A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
How much can we survive on an IPv6 network?
2011
Proceedings of the 7th Asian Internet Engineering Conference on - AINTEC '11
In the camp-net, the IPv6 only connectivity was achieved by DHCP6, NAT64 and DNS64, and was served as main connectivity for participants on the conference. ...
AAAA lookup entries, because several commercial web sites require the reverse lookup. • You SHOULD check whether your web appliances return wrong DNS replies or not, because some web appliances might ...
web pages could not be accessed due to failure of reverse lookup. ...
doi:10.1145/2089016.2089041
dblp:conf/aintec/HazeyamaYUYSI11
fatcat:dmqhlt5wqngvpidwkizfufbrsi
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation
2020
Security and Communication Networks
This paper proposes the domain name system (DNS) distributed query algorithm to effectively resolve all IP addresses of a domain name, which provides data support for Evaluator to filter candidate landmarks ...
Street-level landmarks are an important basis for street-level IP geolocation, and the web-based landmark is one of the main sources of street-level landmarks. ...
of the IP reverse lookup result. ...
doi:10.1155/2020/8843188
fatcat:cuccux4xyzcvlfoozpqlcwtxci
Bringing Local DNS Servers Close to Their Clients
2011
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
This paper provides an indication that the distance between clients and their local DNS servers (LDNS) can have a significant negative impact on the performance of content delivery networks (CDNs). ...
Consequently, we propose a novel peer-topeer client-side DNS mechanism that moves LDNS close to their clients while still allowing nearby clients to share the common DNS cache. ...
Then we perform reverse DNS queries to get the authoritative DNS server (ADNS) for each of these IPs and filter out those ADNSs that reject external recursive DNS queries as they could not be used in our ...
doi:10.1109/glocom.2011.6134074
dblp:conf/globecom/QianRA11
fatcat:mpc2udyyfvdn5p2zywtoe7tx5y
Googling the Internet: Profiling Internet Endpoints via the World Wide Web
2010
IEEE/ACM Transactions on Networking
We explore other complementary UEP approaches, such as p2p-and reverse-DNS-lookup-based schemes, and show that they can further improve the results of the Web-based UEP. ...
In this paper, we introduce a novel approach for profiling and classifying endpoints. ...
Finally, we demonstrated that complementary UEP approaches, such as p2p-or DNS-based schemes, can further improve the Web-based UEP performance. ...
doi:10.1109/tnet.2009.2031175
fatcat:r2h6sozsjbanxay3f4qc66ykti
Evaluating web user perceived latency using server side measurements
2003
Computer Communications
The central performance problem in the World Wide Web, in recent years, is user perceived latency. This is the time spent by a user while waiting for a Web page he/she requested. ...
For this reason, measuring the delay experienced by its customers is of high importance to a Web site. These measurements are critical for analyzing the site behavior and to size its components. ...
Our method cannot measure the DNS lookup time. However, for most Web sites the DNS lookup time [6] in comparison with the whole transaction time is negligible. ...
doi:10.1016/s0140-3664(02)00220-7
fatcat:7mqf52hnwbal5owqgy2hpqjdja
The design and implementation of a next generation name service for the internet
2004
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '04
Backwards compatibility with existing protocols and wire formats enables CoDoNS to serve as a backup for legacy DNS, as well as a complete replacement. ...
These problems stem fundamentally from the structure of the legacy DNS. ...
Acknowledgments We are grateful to Robert Morris, Hari Balakrishnan, Jaeyon Jung, and Emil Sit for providing their DNS traces. ...
doi:10.1145/1015467.1015504
dblp:conf/sigcomm/RamasubramanianS04
fatcat:24vi25x33bhaljhxb3lgefayfy
The design and implementation of a next generation name service for the internet
2004
Computer communication review
Backwards compatibility with existing protocols and wire formats enables CoDoNS to serve as a backup for legacy DNS, as well as a complete replacement. ...
These problems stem fundamentally from the structure of the legacy DNS. ...
Acknowledgments We are grateful to Robert Morris, Hari Balakrishnan, Jaeyon Jung, and Emil Sit for providing their DNS traces. ...
doi:10.1145/1030194.1015504
fatcat:mmtavzmtbnherlowexzg3rpgmi
Content Delivery Networks in Cross-border e-Commerce
2020
International Journal of Advanced Computer Science and Applications
Results show that DNS lookup time significantly decrease for cross-border users when online stores are using a CDN, improving overall website time load. ...
