6 Hits in 2.6 sec

Experiences with CoralCDN: A Five-Year Operational View

Michael J. Freedman
2010 Symposium on Networked Systems Design and Implementation  
CoralCDN is a self-organizing web content distribution network (CDN).  ...  If multiple nodes concurrently get the same key which does not yet exist in the index, all concurrent lookups can fail and multiple nodes can contact the origin.  ...  Further, such active rewriting impedes a site's control over its content, and it can interfere with analytics and advertisements.  ... 
dblp:conf/nsdi/Freedman10 fatcat:mxp5vq3ahbfq5appajpzyhbfba

SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots

Georgios Portokalidis, Herbert Bos
2007 Computer Networks  
To provide a low response time, the signatures may be immediately distributed to network intrusion detection and prevention systems.  ...  Sweet-Bait is deployed on medium sized academic networks across the world and is able to react to zero-day worms within minutes.  ...  Control Centre We implemented CC as a multi-threaded server that handles multiple concurrently connected sensors, and uses a PostgreSQL database for storing its data (http://  ... 
doi:10.1016/j.comnet.2006.09.005 fatcat:q3r2giwqhjdp7dtquqwydu2wgm

Honeypots and Network Forensics [chapter]

2011 Honeypots  
High-interaction honeypots are very diffi cult to deploy because multiple tools are used to make them run.  ...  The use of the tarpit (a honeypot) slows down the worm's progress and benefi ts the local network and the Internet.  ... 
doi:10.1201/b10738-13 fatcat:kmuplb5npjer7gylk2vqlq7uxe

Improving Online Privacy and Security Through Crowdsourced Transparency Platforms and Operator Notifications

Max Jakob Maass
The mail server scans proved unreliable, with 6.5 % (15) of scans failing, likely due to spam protection measures like tarpitting 4 .  ...  that a message is dropped as spam by the recipients' mail server.  ... 
doi:10.26083/tuprints-00019190 fatcat:yvf5o3q42vfelb2yuosit3ptu4

Empirical analysis of the effects and the mitigation of IPv4 address exhaustion [article]

Philipp Richter, Technische Universität Berlin, Technische Universität Berlin, Anja Feldmann
In other words, within a single AS we require (i) multiple peers with different external IP addresses to leak internal peers and (ii) intersections in the internal peers leaked across multiple external  ...  Each time a client fetches a Web object from a CDN edge server, the server creates a log entry, which is then processed and aggregated through a distributed data collection framework.  ... 
doi:10.14279/depositonce-6069 fatcat:yivjkx5bmfgihhxh6rywzdpa4e

Wireless Carterfone

Tim Wu
2007 International Journal of Communication   unpublished
SunMicrosystems' Java Micro Edition is probably the best-known effort to standardize development across mobile platforms, though developers report that it remains inconsistent across platforms and underpowered  ...  Spam, viruses, junk mail and telemarketing are different names for problems that every information network faces.  ...