Showing 281 - 300 results of 319 for search '"IP address"', query time: 0.11s Refine Results
  1. 281

    Defending against distributed denial of service (DDoS) attacks by Wah, Chin Han

    Published 2013
    “…With such program monitoring the network traffic, systems can be notified of the IP addresses of the DDoS attackers and therefore deny their entries to the system.…”
    Get full text
    Final Year Project (FYP)
  2. 282

    Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks by Mazlina, Abdul Majid, Naser, Aws, Mohamad Fadli, Zolkipli, Khan, Nusrat Ullah

    Published 2015
    “…The identity of the perpetrators of these acts is usually difficult to ascertain especially when the attacks are carried out using spoofed IP addresses. Consequently, differentiating genuine packets from the packets sent by hackers is difficult. …”
    Get full text
    Article
  3. 283

    DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain by Tianfu Gao, Qingkuan Dong

    Published 2023-07-01
    “…The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. …”
    Get full text
    Article
  4. 284

    Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks by Shrisha H. S., Uma Boregowda

    Published 2022-05-01
    “…The NDN protocol routes the content from a producer to a consumer in a network using content names, instead of IP addresses. This facility, combined with content caching, efficiently serves content for very large networks consisting of a hybrid and ad hoc topology with both wired and wireless media. …”
    Get full text
    Article
  5. 285

    Organizational Solution Recommendations to the Problem of Child Pornography on The Internet by Sedat Sen

    Published 2018-01-01
    “…Another conclusion of this study is that there is a pressing need to establish and umbrella institution which needs to be supported with a national child pornography image database to be used in order to uncover IP addresses and other data belonging to criminals who share, post, sell or view such images online. …”
    Get full text
    Article
  6. 286

    A novel software-defined networking controlled vehicular named-data networking for trustworthy emergency data dissemination and content retrieval assisted by evolved interest packe... by Mazen Alowish, Yoshiaki Shiraishi, Yasuhiro Takano, Masami Mohri, Masakatu Morii

    Published 2020-03-01
    “…In the proposed software-defined networking controlled vehicular named-data networking, IP addressing issue is resolved by named-data networking and global view of the network is attained by software-defined networking. …”
    Get full text
    Article
  7. 287

    An Ensemble of Text Convolutional Neural Networks and Multi-Head Attention Layers for Classifying Threats in Network Packets by Hyeonmin Kim, Young Yoon

    Published 2023-10-01
    “…We also compute the embedding of various header data associated with packets such as IP addresses and ports. Given these features, we combine a text 1D CNN and a multi-head attention network in a novel fashion. …”
    Get full text
    Article
  8. 288

    Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol ver... by Datta, Shoumen Palit Austin

    Published 2016
    “…It is not necessary that all instances must be connected to the internet or routed or transmitted simply because an IP addressing scheme is suggested. This is a means for identification that will be globally unique and offers the potential to be connected or routed via the internet. …”
    Get full text
    Working Paper
  9. 289

    The expressive power of the Internet design by Clark, David D.

    Published 2022
    “…Most fields (e.g. packet length) are unremarkable, some (like the TOS bits) have been redefined several times in the history of the Internet, some (like the options) have atrophied, and some (most obviously the IP addresses) have had a most interesting history in which the only constants are that they are 32 bit fields, that whatever value they have at each end must remain constant for the life of a TCP connection (because of the pseudo-header) and that at any locale in the network, they must provide the basis for some router action. …”
    Get full text
    Working Paper
  10. 290
  11. 291

    Threat intelligence using machine learning packet dissection by Sowinski-Mydlarz, Viktor, Li, Jun, Ouazzane, Karim, Vassilev, Vassil

    Published 2021
    “…Categorical variables are the source and destination IP addresses, protocol used and packet info/flag. The use of filters allows to recognize any type of packet. …”
    Get full text
    Conference or Workshop Item
  12. 292

    The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism by Ibrahim, Ayman Khallel

    Published 2020
    “…Internet Protocol version 6 (IPv6) is the most recent IP version that aims to accommodate hundreds of thousands of unique IP addresses for devices in the network. In IPv6 network, Dynamic Host Configuration Protocol version IPv6 (DHCPv6) is used to allocate and distribute IPv6 addresses and network configuration parameters to DHCPv6 clients. …”
    Get full text
    Thesis
  13. 293

    Predicting Attack Pattern via Machine Learning by Exploiting Stateful Firewall as Virtual Network Function in an SDN Network by Senthil Prabakaran, Ramalakshmi Ramar, Irshad Hussain, Balasubramanian Prabhu Kavin, Sultan S. Alshamrani, Ahmed Saeed AlGhamdi, Abdullah Alshehri

    Published 2022-01-01
    “…There were 451 k login attempts from 178 different countries, with over 70 k source IP addresses and 40 k source port addresses recorded in a large dataset from nine honeypot servers.…”
    Get full text
    Article
  14. 294

    Comparison of Named Data Networking Mobility Methodology in a Merged Cloud Internet of Things and Artificial Intelligence Environment by Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Rosilah Hassan, Norhisham Mansor

    Published 2022-09-01
    “…The NDN design has been proposed as a method for replacing Internet Protocol (IP) addresses with identified content. This study adds to current research on NDN, artificial intelligence (AI), cloud computing, and the Internet of Things (IoT). …”
    Get full text
    Article
  15. 295

    Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis by Luhui Yang, Jiangtao Zhai, Weiwei Liu, Xiaopeng Ji, Huiwen Bai, Guangjie Liu, Yuewei Dai

    Published 2019-02-01
    “…In highly sophisticated network attacks, command-and-control (C&C) servers always use domain generation algorithms (DGAs) to dynamically produce several candidate domains instead of static hard-coded lists of IP addresses or domain names. Distinguishing the domains generated by DGAs from the legitimate ones is critical for finding out the existence of malware or further locating the hidden attackers. …”
    Get full text
    Article
  16. 296

    Spatial acoustic-based reverberation simulation as a representable reality in the internet era by Musib, Ahmad Faudzi, Chow, Ow Wei

    Published 2019
    “…It also considers possible conditions of such representation, especially the process control through real-time accessibility of data directly collected from machine–machine communication via sensors, IP addresses and network connectivity. The methodological outcome of this simulation offers a result that a captured instrumental sound event can be played as if in a contextualised space, which in the past has to be physically constructed to accommodate a certain relevant technology in audio recording. …”
    Get full text
    Book Section
  17. 297
  18. 298

    A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach by Qasem Abu Al-Haija, Manar Alohaly, Ammar Odeh

    Published 2023-03-01
    “…The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. …”
    Get full text
    Article
  19. 299

    Migrating From IP to NDN Using Dual-Channel Translation Gateway by Feri Fahrianto, Noriaki Kamiyama

    Published 2022-01-01
    “…The gateway promotes the semantics of the IP protocol to be equal to those of NDN at the network layer by utilizing two unique IP addresses as channels so that it can distinguish an IP packet as either an interest or a data packet. …”
    Get full text
    Article
  20. 300

    Cluster-Fault Tolerant Routing in a Torus by Antoine Bossard, Keiichi Kaneko

    Published 2020-06-01
    “…The number of Internet-connected devices grows very rapidly, with even fears of running out of available IP addresses. It is clear that the number of sensors follows this trend, thus inducing large sensor networks. …”
    Get full text
    Article