Filters








1,094,907 Hits in 5.9 sec

Measuring Availability in the Domain Name System

Casey Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra
2010 2010 Proceedings IEEE INFOCOM  
The domain name system (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly.  ...  We introduce the minimum servers queried (MSQ) and redundancy as availability metrics and show how common DNS misconfigurations impact the availability of domain names.  ...  In this paper we formalize the concept of domain name availability and develop a model for measuring availability.  ... 
doi:10.1109/infcom.2010.5462270 dblp:conf/infocom/DeccioSKM10 fatcat:a4mlo2lyfjex7hyq53pvsfrt4e

Prediction of the domain name system (DNS) quality attributes

Marwan Radwan, Reiko Heckel
2017 Proceedings of the Symposium on Applied Computing - SAC '17  
The Domain Name System (DNS) has a direct impact on the performance and dependability of nearly all aspects of interactions on the Internet.  ...  We utilize a set of Structural Metrics defined over this model as indicators of external quality attributes of the domain name system.  ...  In [16] Deccio et al. present a model of DNS name resolution from which the availability of a domain name can be quantified in the context of its deployment. Shulman et al.  ... 
doi:10.1145/3019612.3019728 dblp:conf/sac/RadwanH17 fatcat:mpzc7sdg6zcm3eerllvmyormoi

POSTER

Haya Shulman, Shiran Ezra
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
As our study indicates, common configuration choices, that domain operators make, result in a fragile DNS infrastructure, susceptible to malicious attacks and benign failures.  ...  We study the operational characteristics of the DNS infrastructure: transitive-trust, coresidence and servers placement.  ...  MEASURING DOMAIN NAME SYSTEM We study resilience of the domains to failures and attacks by measuring: (1) inter-domain dependencies via transitive trust, (2) zones coresidence due to name servers sharing  ... 
doi:10.1145/2660267.2662376 dblp:conf/ccs/ShulmanE14 fatcat:s5cl7dsvfrhlnns4et4v6ga2ii

Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness

2018 Tehnički Vjesnik  
Botnet features are classified according to the possibility of usage and implementation in an embedded system. Traffic response is analysed as a strong candidate for online detection.  ...  The aim of this paper is to improve Botnet detection using an Intrusion Detection System (IDS) or router.  ...  Acknowledgements The authors would like to thank the Central Informatics Support staff of Zagreb, University of Applied Sciences for gathering data.  ... 
doi:10.17559/tv-20161012115204 fatcat:w2zpxhchvbdrtcwflzwwv4exai

Detecting and Refactoring Operational Smells within the Domain Name System

Marwan Radwan, Reiko Heckel
2015 Electronic Proceedings in Theoretical Computer Science  
The Domain Name System (DNS) is one of the most important components of the Internet infrastructure.  ...  They need to be soundly made to create a balance between the availability, security and resilience of the system.  ...  Introduction The Domain Name System (DNS) [22] is critical to the integrity of Internet services and applications.  ... 
doi:10.4204/eptcs.181.8 fatcat:vxcyatvoqjdibnwiwdmayi5xju

Measuring Name System Health [chapter]

Emiliano Casalicchio, Marco Caselli, Alessio Coletta, Salvatore Di Blasi, Igor Nai Fovino
2012 IFIP Advances in Information and Communication Technology  
Modern critical infrastructure assets are exposed to security threats arising from their use of IP networks and the Domain Name System (DNS). This paper focuses on the health of DNS.  ...  This paper describes the Measuring Naming System (MeNSa), a framework designed to provide a formal methodology, metrics and tools for evaluating DNS health.  ...  Our future research will continue our efforts at validating the MeNSa framework using larger data sets and also expand the framework to consider other points of view.  ... 
doi:10.1007/978-3-642-35764-0_12 fatcat:xzn5y37rozfdrkrhr3j7hu4up4

A Novel Technique for Name Identification from Homeopathy Diagnosis Discussion Forum

Mukta Majumder, Utsav Barman, Rahul Prasad, Kumar Saurabh, Sujan Kumar Saha
2012 Procedia Technology - Elsevier  
We have developed a conditional random field based system to identify the named entities from homeopathic diagnosis discussion forum text. We have manually annotated a training corpus for the task.  ...  Our system achieves the highest f-value of 84.35.  ...  In this paper we present a NER system in the homeopathic discussion forum domain, where we have considered two name categories, drug/medicine names and disease names.  ... 
doi:10.1016/j.protcy.2012.10.045 fatcat:jtndhfabynhbxj3tiro3cnd4ku

GNormPlus: An Integrative Approach for Tagging Genes, Gene Families, and Protein Domains

Chih-Hsuan Wei, Hung-Yu Kao, Zhiyong Lu
2015 BioMed Research International  
for gene name disambiguation, such as gene families and protein domains.  ...  The automatic recognition of gene names and their associated database identifiers from biomedical text has been widely studied in recent years, as these tasks play an important role in many downstream  ...  Acknowledgments The authors would like to thank Robert Leaman for his proofreading of the paper. This research was supported by the NIH Intramural Research Program, National Library of Medicine.  ... 
doi:10.1155/2015/918710 pmid:26380306 pmcid:PMC4561873 fatcat:sr5cm6bmyrbotiqahiwheqhu7q

