A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
DNS resolution with renewal using piggyback
2009
Journal of Communications and Networks
Index Terms: Domain name system (DNS), piggyback, renewal, renewal using piggyback (RUP). ...
In this paper, we propose a DNS resolution time reduction scheme, named renewal using piggyback (RUP), which refreshes expired cached records by piggybacking them onto solicited DNS queries instead of ...
Likewise, we also really appreciate Minhee Jun, who runs the DNS server at Yonsei university, for helping to collect data on DNS traffic on Yonsei's DNS server. ...
doi:10.1109/jcn.2009.6391355
fatcat:fmk3vje5c5bl5g2lgxa6qor534
Piggybacking related domain names to improve DNS performance
2006
Computer Networks
Using these relationships, an authoritative DNS server (ADNS) can piggyback resolutions for future queries as part of the response message for an initial query. ...
We also show improved performance for hybrid approaches that combine the approach with renewal-based approaches. ...
A second approach is to use separate DNS queries to renew stale DNS cache entries [3] . ...
doi:10.1016/j.comnet.2005.06.016
fatcat:qomt5dch3rhgxhklw3ivpibeay
Quantitatively Analyzing Stealthy Communication Channels
[chapter]
2011
Lecture Notes in Computer Science
We analyze the use of domain name service (DNS) as a stealthy botnet command-and-control channel, which allows multiple entities to pass messages stored in DNS records to each other. ...
We describe and quantitatively analyze new techniques that can be used to hide malicious DNS activities both at the host and network levels. ...
For example, renewal using piggyback method was proposed to piggyback cached DNS records to DNS queries to refresh expired cached records [5] . ...
doi:10.1007/978-3-642-21554-4_14
fatcat:r5s7g3ygkvgntpyzdmth5vn7cq
Ads Block Management System Using Open Virtual Private Network on Ubuntu Operating System
2018
International Journal of Engineering & Technology
To overcome this will be built a system using the pi-hole and Ubuntu operating system ...
However, users are dissatisfied with the presence of ads on websites they visit, since the size of the ad data is often proportional to the actual content ads. ...
In this paper, we propose a DNS resolution time reduction scheme, named renewal using piggyback (RUP), which refreshes expired cached records by piggybacking them onto solicited DNS queries instead of ...
doi:10.14419/ijet.v7i2.5.13951
fatcat:sv7s4zja4rdhza4wrrvbqc2zky
Maintaining Strong Cache Consistency for the Domain Name System
2007
IEEE Transactions on Knowledge and Data Engineering
Existing DNS only supports weak cache consistency by using the Time-To-Live (TTL) mechanism, which functions reasonably well in normal situations. ...
Based on the DNS Dynamic Update protocol, we build a DNScup prototype with minor modifications to the current DNS implementation. ...
The decision on granting lease is piggybacked to the DNS cache with the response of the query. ...
doi:10.1109/tkde.2007.1049
fatcat:ku2wdoaa2rflfkms72lgilihiu
On the responsiveness of DNS-based network control
2004
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04
In this paper, we investigate this assumption with the objective of quantifying the degree of responsiveness that can be expected from DNS. ...
We use a combination of Web and DNS access measurements from several busy Web sites, as well as a large content distribution network, to characterize the behavior of end-systems and local DNS servers in ...
Proposed modifications to DNS to improve Web performance include piggybacking HTTP responses in DNS replies [7] , and having LDNSes renew cache entries proactively [2] . ...
doi:10.1145/1028788.1028792
dblp:conf/imc/PangASKS04
fatcat:ogj67b3tgbbxnnjssceewy7joa
Invalidation Method for Wireless Mobile Network to Maintain Consistency
2016
International Journal of Computer Applications
DCIM is a pullbased algorithm that implements adaptive time to live (TTL), piggybacking, and pre-fetching, and provides near strong consistency capabilities. ...
DCIM can be implemented using ns2, and compared against the client-based and server-based schemes to assess its performance experimentally. Hear introduce DCIM that is totally client-based. ...
The core of DNS cup uses a dynamic lease technique to keep track of the local DNS name servers whose clients are tightly coupled with an Internet server. ...
doi:10.5120/ijca2016909663
fatcat:5rw6gomkwrc43hx4qqy7timwwa
An empirical study of the performance, security and privacy implications of domain name prefetching
2011
2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)
Furthermore, to assess the impact that prefetching can have on the deployment of security extensions to DNS (DNSSEC), we use a custom-built cache simulator to perform trace-based simulations using millions ...
