (IP) addresses with identified content. This study adds to current research on NDN, artificial intelligence (AI), cloud computing, and the Internet of Things (IoT). …”
Get full text
Article -
295
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis
Published 2019-02-01“…In highly sophisticated network attacks, command-and-control (C&C) servers always use domain generation algorithms (DGAs) to dynamically produce several candidate domains instead of static hard-coded lists of IP addresses or domain names. Distinguishing the domains generated by DGAs from the legitimate ones is critical for finding out the existence of malware or further locating the hidden attackers. …”
Get full text
Article -
296
Spatial acoustic-based reverberation simulation as a representable reality in the internet era
Published 2019“…It also considers possible conditions of such representation, especially the process control through real-time accessibility of data directly collected from machine–machine communication via sensors, IP addresses and network connectivity. The methodological outcome of this simulation offers a result that a captured instrumental sound event can be played as if in a contextualised space, which in the past has to be physically constructed to accommodate a certain relevant technology in audio recording. …”
Get full text
Book Section -
297
-
298
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
Published 2023-03-01“…The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. …”
Get full text
Article -
299
Migrating From IP to NDN Using Dual-Channel Translation Gateway
Published 2022-01-01“…The gateway promotes the semantics of the IP protocol to be equal to those of NDN at the network layer by utilizing two unique IP addresses as channels so that it can distinguish an IP packet as either an interest or a data packet. …”
Get full text
Article -
300
Cluster-Fault Tolerant Routing in a Torus
Published 2020-06-01“…The number of Internet-connected devices grows very rapidly, with even fears of running out of available IP addresses. It is clear that the number of sensors follows this trend, thus inducing large sensor networks. …”
Get full text
Article