Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Multicast Domain Name System.

Zeitschriftenartikel zum Thema „Multicast Domain Name System“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Multicast Domain Name System" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Hanna, Fouad, Lionel Droz-Bartholet und Jean-Christophe Lapayre. „Toward a Faster Fault Tolerant Consensus to Maintain Data Consistency in Collaborative Environments“. International Journal of Cooperative Information Systems 26, Nr. 03 (14.08.2017): 1750002. http://dx.doi.org/10.1142/s0218843017500022.

Der volle Inhalt der Quelle
Annotation:
The consensus problem has become a key issue in the field of collaborative telemedicine systems because of the need to guarantee the consistency of shared data. In this paper, we focus on the performance of consensus algorithms. First, we studied, in the literature, the most well-known algorithms in the domain. Experiments on these algorithms allowed us to propose a new algorithm that enhances the performance of consensus in different situations. During 2014, we presented our very first initial thoughts to enhance the performance of the consensus algorithms, but the proposed solution gave very moderate results. The goal of this paper is to present a new enhanced consensus algorithm, named Fouad, Lionel and J.-Christophe (FLC). This new algorithm was built on the architecture of the Mostefaoui-Raynal (MR) consensus algorithm and integrates new features and some known techniques in order to enhance the performance of consensus in situations where process crashes are present in the system. The results from our experiments running on the simulation platform Neko show that the FLC algorithm gives the best performance when using a multicast network model on different scenarios: in the first scenario, where there are no process crashes nor wrong suspicion, and even in the second one, where multiple simultaneous process crashes take place in the system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Dettmer, R. „What's in a name [Internet Domain Name System]“. IEE Review 49, Nr. 11 (01.12.2003): 38–40. http://dx.doi.org/10.1049/ir:20031105.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bonastre, Oscar M., Andreu Vea und David Walden. „Origins of the Domain Name System“. IEEE Annals of the History of Computing 41, Nr. 2 (01.04.2019): 48–60. http://dx.doi.org/10.1109/mahc.2019.2913116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Casalicchio, E., M. Caselli und A. Coletta. „Measuring the global domain name system“. IEEE Network 27, Nr. 1 (Januar 2013): 25–31. http://dx.doi.org/10.1109/mnet.2013.6423188.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Mockapetris, Paul V., und Kevin J. Dunlap. „Development of the Domain Name System“. ACM SIGCOMM Computer Communication Review 25, Nr. 1 (11.01.1995): 112–22. http://dx.doi.org/10.1145/205447.205459.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Mockapetris, P., und K. J. Dunlap. „Development of the domain name system“. ACM SIGCOMM Computer Communication Review 18, Nr. 4 (August 1988): 123–33. http://dx.doi.org/10.1145/52325.52338.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Qin, Zhen, Chunjing Xiao, Qiyao Wang, Yuehui Jin und Aleksandar Kuzmanovic. „A CDN-based Domain Name System“. Computer Communications 45 (Juni 2014): 11–20. http://dx.doi.org/10.1016/j.comcom.2014.03.021.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Li, Bo, und Jinlin Wang. „An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN“. Applied Sciences 11, Nr. 2 (08.01.2021): 578. http://dx.doi.org/10.3390/app11020578.

