A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
JomSecurity: Localized Attack of IPS
2019
International Journal of Trend in Scientific Research and Development
Furthermore, the simulation test will be done using virtualization to simulate the network environment to implement the self-updated IPS to protect the server. ...
The current limitation of IPS only relies on the global signature to determine packet. A mix mode method will be used to collect primary data via survey and interview. ...
This type of IPS able to detect suspicious activity from application and network. Host-based IPS are the last line of defence of a server. Normally this kind of IPS only set up in a critical host. ...
doi:10.31142/ijtsrd20273
fatcat:2z4jspe4wjhkxjqlu2r5mu53ku
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
2014
International Journal of Smart Home
So in this thesis, host-active application program is developed, which can retrieve video information from HOST with only IP camera's IP address. ...
In this thesis, A video information system uses IP camera, which transmits video information to HOST via Streaming Server or ftp server. ...
So in this thesis, host-active application program is developed, which can retrieve video information from HOST with only IP camera's IP address. ...
doi:10.14257/ijsh.2014.8.1.19
fatcat:diwzw3kfunbllctsmrgos76634
Image Recorder Server with IP Camera and Pocket PC
2011
Procedia Engineering
We propose a new system for image recorder server from IP camera. The system consists of 2 parts, Server and viewer. ...
The server can connect to IP camera to collect image or connect a web cam directly to the server for cost reduction. ...
via a web browser only users know IP address of camera. ...
doi:10.1016/j.proeng.2011.03.033
fatcat:7yortiwykfhx5ivv7fcxg2geei
Identifying Low-ProfileWeb Server's IP Fingerprint
2006
Third International Conference on the Quantitative Evaluation of Systems - (QEST'06)
We call such a relatively stable and unique pool of "loyal" clients for each low-profile Web server its IP fingerprint. ...
of unseen 32-bit IP addresses sighted in each weekly trace; (2) however, the group of frequent visitors to a server is relatively stable, and a simple clustering by 24-bit IP prefix further confirms this ...
So our collected Web server traces only include those remote accesses with focus on their source IP addresses. ...
doi:10.1109/qest.2006.20
dblp:conf/qest/XieTW06
fatcat:3qeraztb7jbphelmx6e4ght22a
The web is smaller than it seems
2007
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07
In this paper, we explore the extent to which Web servers are co-located with other Web servers in the Internet. ...
In terms of the location of servers, we find that the Web is surprisingly smaller than it seems. ...
In contrast, a significant amount of traffic is destined to IP addresses associated with only one Web server. ...
doi:10.1145/1298306.1298324
dblp:conf/imc/ShueKG07
fatcat:jjctqk2xpnfu3bwr32ekxnb6sq
A Study on the Splitting Strategy of Server Resources
[article]
2020
arXiv
pre-print
We discuss whether the splitting strategy of the server resource could bring more revenue for the service provider. ...
We prove that any G/D/1 server supplier cannot earn more revenue by splitting his resource under the equal-toll limitations. ...
Since we only care mainly about the revenue received by the supplier of the servers, and the total server resource of the supplier is fixed, we assume that the splitting of the server resource is linear ...
arXiv:2010.03346v1
fatcat:aglllmnxebcgxmwmyecgdx3vci
DDoS Attack and Interception Resistance IP Fast Hopping Based Protocol
[article]
2014
arXiv
pre-print
We describe a method of dynamic server IP address change and all modules necessary to implement the approach. ...
In this paper we introduce IP Fast Hopping, easily deployable and effective network-layer architecture against DDoS attacks. ...
This method hides the real IP address of the server behind a big number of "virtual" IP addresses. ...
arXiv:1403.7371v1
fatcat:qvlqi76tibhsng5vxbnsxguvmy
Back-Office Web Traffic on The Internet
2014
Proceedings of the 2014 Conference on Internet Measurement Conference - IMC '14
Although traffic between Web servers and Web browsers is readily apparent to many knowledgeable end users, fewer are aware of the extent of server-to-server Web traffic carried over the public Internet ...
Our measurements show that back-office traffic accounts for a significant fraction not only of core Internet traffic, but also of Web transactions in the terms of requests and responses. ...
The server-only IPs only receive requests and are scattered along the y-axis. The client-only IPs are scattered along the x-axis. The dual-role IPs are scattered across both axes. ...
doi:10.1145/2663716.2663756
dblp:conf/imc/PujolRCSFMN14
fatcat:tj5r6xufivbyzejkjp2b7pxvdm
How dynamic are IP addresses?
