14,944 Hits in 5.6 sec

Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper) [chapter]

Richard J. Edell, Peter Kruus, Uri Meth
2006 Lecture Notes in Computer Science  
This paper describes a technique for tracing HTTP traffic through one or more non-cooperating HTTP (and/or SOCKS) proxies. The technique uses only passive observations of TCP/IP headers.  ...  Tracing nefarious HTTP activity to its source is sometimes extremely difficult when HTTP (and/or SOCKS) proxies are used for origin obfuscation.  ...  This paper describes our HTTP traceback technique for tracing HTTP activity backwards, from the destination server, through some non-cooperating HTTP proxies, and toward the origin of the activity.  ... 
doi:10.1007/11935308_35 fatcat:cd5ykkvhszb2ddjtgfnqy5uus4

Spatiotemporal enabled Content-based Image Retrieval

Mariana Belgiu, Martin Sudmanns, Tiede Dirk, Andrea Baraldi, Stefan Lang
2016 International Conference on GIScience Short Paper Proceedings  
In this paper, we propose a probabilistic method for estimation of the coverage of a sensor network based on 3D vector representation of the environment.  ...  To overcome these limitations, in this paper we propose a probabilistic sensor coverage estimation method based on precise 3D vector-base representation of the environment and we present some results of  ...  ), whose activities are funded by the Australian Government.  ... 
doi:10.21433/b311729295dw fatcat:fulw4pw3kfh5nmfzcsy3pkisvm

The Ordovician Exposed: Short Papers, Abstracts, and Field Guides for the 12th International Symposium on the Ordovician System

Stephen A. Leslie, Randall C. Orndorff, Daniel Goldman
2015 The Sedimentary Record  
Primary seawater δ 13 C and δ 34 S trends measured from carbonate rocks are used as proxies for changes in organic and pyrite burial, respectively, and provide a proxy for redox conditions.  ...  This new species is defined on those elements shown by Cooper (1981) and Albanesi and Vaccari (1994) and assigned as Baltoniodus navis (sensu Cooper) .  ... 
doi:10.2110/sepmord.015 fatcat:323e4kxcdrh5fdxkfitn7d3mni

Experiences with CoralCDN: A Five-Year Operational View

Michael J. Freedman
2010 Symposium on Networked Systems Design and Implementation  
Publishing through CoralCDN is as simple as making a small change to a URL's hostname; a decentralized DNS layer transparently directs browsers to nearby participating cache nodes, which in turn cooperate  ...  This paper describes CoralCDN's usage scenarios and a number of experiences drawn from its multi-year deployment.  ...  The CoralCDN HTTP proxy CoralCDN seeks to aggressively minimize load on origin servers. This section summarizes how its proxies use Coral for inter-proxy cooperation and adaptation to flash crowds.  ... 
dblp:conf/nsdi/Freedman10 fatcat:mxp5vq3ahbfq5appajpzyhbfba

Blocking-resistant communication through domain fronting

David Fifield, Chang Lan, Rod Hynes, Percy Wegmann, Vern Paxson
2015 Proceedings on Privacy Enhancing Technologies  
HTTPS encryption.  ...  Domain fronting is easy to deploy and use and does not require special cooperation by network intermediaries.  ...  The source code of Lantern's flashlight proxy is at flashlight; other components are in sibling repositories.  ... 
doi:10.1515/popets-2015-0009 dblp:journals/popets/FifieldLHWP15 fatcat:ztowmfxupzdhlf5rm6gr6f7c64

Personalized information delivery

Peter W. Foltz, Susan T. Dumais
1992 Posters and short talks of the 1992 SIGCHI conference on Human factors in computing systems - CHI '92  
While the first paper emphasizes the interface between publish/subscribe systems and classical database Preface 4 concepts, the second paper provides a general overview of the subscription system PubScribe  ...  The third part includes a collection of papers addressing technological issues from several directions.  ...  The paper concludes with a short summary given in section 6.  ... 
doi:10.1145/1125021.1125024 dblp:conf/chi/FoltzD92 fatcat:ddxdxdx35zazhcwut6tgnb53ru

An effective defense against email spam laundering

Mengjun Xie, Heng Yin, Haining Wang
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
In this paper, we reveal one salient characteristic of proxy-based spamming activities, namely packet symmetry, by analyzing protocol semantics and timing causality.  ...  We implement a prototype of DBSpam based on libpcap, and validate its efficacy through both theoretical analyses and trace-based experiments.  ...  Clearly, the short-living spamming activities are missed by DBSpam, with zero detection for S-*-A traces and much fewer detections for S-2-B and S-2-C traces.  ... 
doi:10.1145/1180405.1180428 dblp:conf/ccs/XieYW06 fatcat:3yy7fnwy5jabfe5mbvur3nabm4

Geolocalization of proxied services and its application to fast-flux hidden servers

Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils, Daniele Perito
2009 Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference - IMC '09  
These experimentations showed that, with our framework, fast-flux servers can be localized with similar mean distance errors than non-hidden servers, i.e. approximately 100 km.  ...  This paper proposes a framework to geolocalize fast-flux servers, that is, to determine the physical location of the fast-flux networks roots (mothership servers) based on network measurements.  ...  that the landmark is aware of, and HT T P _P ing(Li, p, HS) is the time spent from the TCP connection initiation to the reception of the first HTTP packet from the hidden server, through the proxy p.  ... 
doi:10.1145/1644893.1644915 dblp:conf/imc/CastellucciaKMP09 fatcat:aao6oyfgujdvxidugcdqqu5adq

Peer-Assisted Information-Centric Network (PICN): A Backward Compatible Solution

Zeinab Zali, Ehsan Aslanian, Mohammad Hossein Manshaei, Massoud Reza Hashemi, Thierry Turletti
2017 IEEE Access  
Our solution can be deployed in IP networks with HTTP requests. We performed a trace-driven simulation for analyzing PICN benefits using IRCache and Berkeley trace files.  ...  a central proxy server using an unlimited cache storage.  ...  We only add two fields to the HTTP header to achieve content-centric security. These fields can be ignored by non-PICN traffic [17] .  ... 
doi:10.1109/access.2017.2762697 fatcat:crhq663fm5glfg7orbrwionceq

WebProfiler: Cooperative diagnosis of Web failures

Sharad Agarwal, Nikitas Liogkas, Prashanth Mohan, Venkata N. Padmanabhan
2010 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010)  
., due to DNS failures, HTTP proxy failures).  ...  HTTP proxy or edge router logs can be analyzed by enterprise administrators -medium to large corporations typically use HTTP caching proxies to improve performance and filter harmful web content.  ...  Why client cooperation? Compared to approaches that analyze server logs or packet traces, client cooperation has several advantages.  ... 
doi:10.1109/comsnets.2010.5431995 dblp:conf/comsnets/AgarwalLMP10 fatcat:u7kw4iq525hf7jwkom32djs6f4

Evading Censorship with Browser-Based Proxies [chapter]

David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phil Porras
2012 Lecture Notes in Computer Science  
Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that generates a large number of short-lived proxies.  ...  We show that browser-based short-lived proxies provide adequate bandwidth for video delivery and argue that blocking them can be challenging.  ...  We then started between 1 and 50 simultaneous HTTP downloads of a 10 MB file directly over TCP, through a WebSocket proxy, and through a Flash-based proxy.  ... 
doi:10.1007/978-3-642-31680-7_13 fatcat:3y7xmc4rjngnxavxygftocjcza

Content Adaptation Architectures Based on Squid Proxy Server

Claudia Canali, Valeria Cardellini, Riccardo Lancellotti
2005 World wide web (Bussum)  
In this paper we describe intermediary-based architectures that provide adaptation and delivery of Web content to different user terminals.  ...  We also investigate how to provide some form of cooperation among the nodes of the intermediary infrastructure, with the goal to evaluate to what extent the cooperation in discovering, adapting, and delivering  ...  Acknowledgements The authors would like to thank the referees for their valuable comments and suggestions which were helpful in preparing the final version of the paper.  ... 
doi:10.1007/s11280-005-4049-9 fatcat:7bubrmo4rfc5jcm3g6gzeijkra

Squeezing more bits out of HTTP caches

J.C. Mogul
2000 IEEE Network  
This article surveys several techniques, and reports the results of trace-based studies of a proposal based on automatic recognition of duplicated content.  ...  Traditional Web caches store HTTP responses, in anticipation of a subsequent reference to the URL of a cached response.  ...  The input reference stream can be either a real stream, captured by tracing the references of actual users, or a stream generated by a model of user activity.  ... 
doi:10.1109/65.844495 fatcat:zfyvbszv7bfxda3jjkmcvl6uwe


David L. Johnson, Veljko Pejovic, Elizabeth M. Belding, Gertjan van Stam
2012 Proceedings of the 2nd ACM Symposium on Computing for Development - ACM DEV '12  
To this end, our work describes VillageShare, an integrated timedelayed proxy server and content-sharing Facebook application.  ...  In this work we analyze traffic traces from Macha to discern opportunities for improvement of connection utilization, and then describe and evaluate the VillageShare architecture.  ...  Network traffic distribution in time has been explored in the context of HTTP traffic, through web proxy log analysis [20, 4] . Here we analyze all TCP flows in the full network trace.  ... 
doi:10.1145/2160601.2160611 dblp:conf/dev/JohnsonPBS12 fatcat:aefgrihx25buvea53mbpiydmiq

Network Traffic Obfuscation and Automated Internet Censorship [article]

Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton
2016 arXiv   pre-print
., HTTP messages), and those that tunnel payloads through actual implementations of network protocols (e.g., a VPN or HTTPS proxy).  ...  Flashproxy [5] tunneling Tor n/a Moderate Plaintext tunnel using websockets through browser-based proxies Infranet [4] mimicry In-band private Low Modulate sequence of HTTP requests to send data Marionette  ... 
arXiv:1605.04044v2 fatcat:er6d5sxwtvanxh3pv66kwaaomi
« Previous Showing results 1 — 15 out of 14,944 results