Der volle Inhalt der Quelle
Annotation:
Many bandwidth-intensive applications (such as online live, online games, etc.) are more suitable for using multicast to transmit information. Due to the advantages in scalability, Shared Tree (ST) is more suitable for large-scale deployment than Source-Based Tree (SBT). However, in ST-based multicast, all multicast sources need to send multicast data to a center node called a core, which will lead to core overload and traffic concentration. Besides, most existing multicast protocols use the shortest path between the source or the core and each receiver to construct the multicast tree, which will result in traffic overload on some links. In this paper, we propose an Identifier and Locator Decoupled Multicast approach (ILDM) based on Information-Centric Networking (ICN). ILDM uses globally unique names to identify multicast services. For each multicast service, the mapping between the multicast service name and the addresses of multicast tree nodes is stored in the Name Resolution System (NRS). To avoid core overload and traffic aggregation, we presented a dynamic core management and selection mechanism, which can dynamically select a low-load core for each multicast service. Furthermore, we designed a path state-aware multicast tree node selection mechanism to achieve traffic load balancing by using low-load links more effectively. Experimental results showed that our proposed multicast approach outperformed some other multicast methods in terms of core load, number of join requests, link load, traffic concentration, and routing state.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Li, Bo, und Jinlin Wang. „An Identifier and Locator Decoupled Multicast Approach (ILDM) Based on ICN“. Applied Sciences 11, Nr. 2 (08.01.2021): 578. http://dx.doi.org/10.3390/app11020578.

Der volle Inhalt der Quelle
Annotation:
Many bandwidth-intensive applications (such as online live, online games, etc.) are more suitable for using multicast to transmit information. Due to the advantages in scalability, Shared Tree (ST) is more suitable for large-scale deployment than Source-Based Tree (SBT). However, in ST-based multicast, all multicast sources need to send multicast data to a center node called a core, which will lead to core overload and traffic concentration. Besides, most existing multicast protocols use the shortest path between the source or the core and each receiver to construct the multicast tree, which will result in traffic overload on some links. In this paper, we propose an Identifier and Locator Decoupled Multicast approach (ILDM) based on Information-Centric Networking (ICN). ILDM uses globally unique names to identify multicast services. For each multicast service, the mapping between the multicast service name and the addresses of multicast tree nodes is stored in the Name Resolution System (NRS). To avoid core overload and traffic aggregation, we presented a dynamic core management and selection mechanism, which can dynamically select a low-load core for each multicast service. Furthermore, we designed a path state-aware multicast tree node selection mechanism to achieve traffic load balancing by using low-load links more effectively. Experimental results showed that our proposed multicast approach outperformed some other multicast methods in terms of core load, number of join requests, link load, traffic concentration, and routing state.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Chandramouli, R., und S. Rose. „Challenges in securing the domain name system“. IEEE Security & Privacy Magazine 4, Nr. 1 (Januar 2006): 84–87. http://dx.doi.org/10.1109/msp.2006.8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

SUZUKI, S. „Domain Name System--Past, Present and Future“. IEICE Transactions on Communications E88-B, Nr. 3 (01.03.2005): 857–64. http://dx.doi.org/10.1093/ietcom/e88-b.3.857.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Henry, Gavin. „Bert Hubert on the Domain Name System“. IEEE Software 37, Nr. 5 (September 2020): 122–24. http://dx.doi.org/10.1109/ms.2020.3000883.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Tariq Banday, M. „Recent Developments in the Domain Name System“. International Journal of Computer Applications 31, Nr. 2 (31.10.2011): 18–25. http://dx.doi.org/10.5120/3796-5227.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Foner, Lenny. „Viewpoint: fixing a flawed domain name system“. Communications of the ACM 44, Nr. 1 (Januar 2001): 19–21. http://dx.doi.org/10.1145/357489.357496.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Minkel, J. R. „Could the Internet fragment? [domain name system]“. IEEE Spectrum 43, Nr. 6 (Juni 2006): 20–21. http://dx.doi.org/10.1109/mspec.2006.1638039.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Victors, Jesse, Ming Li und Xinwen Fu. „The Onion Name System“. Proceedings on Privacy Enhancing Technologies 2017, Nr. 1 (01.01.2017): 21–41. http://dx.doi.org/10.1515/popets-2017-0003.

