Filters








88 Hits in 2.2 sec

DNS resolution with renewal using piggyback

Beakcheol Jang, Dongman Lee, Kilnam Chon, Hyunchul Kim
2009 Journal of Communications and Networks  
Index Terms: Domain name system (DNS), piggyback, renewal, renewal using piggyback (RUP).  ...  In this paper, we propose a DNS resolution time reduction scheme, named renewal using piggyback (RUP), which refreshes expired cached records by piggybacking them onto solicited DNS queries instead of  ...  Likewise, we also really appreciate Minhee Jun, who runs the DNS server at Yonsei university, for helping to collect data on DNS traffic on Yonsei's DNS server.  ... 
doi:10.1109/jcn.2009.6391355 fatcat:fmk3vje5c5bl5g2lgxa6qor534

Piggybacking related domain names to improve DNS performance

Hao Shang, Craig E. Wills
2006 Computer Networks  
Using these relationships, an authoritative DNS server (ADNS) can piggyback resolutions for future queries as part of the response message for an initial query.  ...  We also show improved performance for hybrid approaches that combine the approach with renewal-based approaches.  ...  A second approach is to use separate DNS queries to renew stale DNS cache entries [3] .  ... 
doi:10.1016/j.comnet.2005.06.016 fatcat:qomt5dch3rhgxhklw3ivpibeay

Quantitatively Analyzing Stealthy Communication Channels [chapter]

Patrick Butler, Kui Xu, Danfeng Yao
2011 Lecture Notes in Computer Science  
We analyze the use of domain name service (DNS) as a stealthy botnet command-and-control channel, which allows multiple entities to pass messages stored in DNS records to each other.  ...  We describe and quantitatively analyze new techniques that can be used to hide malicious DNS activities both at the host and network levels.  ...  For example, renewal using piggyback method was proposed to piggyback cached DNS records to DNS queries to refresh expired cached records [5] .  ... 
doi:10.1007/978-3-642-21554-4_14 fatcat:r5s7g3ygkvgntpyzdmth5vn7cq

Ads Block Management System Using Open Virtual Private Network on Ubuntu Operating System

Edy Rahman Syahputra, Boni Oktaviana Sembing, Arie Rafika Dewi, H Hasdiana, Halim Maulana
2018 International Journal of Engineering & Technology  
To overcome this will be built a system using the pi-hole and Ubuntu operating system  ...  However, users are dissatisfied with the presence of ads on websites they visit, since the size of the ad data is often proportional to the actual content ads.  ...  In this paper, we propose a DNS resolution time reduction scheme, named renewal using piggyback (RUP), which refreshes expired cached records by piggybacking them onto solicited DNS queries instead of  ... 
doi:10.14419/ijet.v7i2.5.13951 fatcat:sv7s4zja4rdhza4wrrvbqc2zky

Maintaining Strong Cache Consistency for the Domain Name System

Xin Chen, Haining Wang, Shansi Ren, Xiaodong Zhang
2007 IEEE Transactions on Knowledge and Data Engineering  
Existing DNS only supports weak cache consistency by using the Time-To-Live (TTL) mechanism, which functions reasonably well in normal situations.  ...  Based on the DNS Dynamic Update protocol, we build a DNScup prototype with minor modifications to the current DNS implementation.  ...  The decision on granting lease is piggybacked to the DNS cache with the response of the query.  ... 
doi:10.1109/tkde.2007.1049 fatcat:ku2wdoaa2rflfkms72lgilihiu

On the responsiveness of DNS-based network control

Jeffrey Pang, Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, Srinivasan Seshan
2004 Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04  
In this paper, we investigate this assumption with the objective of quantifying the degree of responsiveness that can be expected from DNS.  ...  We use a combination of Web and DNS access measurements from several busy Web sites, as well as a large content distribution network, to characterize the behavior of end-systems and local DNS servers in  ...  Proposed modifications to DNS to improve Web performance include piggybacking HTTP responses in DNS replies [7] , and having LDNSes renew cache entries proactively [2] .  ... 
doi:10.1145/1028788.1028792 dblp:conf/imc/PangASKS04 fatcat:ogj67b3tgbbxnnjssceewy7joa

Invalidation Method for Wireless Mobile Network to Maintain Consistency

Asmita R., B.M. Patil
2016 International Journal of Computer Applications  
DCIM is a pullbased algorithm that implements adaptive time to live (TTL), piggybacking, and pre-fetching, and provides near strong consistency capabilities.  ...  DCIM can be implemented using ns2, and compared against the client-based and server-based schemes to assess its performance experimentally. Hear introduce DCIM that is totally client-based.  ...  The core of DNS cup uses a dynamic lease technique to keep track of the local DNS name servers whose clients are tightly coupled with an Internet server.  ... 
doi:10.5120/ijca2016909663 fatcat:5rw6gomkwrc43hx4qqy7timwwa