2007
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '07
UDmap is fully automatic, and relies only on application-level server logs that are already available today. ...
In addition, using this information combined with a three-month Hotmail email server log, we were able to establish that 97% of mail servers setup on dynamic IP addresses sent out solely spam emails, likely ...
Our trace-based study, using the three-month Hotmail incoming email server log, shows that 97% of email servers setup in the dynamic IP ranges sent only spam emails. ...
doi:10.1145/1282380.1282415
dblp:conf/sigcomm/XieYAGGW07
fatcat:7bfvea74wjbsvda6aezmlrfd7y
Where Do You "Tube"? Uncovering YouTube Server Selection Strategy
2011
2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)
A major part of the whole system is to decide exactly what server machine is going to serve a client request at any given time. ...
In this paper, we analyze DNS resolutions and video playback traces collected by playing half a million YouTube videos from geographically distributed PlanetLab nodes to uncover loadbalancing and server ...
Fig. 7 . 7 Example plot showing hostname to IP mapping changing only during peak hours. ...
doi:10.1109/icccn.2011.6006028
dblp:conf/icccn/AdhikariJZ11
fatcat:rrn7zxdlqzfkxdztbd4dnlifue
Global internet roaming with ROAMIP
2000
ACM SIGMOBILE Mobile Computing and Communications Review
The ROAMIP architecture naturally lends itself to easy, gradual deployment and can reuse existing Mobile IP or SIP message formats. ...
We present ROAMIP, a global mobility architecture that uses application layer solutions for global reachability and reuses transparent Mobile IP tunnelling mechanisms to ensure session continuity. ...
The set of directories to update at registrations needs to be configured in the Home Server only. To deploy ROAMIP, standardization needs to cover only those messages that affect visited networks. ...
doi:10.1145/372346.372370
fatcat:ya3npl6lvbenrp73q3b2bq4ame
Conflicts When Using Two Genuine Web Software- Exploring the Security Application of Virtual Web Servers in Teaching
2019
DEStech Transactions on Social Science Education and Human Science
Keywords: virtual web server, virtual web server security, host security. Abstract. ...
This method is useful for a teaching department with a small number of servers. ...
Fix the IP Address of Host and Virtual Web Server In order to prevent teaching accidents from being misapplied to the IP addresses used by the host computer and the virtual web server, it is necessary ...
doi:10.12783/dtssehs/meit2018/27653
fatcat:de755m4pgvajfod5ntquraurte
On the benefits of using a large IXP as an internet vantage point
2013
Proceedings of the 2013 conference on Internet measurement conference - IMC '13
Second, to show the potential of such vantage points, we analyze the server-related portion of the traffic at this IXP, identify the server IPs and cluster them according to the organizations responsible ...
, and around a quarter billion IPs from all around the globe. ...
To illustrate, we only consider the ASes and show in Figure 4(c) for ASes what we depicted in Figure 4 (b) for server IPs. ...
doi:10.1145/2504730.2504746
dblp:conf/imc/ChatzisSBKF13
fatcat:4hxqfu3jfbg7ddliluqsz2p6wa
Phishing Infrastructure Fluxes All the Way
2009
IEEE Security and Privacy
A recent such technique is fast flux, where the DNS records of a fraud Web site are provisioned such that the site resolves to an unusually large number of IP addresses, each with a short validity. ...
. • Number of DNS servers corresponding to Web servers (n N S ): Typical Web servers generally are associated with only a handful of DNS servers. ...
Instead, the median number of IP addresses records returned for both of these is 1, indicating that the fluxing DNS servers are only fluxing sometimes, not every time we look them up. ...
doi:10.1109/msp.2009.130
fatcat:qerejfl3rbhjxfualwz7td7ceu
Approaches for resolving dynamic IP addressing
1997
Internet Research
On-line methods, which include the World -Wide-Web, exchange server and dynamic Domain Name System, are only effective when both the caller and recipient are logged onto the Internet. ...
A problem of dynamic IP addressing arises when the connection to the Internet is through an Internet Service Provider since the IP address is dynamically allocated only at connection time. ...
This regular update of information only applies to users with dynamic IP addresses since for the case of fixed IP addresses, the information in the file needs to be defined once only. ...
doi:10.1108/10662249710171850
fatcat:u4dn7swth5gorbc2iq4x3l44ym
« Previous
Showing results 1 — 15 out of 134,286 results