Der volle Inhalt der Quelle
Annotation:
Abstract Tor onion services, also known as hidden services, are anonymous servers of unknown location and ownership that can be accessed through any Torenabled client. They have gained popularity over the years, but since their introduction in 2002 still suffer from major usability challenges primarily due to their cryptographically-generated non-memorable addresses. In response to this difficulty, in this work we introduce the Onion Name System (OnioNS), a privacy-enhanced decentralized name resolution service. OnioNS allows Tor users to reference an onion service by a meaningful globally-unique verifiable domain name chosen by the onion service administrator.We construct OnioNS as an optional backwards-compatible plugin for Tor, simplify our design and threat model by embedding OnioNS within the Tor network, and provide mechanisms for authenticated denial-of-existence with minimal networking costs. We introduce a lottery-like system to reduce the threat of land rushes and domain squatting. Finally, we provide a security analysis, integrate our software with the Tor Browser, and conduct performance tests of our prototype.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Cheung, S. „Denial of service against the Domain Name System“. IEEE Security & Privacy Magazine 4, Nr. 1 (Januar 2006): 40–45. http://dx.doi.org/10.1109/msp.2006.10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Massey, Daniel, und Dorothy E. Denning. „Guest Editors' Introduction: Securing the Domain Name System“. IEEE Security & Privacy Magazine 7, Nr. 5 (September 2009): 11–13. http://dx.doi.org/10.1109/msp.2009.121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Calabrich, Bruno Freire de Carvalho. „Domain name system (DNS), ICANN and Brazilian stakes“. Law, State and Telecommunications Review 11, Nr. 2 (03.09.2019): 127–52. http://dx.doi.org/10.26512/lstr.v11i2.27027.

Der volle Inhalt der Quelle
Annotation:
Purpose – The article addresses the Brazilian participation in ICANN and the interests of Brazil. As an introduction to the topic, a synthesis is presented on the DNS system, as well as on the origins, nature and role of ICANN, its structure, functioning, principles and governance mechanisms. Then, the main criticisms by the doctrine regarding the (lack of) participation of peripheral countries in ICANN are summarized. The next topic lists the groups and support organizations that have Brazilian members and presents some concrete cases analyzed within the scope of ICANN that affect Brazilian interests, including the registration of new gTLDs. Methodology/approach/design – The research has an eminently descriptive form, without neglecting the problematization of some related issues (specifically with regard to the interests of Brazil in ICANN). The theoretical framework is based on the studies of Milton Mueller and other authors (referred to in the bibliography) on internet governance. Findings – The paper identifies and describes, in a succinct and objective way, the DNS system, ICANN (its origins, its role and its operation) and what are the Brazilian interests related to it. Originality – It is a subject not yet explored in doctrine. Although there is a bibliography on the DNS, the origins, functioning, structure and especially the possible interests in Brazil in ICANN are little studied.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Lawton, George. „Stronger Domain Name System Thwarts Root-Server Attacks“. Computer 40, Nr. 5 (Mai 2007): 14–17. http://dx.doi.org/10.1109/mc.2007.184.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

You, Li, Wenjin Wang und Xiqi Gao. „Energy-Efficient Multicast Precoding for Massive MIMO Transmission with Statistical CSI“. Energies 11, Nr. 11 (15.11.2018): 3175. http://dx.doi.org/10.3390/en11113175.