A Survey on Various Approach used in Named Entity Recognition for Indian Languages

Dikshan N., Harshad Bhadka
2017 International Journal of Computer Applications  
One major challenge they have found that one NER system built for one domain did not work well with other domains. 90% F-Measure value achieved in Indian languages using various NER approach.  ...  And they used Standford's NER tool for name entity recognition. Out of total name entities of 9234, 9180 entities were generated from the system.  ... 
doi:10.5120/ijca2017913878 fatcat:rda4faeyyrhrnngxiyvvpn44o4

Detecting identifiable areas in mobile environments

Jörg Roth
2006 Proceedings of the 2006 ACM symposium on Applied computing - SAC '06  
This paper presents a solution of this problem that runs in the distributed, self-organizing Nimbus infrastructure. The effectiveness is demonstrated with the help of performance analyses.  ...  To support developers of location-based services, the Nimbus framework hides specific details of positioning systems and provides uniform output containing physical as well as symbolic location information  ...  ← {d 0 .name} for all d ~ d 0 do if p ∈ (d) namesnames ∪ {d.name} return names } If an arbitrary domain d 0 is available that fulfils the first condition, the algorithm can efficiently loop through  ... 
doi:10.1145/1141277.1141513 dblp:conf/sac/Roth06 fatcat:fwf3jcr45vajtd7cnbadekhhby

What's in a name?

Joseph Chabarek, Paul Barford
2013 Proceedings of the 5th ACM workshop on HotPlanet - HotPlanet '13  
In this paper we describe a methodology for discovering and characterizing the structure of diverse interface DNS names.  ...  We extract, organize and assess the details of the encoding used in different networks.  ...  Any opinions, findings, conclusions or other recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF, ARO or DHS.  ... 
doi:10.1145/2491159.2491163 dblp:conf/sigcomm/ChabarekB13 fatcat:cwhs5qvuprhg3f75c5okdxgd6m

SLA management in federated environments

P Bhoj, S Singhal, S Chutani
2001 Computer Networks  
%mailResponseTime($mailServer, …) < $maxMailResponseTime; } In the contract, %name is used as a notation to identify system attributes and $name is used to identify customer-dependent parameters to be  ...  Conformance dynamically loads measurement plug-ins as needed. To minimize measurement traffic, the state of the system is cached in the system variable cache.  ... 
doi:10.1016/s1389-1286(00)00149-3 fatcat:brenmwsb4zdnjcdisbvh6xc7vy

On Different Categories of Cybercrime in China [chapter]

Aidong Xu, Yan Gong, Yongquan Wang, Nayan Ai
2011 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In this article, some typical cybercrimes are introduced in detail in order to set forth the characteristics of those cybercrimes.  ...  Cybercrimes have become an eye-catching social problem in not only China but also other countries of the world.  ...  Domain Name System, 7 and the 2004 Measures for the Administration of Internet Domain Names of China. 8 Bingzhi Zhao, Current Situation of Cybercrime in China, available at: http://www.lawtime.cn/info  ... 
doi:10.1007/978-3-642-23602-0_26 fatcat:62tej7j4fjeshfusr7u5oegcnq

Evaluating and Combining Name Entity Recognition Systems

Ridong Jiang, Rafael E. Banchs, Haizhou Li
2016 Proceedings of the Sixth Named Entity Workshop  
Name entity recognition (NER) is an important subtask in natural language processing. Various NER systems have been developed in the last decade.  ...  Motivated by the need of NER tools in our research work, we select several publicly available and well-established NER tools to validate their outputs against both Wikipedia gold standard corpus and a  ...  Acknowledgements We would like to thank Singapore National Library Board for providing all the original documents for our testing and validation.  ... 
doi:10.18653/v1/w16-2703 dblp:conf/aclnews/JiangBL16 fatcat:de5xwaphwvdnri4bqa2xcpluli

A measurement study of DNSSEC misconfigurations

Niels L. M. van Adrichem, Norbert Blenn, Antonio Reyes Lúa, Xin Wang, Muhammad Wasif, Ficky Fatturrahman, Fernando A. Kuipers
2015 Security Informatics  
In this article, we measure and analyze the misconfigurations for domains in six zones (.bg, .br, .co, .com, .nl and .se).  ...  This illustrates that although the authorities of a domain may think their DNS is secured, it is in fact not.  ...  Acknowledgements The authors thank Christian Doerr for his valuable feedback and participation in insightful discussions.  ... 
doi:10.1186/s13388-015-0023-y fatcat:ez7sf5mcpbaurjzkmjwk6r7rpq
« Previous Showing results 1 — 15 out of 1,094,907 results