Other two sets use country DNS server settings without CDN. ...
The goal of this test is to create a reversed route from the author's origin location (PL) to DNS in another country. ...
doi:10.14569/ijacsa.2020.0110404
fatcat:3gpqiyyouzgrdjfwqaugnda4me
Mobility through naming
2008
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08
(s) for a mobile host and/or network from the DNS, in much the same was as currently happens for IP address resolution. ...
However, this use of the DNS is not currently required for mobility using IP. We examine the potential impact on DNS from using a naming approach to mobility. ...
For this common case, the named web server only makes a decision about which content server should handle a given client request, and then sends a URL referral to the web client, redirecting the client ...
doi:10.1145/1403007.1403010
fatcat:yp62unrh5bfsth7jkaxfcf6qny
A covert data transport protocol
2016
2016 11th International Conference on Malicious and Unwanted Software (MALWARE)
For data forensics and botnet removal applications, it is important to establish the information source. ...
The domain names are registered using (free) dynamic DNS services. The data transmission format is not vulnerable to Deep Packet Inspection (DPI). ...
Web browsers use reverse-DNS lookup to verify the same origin of the requests to avoid DNS rebinding attacks [44] . ...
doi:10.1109/malware.2016.7888734
dblp:conf/malware/FuJYZB16
fatcat:6hqkq5naa5hb5lbgsnxucldova
FCAN: Flash Crowds Alleviation Network Using Adaptive P2P Overlay of Cache Proxies
2006
IEICE transactions on communications
FCAN constructs P2P overlay on cache proxy server layer to distribute the flash traffic from origin server. ...
It uses policy-configured DNS redirection to route the client requests in balance, and adopts strategy load detection to monitor and react the load changes. ...
After that, Member Server modifies the DNS lookup entries of the web site address to those of the Member CPs' and waits for new addresses being propagated through the Internet. ...
doi:10.1093/ietcom/e89-b.4.1119
fatcat:5vlas7fknzed3csdztmed25vny
Measuring the Practical Impact of DNSSEC Deployment
2013
USENIX Security Symposium
DNSSEC extends DNS with a public-key infrastructure, providing compatible clients with cryptographic assurance for DNS records they obtain, even in the presence of an active network attacker. ...
As with many Internet protocol deployments, administrators deciding whether to deploy DNSSEC for their DNS zones must perform cost/benefit analysis. ...
We also thank Duane Wessels, Casey Deccio, Cynthia Taylor, and Stephen Checkoway for their feedback on the paper, Philip Stark for suggestions about the analysis, and Collin Jackson for his help in acquiring ...
dblp:conf/uss/LianRSS13
fatcat:73mbic67uvgajjqz7xxxnryffu
Seamlessly selecting the best copy from internet-wide replicated web servers
[chapter]
1998
Lecture Notes in Computer Science
Implementing this architecture for popular web sites will result in a better response-time and a higher availability of these sites. ...
This paper presents a new approach to web replication, where each of the replicas resides in a different part of the network, and the browser is automatically and transparently directed to the "best" server ...
Set up a number of secondary DNS servers that are close to the web server replicas Set up a shared IP address for the primary DNS servers. is www.cnds.jhu.edu? ...
doi:10.1007/bfb0056471
fatcat:jmssvew7t5ghrknpov55fephva
Malicious Domain Detection Using Machine Learning On Domain Name Features, Host-Based Features and Web-Based Features
2020
Procedia Computer Science
Our experiment is based on active DNS analysis and we look forward to take this work for passive DNS analysis. ...
Our experiment is based on active DNS analysis and we look forward to take this work for passive DNS analysis. ...
a domain name as benign or malicious by including the web-based features of the domain name in addition to the usually used lexical-based and DNS-based features. ...
doi:10.1016/j.procs.2020.04.071
fatcat:ttikd4avkjfrzhyfmnkzo4kzwy
The Web is Still Small After More Than a Decade
[article]
2020
arXiv
pre-print
Understanding web co-location is essential for various reasons. ...
In contrast, 17.5% of mostly popular web sites are served from their own servers. ...
ACKNOWLEDGEMENTS We are thankful to Manos Antonakakis, Panagiotis Kintis, and Logan O'Hara from the Active DNS Project for providing us their DNS dataset, and to Rapid7 for making their datasets available ...
arXiv:2004.04623v1
fatcat:of7xeukhxfhehptc36emxlvfyi
« Previous
Showing results 1 — 15 out of 533 results