Der volle Inhalt der Quelle
Annotation:
In this paper, we investigate energy-efficient multicast precoding for massive multiple-input multiple-output (MIMO) transmission. In contrast with most previous work, where instantaneous channel state information (CSI) is exploited to facilitate energy-efficient wireless transmission design, we assume that the base station can only exploit statistical CSI of the user terminals for downlink multicast precoding. First, in terms of maximizing the system energy efficiency, the eigenvectors of the optimal energy-efficient multicast transmit covariance matrix are identified in closed form, which indicates that optimal energy-efficient multicast precoding should be performed in the beam domain in massive MIMO. Then, the large-dimensional matrix-valued precoding design is simplified into an energy-efficient power allocation problem in the beam domain with significantly reduced optimization variables. Using Dinkelbach’s transform, we further propose a sequential beam domain power allocation algorithm which is guaranteed to converge to the global optimum. In addition, we use the large-dimensional random matrix theory to derive the deterministic equivalent of the objective to reduce the computational complexity involved in sample averaging. We present numerical results to illustrate the near-optimal performance of our proposed energy-efficient multicast precoding for massive MIMO.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Weber, R. H. „Looking ahead: more harmonisation in the domain name system?“ International Journal of Intercultural Information Management 1, Nr. 1 (2007): 74. http://dx.doi.org/10.1504/ijiim.2007.014372.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Zheng, Wang. „Estimation of domain name system (DNS) server load distribution“. Scientific Research and Essays 9, Nr. 13 (15.07.2014): 619–24. http://dx.doi.org/10.5897/sre2013.5740.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Zheng, Wang. „Seamless transition of domain name system (DNS) authoritative servers“. Scientific Research and Essays 9, Nr. 12 (30.06.2014): 566–70. http://dx.doi.org/10.5897/sre2013.5741.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Chen, Xin, Haining Wang, Shansi Ren und Xiaodong Zhang. „Maintaining Strong Cache Consistency for the Domain Name System“. IEEE Transactions on Knowledge and Data Engineering 19, Nr. 8 (August 2007): 1057–71. http://dx.doi.org/10.1109/tkde.2007.1049.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Koç, Yakup, Almerima Jamakovic und Bart Gijsen. „A global reference model of the domain name system“. International Journal of Critical Infrastructure Protection 5, Nr. 3-4 (Dezember 2012): 108–17. http://dx.doi.org/10.1016/j.ijcip.2012.08.001.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Khormali, Aminollah, Jeman Park, Hisham Alasmary, Afsah Anwar, Muhammad Saad und David Mohaisen. „Domain name system security and privacy: A contemporary survey“. Computer Networks 185 (Februar 2021): 107699. http://dx.doi.org/10.1016/j.comnet.2020.107699.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kröhnke, Lars, Jelte Jansen und Harald Vranken. „Resilience of the Domain Name System: A case study of the .nl-domain“. Computer Networks 139 (Juli 2018): 136–50. http://dx.doi.org/10.1016/j.comnet.2018.04.015.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Liu, Yi, Sha Liu, Junyu Wang, Kan Qian, Yiwei Shi, Lirong Zheng, Feng Chen und Ning Kong. „A Credible Food Traceability System Based on Domain Name System Security Extensions“. International Journal of Online Engineering (iJOE) 14, Nr. 04 (26.04.2018): 111. http://dx.doi.org/10.3991/ijoe.v14i04.8385.

Der volle Inhalt der Quelle
Annotation:
Food safety has drawn worldwide attention because of its enormous impact on human health and social stability. Although traceability systems based on Internet of Things (IoT) can improve the visibility of the food supply chain, the trust service is necessary to ensure the data origin and data integrity. This paper proposes a food traceability system supported by a trust service based on Domain Name System Security Extensions(DNSSEC). A DNSSEC-enabled traceability system is implemented for food safety in China. In the traceability system, the master data and event data of the products is stored in distributed databases owned and managed by the enterprises respectively in the supply chain. Enterprise oriented Internet of Things Information Service (iotIS) is an important component of the distributed traceability system. A trust service for the Internet of Things, iotTS, is proposed to guarantee the data integrity. With this service, it can be ensured that the information stored in the enterprise database is original and has never been manipulated. Lightweight public keys are distributed based on the DNSSEC in this solution. Compared with the existing solutions, the proposed solution has better scalability and credibility.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

ZHAO, Fangming, Yoshiaki HORI und Kouichi SAKURAI. „Analysis of Existing Privacy-Preserving Protocols in Domain Name System“. IEICE Transactions on Information and Systems E93-D, Nr. 5 (2010): 1031–43. http://dx.doi.org/10.1587/transinf.e93.d.1031.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Tian, Hong Cheng, Hong Wang und Jin Kui Ma. „Domain Name System during the Transition from IPv4 to IPv6“. Applied Mechanics and Materials 687-691 (November 2014): 1912–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1912.