In this paper, we present a large-scale evaluation of this practice using data collected over the span of several months, and show that it leads to noticeable increases in load on name servers-with questionable ...
The MoU covers specific uses and types of networking data, as well as conditions for securing and accessing such data. ...
doi:10.1109/dsn.2011.5958207
dblp:conf/dsn/KrishnanM11
fatcat:5elzkgexr5ednezdljqo2vald4
Prefetching the means for document transfer: a new approach for reducing Web latency
2002
Computer Networks
Our techniques surpass document prefetching in performance improvement per bandwidth used and can be used with non-prefetchable URLs. ...
DNS lookup time ...
ACKNOWLEDGMENTS The pre-connecting technique was conceived in a joint discussion with Uri Zwick. We thank Jeff Mogul and Rob Calderbank for their comments on an early version of this manuscript. ...
doi:10.1016/s1389-1286(02)00184-6
fatcat:cmy5voigzzgexaj3pclxytib6a
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
2009
International Journal of Network Security
Since ARP is susceptible to ARP poisoning attacks, we propose to make it unicast, centralized and secure, along with a secure design of DHCP protocol to mitigate MAC spoofing. ...
Acknowledgments This paper is a major extension of the paper titled -"Secure Unicast Address Resolution Protocol (S-UARP) by Extending DHCP" that was presented during ICON 2005, Malaysia. ...
The ARP and DHCP Protocols 2.1 The Address Resolution Protocol Address Resolution Protocol (ARP) which is defined in RFC 826 [9] is used to map the IP addresses onto the data link layer MAC address. ...
dblp:journals/ijnsec/Issac09
fatcat:t5armxgncrf37hm5ymaa5iztz4
Enhancing Web Performance
[chapter]
2002
Communication Systems
We examine content distribution networks (CDN's) and the routing techniques that they use. While Web performance can be improved using caching, a key problem with caching is consistency. ...
For improving server performance, multiple Web servers can be used in combination with efficient load balancing techniques. We also discuss how the choice of server architecture affects performance. ...
With request-routing based on the Domain Name System (DNS), clients are directed to the nearest CDN server during the name resolution phase of Web access. ...
doi:10.1007/978-0-387-35600-6_4
fatcat:mh3xvl7hprb6nnvdbjfv7fi7ym
Refreshment policies for Web content caches
2002
Computer Networks
We evaluated and compared different policies using trace-based simulations. Ó ...
Cached objects typically have associated expiration times, after which they are considered stale and must be validated with a remote server (origin or another cache) before they can be sent to a client ...
We thank Duane Wessels for answering questions with regard to a Squid logging bug. ...
doi:10.1016/s1389-1286(01)00300-0
fatcat:h766cwgckzdq5dtj7wsszskfdq
LoRaWAN Security
2021
Journal of ICT Standardization
The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. ...
The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure. ...
Roaming platforms may be used for this. Alternatively, DNS resolution can get the IP address of a Join Server from its JoinEUI. ...
doi:10.13052/jicts2245-800x.915
fatcat:ej35kw2hj5a7jihgcei7uozrq4
Web Caching, Consistency, and Content Distribution
[chapter]
2004
The Practical Handbook of Internet Computing
With request-routing based on the Domain Name System (DNS), clients are directed to the nearest CDN server during the name resolution phase of Web access. ...
They examine issues such as delaying invalidations until lease renewals and discuss prefetching and pushing lease renewals. ...
doi:10.1201/9780203507223.ch41
fatcat:suqqsx77enhqje2hxhpqrenvlm
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
[article]
2014
arXiv
pre-print
Address Resolution Protocol (ARP) is developed to find the Ethernet address that map to a specific IP address. ...
Since ARP is susceptible to ARP poisoning attacks, we propose to make it unicast, centralized and secure, along with a secure design of DHCP protocol to mitigate MAC spoofing. ...
Acknowledgments This paper is a major extension of the paper titled -"Secure Unicast Address Resolution Protocol (S-UARP) by Extending DHCP" that was presented during ICON 2005, Malaysia. ...
arXiv:1410.4398v1
fatcat:zzpoxhbyifdshodkocssbgjpvq
« Previous
Showing results 1 — 15 out of 88 results