Filters








134,286 Hits in 3.6 sec

JomSecurity: Localized Attack of IPS

Siew, J. X., Lim, J. T.
2019 International Journal of Trend in Scientific Research and Development  
Furthermore, the simulation test will be done using virtualization to simulate the network environment to implement the self-updated IPS to protect the server.  ...  The current limitation of IPS only relies on the global signature to determine packet. A mix mode method will be used to collect primary data via survey and interview.  ...  This type of IPS able to detect suspicious activity from application and network. Host-based IPS are the last line of defence of a server. Normally this kind of IPS only set up in a critical host.  ... 
doi:10.31142/ijtsrd20273 fatcat:2z4jspe4wjhkxjqlu2r5mu53ku

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

Kil-sung Park, Sun-Hyung Kim
2014 International Journal of Smart Home  
So in this thesis, host-active application program is developed, which can retrieve video information from HOST with only IP camera's IP address.  ...  In this thesis, A video information system uses IP camera, which transmits video information to HOST via Streaming Server or ftp server.  ...  So in this thesis, host-active application program is developed, which can retrieve video information from HOST with only IP camera's IP address.  ... 
doi:10.14257/ijsh.2014.8.1.19 fatcat:diwzw3kfunbllctsmrgos76634

Image Recorder Server with IP Camera and Pocket PC

N. Boonma, A. Sangthong, S. Mitatha, C. Vongchumyen
2011 Procedia Engineering  
We propose a new system for image recorder server from IP camera. The system consists of 2 parts, Server and viewer.  ...  The server can connect to IP camera to collect image or connect a web cam directly to the server for cost reduction.  ...  via a web browser only users know IP address of camera.  ... 
doi:10.1016/j.proeng.2011.03.033 fatcat:7yortiwykfhx5ivv7fcxg2geei

Identifying Low-ProfileWeb Server's IP Fingerprint

Mengjun Xie, Keywan Tabatabai, Haining Wang
2006 Third International Conference on the Quantitative Evaluation of Systems - (QEST'06)  
We call such a relatively stable and unique pool of "loyal" clients for each low-profile Web server its IP fingerprint.  ...  of unseen 32-bit IP addresses sighted in each weekly trace; (2) however, the group of frequent visitors to a server is relatively stable, and a simple clustering by 24-bit IP prefix further confirms this  ...  So our collected Web server traces only include those remote accesses with focus on their source IP addresses.  ... 
doi:10.1109/qest.2006.20 dblp:conf/qest/XieTW06 fatcat:3qeraztb7jbphelmx6e4ght22a

The web is smaller than it seems

Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
2007 Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07  
In this paper, we explore the extent to which Web servers are co-located with other Web servers in the Internet.  ...  In terms of the location of servers, we find that the Web is surprisingly smaller than it seems.  ...  In contrast, a significant amount of traffic is destined to IP addresses associated with only one Web server.  ... 
doi:10.1145/1298306.1298324 dblp:conf/imc/ShueKG07 fatcat:jjctqk2xpnfu3bwr32ekxnb6sq

A Study on the Splitting Strategy of Server Resources [article]

Yiheng Shen
2020 arXiv   pre-print
We discuss whether the splitting strategy of the server resource could bring more revenue for the service provider.  ...  We prove that any G/D/1 server supplier cannot earn more revenue by splitting his resource under the equal-toll limitations.  ...  Since we only care mainly about the revenue received by the supplier of the servers, and the total server resource of the supplier is fixed, we assume that the splitting of the server resource is linear  ... 
arXiv:2010.03346v1 fatcat:aglllmnxebcgxmwmyecgdx3vci

DDoS Attack and Interception Resistance IP Fast Hopping Based Protocol [article]

Vladimir Krylov, Kirill Kravtsov
2014 arXiv   pre-print
We describe a method of dynamic server IP address change and all modules necessary to implement the approach.  ...  In this paper we introduce IP Fast Hopping, easily deployable and effective network-layer architecture against DDoS attacks.  ...  This method hides the real IP address of the server behind a big number of "virtual" IP addresses.  ... 
arXiv:1403.7371v1 fatcat:qvlqi76tibhsng5vxbnsxguvmy

Back-Office Web Traffic on The Internet

Enric Pujol, Philipp Richter, Balakrishnan Chandrasekaran, Georgios Smaragdakis, Anja Feldmann, Bruce MacDowell Maggs, Keung-Chi Ng
2014 Proceedings of the 2014 Conference on Internet Measurement Conference - IMC '14  
Although traffic between Web servers and Web browsers is readily apparent to many knowledgeable end users, fewer are aware of the extent of server-to-server Web traffic carried over the public Internet  ...  Our measurements show that back-office traffic accounts for a significant fraction not only of core Internet traffic, but also of Web transactions in the terms of requests and responses.  ...  The server-only IPs only receive requests and are scattered along the y-axis. The client-only IPs are scattered along the x-axis. The dual-role IPs are scattered across both axes.  ... 
doi:10.1145/2663716.2663756 dblp:conf/imc/PujolRCSFMN14 fatcat:tj5r6xufivbyzejkjp2b7pxvdm

How dynamic are IP addresses?

Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moises Goldszmidt, Ted Wobber
2007 Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07  
UDmap is fully automatic, and relies only on application-level server logs that are already available today.  ...  In addition, using this information combined with a three-month Hotmail email server log, we were able to establish that 97% of mail servers setup on dynamic IP addresses sent out solely spam emails, likely  ...  Our trace-based study, using the three-month Hotmail incoming email server log, shows that 97% of email servers setup in the dynamic IP ranges sent only spam emails.  ... 
doi:10.1145/1282380.1282415 dblp:conf/sigcomm/XieYAGGW07 fatcat:7bfvea74wjbsvda6aezmlrfd7y

Where Do You "Tube"? Uncovering YouTube Server Selection Strategy

Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
2011 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)  
A major part of the whole system is to decide exactly what server machine is going to serve a client request at any given time.  ...  In this paper, we analyze DNS resolutions and video playback traces collected by playing half a million YouTube videos from geographically distributed PlanetLab nodes to uncover loadbalancing and server  ...  Fig. 7 . 7 Example plot showing hostname to IP mapping changing only during peak hours.  ... 
doi:10.1109/icccn.2011.6006028 dblp:conf/icccn/AdhikariJZ11 fatcat:rrn7zxdlqzfkxdztbd4dnlifue

Global internet roaming with ROAMIP

Zoltán R. Turányi, Csanád Szabó, Eszter Kail, András G. Valkó
2000 ACM SIGMOBILE Mobile Computing and Communications Review  
The ROAMIP architecture naturally lends itself to easy, gradual deployment and can reuse existing Mobile IP or SIP message formats.  ...  We present ROAMIP, a global mobility architecture that uses application layer solutions for global reachability and reuses transparent Mobile IP tunnelling mechanisms to ensure session continuity.  ...  The set of directories to update at registrations needs to be configured in the Home Server only. To deploy ROAMIP, standardization needs to cover only those messages that affect visited networks.  ... 
doi:10.1145/372346.372370 fatcat:ya3npl6lvbenrp73q3b2bq4ame

Conflicts When Using Two Genuine Web Software- Exploring the Security Application of Virtual Web Servers in Teaching

JIE-QIANG DAI
2019 DEStech Transactions on Social Science Education and Human Science  
Keywords: virtual web server, virtual web server security, host security. Abstract.  ...  This method is useful for a teaching department with a small number of servers.  ...  Fix the IP Address of Host and Virtual Web Server In order to prevent teaching accidents from being misapplied to the IP addresses used by the host computer and the virtual web server, it is necessary  ... 
doi:10.12783/dtssehs/meit2018/27653 fatcat:de755m4pgvajfod5ntquraurte

On the benefits of using a large IXP as an internet vantage point

Nikolaos Chatzis, Georgios Smaragdakis, Jan Böttger, Thomas Krenc, Anja Feldmann
2013 Proceedings of the 2013 conference on Internet measurement conference - IMC '13  
Second, to show the potential of such vantage points, we analyze the server-related portion of the traffic at this IXP, identify the server IPs and cluster them according to the organizations responsible  ...  , and around a quarter billion IPs from all around the globe.  ...  To illustrate, we only consider the ASes and show in Figure 4(c) for ASes what we depicted in Figure 4 (b) for server IPs.  ... 
doi:10.1145/2504730.2504746 dblp:conf/imc/ChatzisSBKF13 fatcat:4hxqfu3jfbg7ddliluqsz2p6wa

Phishing Infrastructure Fluxes All the Way

D. Kevin McGrath, Andrew Kalafut, Minaxi Gupta
2009 IEEE Security and Privacy  
A recent such technique is fast flux, where the DNS records of a fraud Web site are provisioned such that the site resolves to an unusually large number of IP addresses, each with a short validity.  ...  . • Number of DNS servers corresponding to Web servers (n N S ): Typical Web servers generally are associated with only a handful of DNS servers.  ...  Instead, the median number of IP addresses records returned for both of these is 1, indicating that the fluxing DNS servers are only fluxing sometimes, not every time we look them up.  ... 
doi:10.1109/msp.2009.130 fatcat:qerejfl3rbhjxfualwz7td7ceu

Approaches for resolving dynamic IP addressing

Schubert Foo, Siu Cheung Hui, See Wai Yip, Yulan He
1997 Internet Research  
On-line methods, which include the World -Wide-Web, exchange server and dynamic Domain Name System, are only effective when both the caller and recipient are logged onto the Internet.  ...  A problem of dynamic IP addressing arises when the connection to the Internet is through an Internet Service Provider since the IP address is dynamically allocated only at connection time.  ...  This regular update of information only applies to users with dynamic IP addresses since for the case of fixed IP addresses, the information in the file needs to be defined once only.  ... 
doi:10.1108/10662249710171850 fatcat:u4dn7swth5gorbc2iq4x3l44ym
« Previous Showing results 1 — 15 out of 134,286 results