Der volle Inhalt der Quelle
Annotation:
IPv4 and IPv6 will coexist for a long time, due to ISPes’ inertia in the transition from IPv4 to IPv6. Domain Name System (DNS) is a very important functional unit in the Internet. This paper describres the hierarchy and operating process of IPv6 DNS, IPv6 DNS resolver, and presents the DNS transition from IPv4 to IPv6 in particular. We suggest two methods to implement DNS service during the transition period: DNS-Application Level Gateway (DNS-ALG) with Network Address Translation-Protocol Translation (NAT-PT), and dual stacks. And we also propose their respective operational principles. This paper is of valuable reference for network engineers to construct DNS in the transition phase.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Tian, Hong Cheng, und Hong Wang. „Deployment and Exploration of Domain Name System Based on IPv6“. Applied Mechanics and Materials 668-669 (Oktober 2014): 1247–52. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1247.

Der volle Inhalt der Quelle
Annotation:
IPv6 is intended to replace IPv4 in the Internet. Domain Name System (DNS) is an essential component of functionality of Internet. This paper presents new IPv6 characteristics, IPv6 DNS hierarchy, working process of IPv6 DNS, IPv6 address types, representation formats of IPv6 address, forward (reverse) resolver of IPv6 DNS, and the DNS transition from IPv4 to IPv6, combined with the practice to build the IPv6 experimental network of Peking University. We give corresponding solutions for the problems encountered in the IPv6 DNS deployment. This paper is of important reference value for IPv6 network researchers and engineers to build IPv6 DNS service in the IPv6 network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Radwan, Marwan, und Reiko Heckel. „Detecting and Refactoring Operational Smells within the Domain Name System“. Electronic Proceedings in Theoretical Computer Science 181 (10.04.2015): 113–28. http://dx.doi.org/10.4204/eptcs.181.8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Gannoun, L., J. Francioli, S. Chachkov, F. Schutz, J. G. Hulaas und J. Harms. „Domain Name eXchange: a mobile-agent-based shared registry system“. IEEE Internet Computing 4, Nr. 2 (2000): 59–64. http://dx.doi.org/10.1109/4236.832947.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Mitchell, Rosanne T. „Domain name trademark disputes need a new cyberspace ADR system“. Alternatives to the High Cost of Litigation 17, Nr. 8 (September 1999): 147–49. http://dx.doi.org/10.1002/alt.3810170805.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Elavarasan, S. Pari, und K. Sampath Kumar. „Reliable Strong Cache and Security for the Domain Name System“. International Journal of Engineering Trends and Technology 9, Nr. 4 (25.03.2014): 182–87. http://dx.doi.org/10.14445/22315381/ijett-v9p237.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Zheng, Wang, und Tseng Shian Shyong. „Anomaly detection of domain name system (DNS) query traffic at top level domain servers“. Scientific Research and Essays 6, Nr. 18 (30.09.2011): 3858–72. http://dx.doi.org/10.5897/sre11.439.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Karavas, Vaios, und Gunther Teubner. „http://www.CompanyNameSucks.com: The Horizontal Effect of Fundamental Rights on ‘Private Parties’ within Autonomous Internet Law“. German Law Journal 4, Nr. 12 (01.12.2003): 1335–58. http://dx.doi.org/10.1017/s2071832200012153.

Der volle Inhalt der Quelle
Annotation:
In previous conflicts about domain names within the global address system, German judges only had to answer relatively simply legal questions. Under which conditions does a domain name, which is easily confused with another name, infringe the rights of the name owner? Pervious decisions have identified infringement in the following cases:- The name and domain name are, to a significant degree, identical or may be easily confused with one another,- The user of the domain name possesses no personal right to the name, and- The name usage is likely to promote mistakes about the origin of the web-site.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Bubnov, Ya V., und N. N. Ivanov. „Text analysis of DNS queries for data exfiltration protection of computer networks“. Informatics 17, Nr. 3 (30.09.2020): 78–86. http://dx.doi.org/10.37661/1816-0301-2020-17-3-78-86.