An empirical study of the performance, security and privacy implications of domain name prefetching

Srinivas Krishnan, Fabian Monrose
2011 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)  
Furthermore, to assess the impact that prefetching can have on the deployment of security extensions to DNS (DNSSEC), we use a custom-built cache simulator to perform trace-based simulations using millions  ...  In this paper, we present a large-scale evaluation of this practice using data collected over the span of several months, and show that it leads to noticeable increases in load on name servers-with questionable  ...  The MoU covers specific uses and types of networking data, as well as conditions for securing and accessing such data.  ... 
doi:10.1109/dsn.2011.5958207 dblp:conf/dsn/KrishnanM11 fatcat:5elzkgexr5ednezdljqo2vald4

Prefetching the means for document transfer: a new approach for reducing Web latency

Edith Cohen, Haim Kaplan
2002 Computer Networks  
Our techniques surpass document prefetching in performance improvement per bandwidth used and can be used with non-prefetchable URLs.  ...  DNS lookup time  ...  ACKNOWLEDGMENTS The pre-connecting technique was conceived in a joint discussion with Uri Zwick. We thank Jeff Mogul and Rob Calderbank for their comments on an early version of this manuscript.  ... 
doi:10.1016/s1389-1286(02)00184-6 fatcat:cmy5voigzzgexaj3pclxytib6a

Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks

Biju Issac
2009 International Journal of Network Security  
Since ARP is susceptible to ARP poisoning attacks, we propose to make it unicast, centralized and secure, along with a secure design of DHCP protocol to mitigate MAC spoofing.  ...  Acknowledgments This paper is a major extension of the paper titled -"Secure Unicast Address Resolution Protocol (S-UARP) by Extending DHCP" that was presented during ICON 2005, Malaysia.  ...  The ARP and DHCP Protocols 2.1 The Address Resolution Protocol Address Resolution Protocol (ARP) which is defined in RFC 826 [9] is used to map the IP addresses onto the data link layer MAC address.  ... 
dblp:journals/ijnsec/Issac09 fatcat:t5armxgncrf37hm5ymaa5iztz4

Enhancing Web Performance [chapter]

Arun Iyengar, Erich Nahum, Anees Shaikh, Renu Tewari
2002 Communication Systems  
We examine content distribution networks (CDN's) and the routing techniques that they use. While Web performance can be improved using caching, a key problem with caching is consistency.  ...  For improving server performance, multiple Web servers can be used in combination with efficient load balancing techniques. We also discuss how the choice of server architecture affects performance.  ...  With request-routing based on the Domain Name System (DNS), clients are directed to the nearest CDN server during the name resolution phase of Web access.  ... 
doi:10.1007/978-0-387-35600-6_4 fatcat:mh3xvl7hprb6nnvdbjfv7fi7ym

Refreshment policies for Web content caches

Edith Cohen, Haim Kaplan
2002 Computer Networks  
We evaluated and compared different policies using trace-based simulations. Ó  ...  Cached objects typically have associated expiration times, after which they are considered stale and must be validated with a remote server (origin or another cache) before they can be sent to a client  ...  We thank Duane Wessels for answering questions with regard to a Squid logging bug.  ... 
doi:10.1016/s1389-1286(01)00300-0 fatcat:h766cwgckzdq5dtj7wsszskfdq

LoRaWAN Security

Olivier Seller
2021 Journal of ICT Standardization  
The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security.  ...  The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.  ...  Roaming platforms may be used for this. Alternatively, DNS resolution can get the IP address of a Join Server from its JoinEUI.  ... 
doi:10.13052/jicts2245-800x.915 fatcat:ej35kw2hj5a7jihgcei7uozrq4

Web Caching, Consistency, and Content Distribution [chapter]

Erich Nahum, Arun Iyengar, Renu Tewari, Anees Shaikh
2004 The Practical Handbook of Internet Computing  
With request-routing based on the Domain Name System (DNS), clients are directed to the nearest CDN server during the name resolution phase of Web access.  ...  They examine issues such as delaying invalidations until lease renewals and discuss prefetching and pushing lease renewals.  ... 
doi:10.1201/9780203507223.ch41 fatcat:suqqsx77enhqje2hxhpqrenvlm

Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks [article]

B. Issac
2014 arXiv   pre-print
Address Resolution Protocol (ARP) is developed to find the Ethernet address that map to a specific IP address.  ...  Since ARP is susceptible to ARP poisoning attacks, we propose to make it unicast, centralized and secure, along with a secure design of DHCP protocol to mitigate MAC spoofing.  ...  Acknowledgments This paper is a major extension of the paper titled -"Secure Unicast Address Resolution Protocol (S-UARP) by Extending DHCP" that was presented during ICON 2005, Malaysia.  ... 
arXiv:1410.4398v1 fatcat:zzpoxhbyifdshodkocssbgjpvq
« Previous Showing results 1 — 15 out of 88 results