Der volle Inhalt der Quelle
Annotation:
The paper proposes effective method of computer network protection from data exfiltration by the system of domain names. Data exfiltration by Domain Name System (DNS) is an approach to conceal the transfer of confidential data to remote adversary using data encapsulation into the requesting domain name. The DNS requests that transfer stolen information from a host infected by malicious software to an external host controlled by a malefactor are considered. The paper proposes a method of detecting such DNS requests based on text classification of domain names by convolutional neural network. The efficiency of the method is based on assumption that domain names exploited for data exfiltration differ from domain names formed from words of natural language. To classify the requests in convolutional neural network the use of character embedding for representing the string of a domain name is proposed. Quality evaluation of the trained neural network used for recognition of data exfiltration through domain name system using ROC-analysis is performed.The paper presents the software architecture used for deployment of trained neural network into existing infrastructure of the domain name system targeting practical computer networks protection from data exfiltration. The architecture implies creation of response policy zones for blocking of individual requests, classified as malicious.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

차경자. „China's Domain Name Dispute Resolution System -focused on DNDRC of CIETAC-“. KOREA INTERNATIONAL COMMERCIAL REVIEW 23, Nr. 4 (Dezember 2008): 171–90. http://dx.doi.org/10.18104/kaic.23.4.200812.171.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Bradshaw, Samantha, und Laura DeNardis. „Privacy by Infrastructure: The Unresolved Case of the Domain Name System“. Policy & Internet 11, Nr. 1 (15.01.2019): 16–36. http://dx.doi.org/10.1002/poi3.195.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Yanindra, Kartika Eka, Aghus Sofwan und Maman Somantri. „PERANCANGAN APLIKASI MONITORING AUTHORITATIVE DOMAIN NAME SYSTEM SERVER MENGGUNAKAN FRAMEWORK CODEIGNITER“. TRANSIENT 6, Nr. 3 (09.11.2017): 349. http://dx.doi.org/10.14710/transient.6.3.349-355.

Der volle Inhalt der Quelle
Annotation:
Teknologi jaringan mengalami perkembangan yang cepat. Perkembangan teknologi membuat banyak alat yang mempermudah kerja manusia. Salah satu alat yang digunakan disebut dengan DNS server yang berguna untuk menerjemahkan domain website menjadi alamat IP. DNS yang banyak digunakan pada jaringan adalah DNS recursor dan DNS authoritative. Penggunaan DNS server dalam sebuah jaringan membutuhkan juga aplikasi untuk memonitor kerja dari DNS server. Monitoring DNS server yang saat ini digunakan adalah menampilkan grafik kinerja dari DNS server. Salah satu grafik yang ditampilkan pada aplikasi monitoring adalah grafik CPU load dari server DNS, sehingga dapat diketahui kinerja dari server. Fokus dari penelitian ini adalah perancangan aplikasi monitoring authoritative DNS menggunakan framework CodeIgniter, database menggunakan MariaDB, dan webserver menggunakan Apache. Penggunaan aplikasi monitoring authoritative DNS diharapkan dapat memonitor kerja dari DNS server dan dapat menambahkan konfigurasi untuk kebutuhan pada jaringan yang diimplementasikan.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Abri, Abdul Aziz Al, Ahmed Al Maashri, Mohamed Ould-Khaoua und Hadj Bourdoucen. „Game-theoretic modeling of the behavior of Domain Name System attacker“. Computers & Electrical Engineering 87 (Oktober 2020): 106801. http://dx.doi.org/10.1016/j.compeleceng.2020.106801.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Yang, Luhui, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai und Yuewei Dai. „Fast3DS: A real-time full-convolutional malicious domain name detection system“. Journal of Information Security and Applications 61 (September 2021): 102933. http://dx.doi.org/10.1016/j.jisa.2021.102933.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Han, Luchao, Zhichuan Guo und Xuewen Zeng. „Research on Multicore Key-Value Storage System for Domain Name Storage“. Applied Sciences 11, Nr. 16 (12.08.2021): 7425. http://dx.doi.org/10.3390/app11167425.

Der volle Inhalt der Quelle
Annotation:
This article proposes a domain name caching method for the multicore network-traffic capture system, which significantly improves insert latency, throughput and hit rate. The caching method is composed of caching replacement algorithm, cache set method. The method is easy to implement, low in deployment cost, and suitable for various multicore caching systems. Moreover, it can reduce the use of locks by changing data structures and algorithms. Experimental results show that compared with other caching system, our proposed method reaches the highest throughput under multiple cores, which indicates that the cache method we proposed is best suited for domain name caching.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Brahara, Beni, Dedy Syamsuar und Yesi Novaria Kunang. „Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators“. Journal of Information Systems and Informatics 2, Nr. 1 (11.03.2020): 131–53. http://dx.doi.org/10.33557/journalisi.v2i1.30.

Der volle Inhalt der Quelle
Annotation:
University of Bina Darma Palembang has its own DNS server and in this study using log data from the Bina Darma University DNS server as data in the study, DNS log server data is analyzed by network traffic, using Network Analyzer tools to see the activity of a normal traffic or anomaly traffic, or even contains DGA Malware (Generating Algorthm Domain).DGA malware produces a number of random domain names that are used to infiltrate DNS servers. To detect DGA using DNS traffic, NXDomain. The result is that each domain name in a group domain is generated by one domain that is often used at short times and simultaneously has a similar life time and query style. Next look for this pattern in NXDomain DNS traffic to filter domains generated algorithmically that the domain contains DGA. In analyzing DNS traffic whether it contains Malware and whether network traffic is normal or anomaly, in this study it detects Malwere DNS From the results of the stages of the suspected domain indicated by malware, a suspected domain list table is also created and also a suspected list of IP addresses. To support the suspected domain analysis results, info graphic is displayed using rappidminer tools to test decisions that have been made using the previous tools using the Decision Tree method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Yan, Zhiwei, Jong-Hyouk Lee, Xiaodong Lee und Yong-Jin Park. „Utilizing the Domain Name System for Scalable and Secure Named Data Networking“. Wireless Personal Communications 84, Nr. 3 (02.04.2015): 2135–49. http://dx.doi.org/10.1007/s11277-015-2537-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Zhang, Ning, Le Jun Chi und Hai Yan Xu. „Domain Names Based on Fault Tree Analysis“. Applied Mechanics and Materials 667 (Oktober 2014): 143–48. http://dx.doi.org/10.4028/www.scientific.net/amm.667.143.

Der volle Inhalt der Quelle
Annotation:
The success rate of domain name resolution has a direct influence on the service of DNS. Analytical performance of DNS server is the key to measure the satisfaction degree of users when they access to the network. This article establishes the dependence model for the domain name server. In order to get DNS fault model and analytical model, this article uses Fault Tree Analysis theory to describe the relationship of tree basic events and target events of fault tree of dependency. On the basis of fault tree model, dependencies of domain names are qualitative analyzed, including number of sets and element composition of fault model and analytical model. This study provided a theoretical basis for DNS dependencies and technical support for the DNS vulnerability analysis. It has a great importance for domain name system security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Futai, Zou, Zhang Siyu und Rao Weixiong. „Hybrid detection and tracking of fast-flux botnet on domain name system traffic“. China Communications 10, Nr. 11 (November 2013): 81–94. http://dx.doi.org/10.1109/cc.2013.6674213.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Xue, Hong. „Territorialism versus Universalism: International Intellectual Property Law in the Internationalized Domain Name System“. Journal of World Intellectual Property 9, Nr. 1 (25.01.2006): 1–24. http://dx.doi.org/10.1111/j.1422-2213.2006.00271.x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie