Main View
This view is used for searching all possible sources.
First Page Previous Page 1 2 3 Next Page Last Page
 
1
Evaluation of Two Privacy-Preserving Protocols for the DNS Sergio Castillo-Perez

traffic (e.g., by means of RST attacks [2] or sending suitable ICMP traffic [15]), they could launch the performance of the Two Server PIR proposal, we implemented a custom DNS client based on the Python language service G. The implementation and deployment of our pro- posal in R is based on the Python language. More

E-print Network

2
A Tool for RApid Model Parameterization and its Applications

.3.1 Analysis of DDoS traffic We used RAMP to analyze the distributions of DNS la- tency and web latency from 12 of network traffic. However, it is difficult to model and simulate the Internet traffic because of the network's great heterogeneity and rapid change. The statistical prop- erties of Internet ...

E-print Network

3
�What is all that crap?� Analysis of DNS root server bogus queries
2007-01-01

�What is all that crap? � is a question several DNS root server operators probably asked when analyzing incoming queries. This research is all about this question and about how to reduce this �crap�. Of all traffic arriving at the DNS root servers, a lot is considered �bogus�. Some people say that only about 2 % of the ...

E-print Network

4
A Comparative Study of the DNS Design with DHT-Based Alternatives
2006-01-01

Abstract � The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure that uses Distributed Hash Tables (DHT) to improve the system availability. In this paper we compare the performance and availability of these two designs, enabled by ...

E-print Network

5
Abnormal responses to the carcinogen 4-nitroquinoline 1-oxide of cultured fibroblasts from patients with dysplastic nevus syndrome and hereditary cutaneous malignant melanoma
1983-01-01

The dysplastic nevus syndrome (DNS) is a preneoplastic melanocyte abnormality which occurs in families affected by hereditary cutaneous malignant melanoma (HCMM). A putative role of host-environmental interactions in the etiology of hereditary melanoma has been strengthened by the recent finding that fibroblasts derived from HCMM/DNS ...

Energy Citations Database

6
Neurofibromatosis type 1 associated with dysplastic nevus syndrome.
2009-01-01

Neurofibromatosis type 1 (NF-1) is an autosomal dominant disorder that primarily affects the development and growth of neural cell tissues. It causes tumors to grow on nerves and produces other abnormalities such as skin changes and bone deformities. Dysplastic nevus syndrome (DNS) represents multiple atypical nevi associated with polygenetic inheritance ...

PubMed

7
�2007 Raj JainCSE571SWashington University in St. Louis Network SecurityNetwork Security

, in order to poison the cache of the DNS server, the hacker must guess the right TID for the request the guessing work much harder. Nevertheless, there might be a situation when the hacker has an access sniff the traffic of the network. In such a case the hacker can generate poison attacks without any

E-print Network

8
Security Monitoring of DNS traffic Bojan Zdrnja

Manual. Xerox PARC,Palo �Alto, Ca. ,.KICZALES, MASINTER, L., F .:�(1~85) Mf~rfllitUJ GommonLisp andobj.A. and MASINTER, L.M., eds, (1983) Papers on Interlisp-D, Xerox PARe Tech Report CIS-5. [29] SMALLTALK

E-print Network

9
Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing

Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing Jaeyeon Terms Experimentation, Security Keywords Personal information leaks, Black-box testing, Sequence the auxil- iary traffic triggered by the test program for finding comprehensive leaks (e.g., mDNS [24

E-print Network

10
Failures in a Hybrid Content Blocking System
2005-01-01

Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and providing invalid data for DNS lookups. The mechanisms have different accuracy/cost trade-offs. This paper examines a hybrid, two-stage system that redirects traffic that might need ...

E-print Network

11
Drive-By Pharming
2007-01-01

This paper describes an attack concept termed Drive-by Pharming where an attacker sets up a web page that, when simply viewed by the victim (on a JavaScript-enabled browser), attempts to change the DNS server settings on the victim's home broadband router. As a result, future DNS queries are resolved by a DNS server of the attacker's ...

NASA Astrophysics Data System (ADS)

12
Methods and systems for detecting abnormal digital traffic
2011-03-22

Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge ...

DOE Information Bridge

13
DNS/LES for NASA Aerodynamic Needs and Engineering ...
2001-08-01

... ADP013622 TITLE: DNS/LES for NASA Aerodynamic Needs and Engineering Applications ... Page 4. DNS/LES FOR NASA AERODYNAMIC NEEDS ...

DTIC Science & Technology

14
VAN: Vehicle-Assisted Shortest-Time Path Navigation

circumstances. To evaluate its performance, we use the real traffic data of Beijing, including 2,308 road to handle abnormal communication failure. Finally, we use real traffic data of Beijing from BTMB (Beijing shows the traffic condition of a normal day, Tuesday, March 10, 2009, in Beijing, based on real ...

E-print Network

15
DNS Rebinding Attacks.
2009-01-01

See Report A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques w...

National Technical Information Service (NTIS)

16
DNS Rebinding Attacks
2009-09-01

... Client�server communication in Wireshark ... It follows the description of the firewall defenses in parallel with proposed changes ... DNS architecture. ...

DTIC Science & Technology

17
Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots
2008-01-03

Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once ...

Energy Citations Database

18
How to Resolve IP Aliases
2004-01-01

To construct accurate Internet maps, traceroute-based mapping efforts must group interface IP addresses into routers, a task known as alias resolution. In this paper, we introduce two new alias resolution approaches based on inference to handle addresses that cannot be resolved by existing methods based on probe measurements. The first decodes the DNS names assigned by the ISP ...

E-print Network

19
Reaction and diffusion in turbulent combustion. Progress report
1992-10-02

Progress was made on the following: Development of two-variable ({xi} - y) thermochemistry suitable for DNS (direct numerical simulation) studies; determination of laminar flame properties based on this thermochemistry; determination of the parameter range that can be accessed by DNS with good resolution; implementation of the thermochemistry in the ...

DOE Information Bridge

20
Reaction and diffusion in turbulent combustion
1992-10-02

Progress was made on the following: Development of two-variable ([xi] - y) thermochemistry suitable for DNS (direct numerical simulation) studies; determination of laminar flame properties based on this thermochemistry; determination of the parameter range that can be accessed by DNS with good resolution; implementation of the thermochemistry in the ...

DOE Information Bridge

First Page Previous Page 1 2 3 Next Page Last Page
 
First Page Previous Page 1 2 3 Next Page Last Page
 
21
Pollution Resilience for DNS Resolvers Andrew Kalafut

of security lapses in the provisioning of DNS servers in the rest of the Internet. History information in DNS Bloomington, IN Email: minaxi@cs.indiana.edu Abstract--The DNS is a cornerstone of the Internet. Unfortu clients � even one compromised DNS server in the Internet can mislead an organization's clients to ...

E-print Network

22
A Proxy View of Quality of Domain Name Service Lihua Yuan

of obsolete records, leading to failed communication attempts. Poison records could be injected into DNS cache it to study the impact of DNS cache poisoning attacks and evaluate various DNS proposals with respect to DNS cache poisoning attacks [2], where incorrect or malicious records are injected into the ...

E-print Network

23
Monitoring Tools for Domain Name System (DNS) Security Deployment.
2007-01-01

The Domain Name System (DNS) converts names such as www.afrl.mil into IP addresses that can be used for communication. It is an essential part of almost every Internet application, but lacks authentication mechanisms. The DNS Security Extensions address t...

National Technical Information Service (NTIS)

24
Oxidative stress in primary open-angle glaucoma.
2011-06-01

Glaucoma is the second leading cause of blindness worldwide and is still a mysterium. Despite some risk factors are known, like individually elevated intraocular pressure, myopia, age, genetic factors, as well as vascular risk factors and smoking, the exact mechanism developing a glaucomatous optic neuropathy are still unknown. In the pathogenesis of glaucoma oxidative stress seems to play an ...

PubMed

25
24 CFR 982.614 - Group home: Housing quality standards.
2011-04-01

...slides, abnormal air pollution, smoke or dust, excessive noise, vibrations or vehicular traffic, excessive accumulations of trash, vermin or rodent infestation, or fire hazards. The unit must be located in a residential setting. Shared...

Code of Federal Regulations, 2011

26
A Precise and Efficient Evaluation of the Proximity between Web Clients and their Local DNS Servers
2002-01-01

Content Distribution Networks (CDNs) attempt to improve Web performance by delivering Web content to end-users from servers located at the edge of the network. An important factor contributing to the performance improvement is the ability of a CDN to select servers in the proximity of the requesting clients. Most CDNs today use the Domain Name System (DNS) to make such server ...

E-print Network

27
Identifying and Analyzing Web Server Attacks
2008-08-29

Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a ...

Energy Citations Database

28
Analyzing the Number of Varieties in Frequently Found Flows
2010-01-01

Abnormal traffic that causes various problems on the Internet, such as P2P flows, DDoS attacks, and Internet worms, is increasing; therefore, the importance of methods that identify and control abnormal traffic is also increasing. Though the application of frequent-itemset-mining techniques is a promising way to ...

NASA Astrophysics Data System (ADS)

29
Windows 2000 DNS Integration

The purpose of this paper is to describe how Microsoft Windows 2000 systems ... Service (DNS) to register and locate resources within a Windows 2000 network ...

NASA Website

30
Recent Advances in DNS and LES. Proceedings of the ...
1999-08-12

... the Second AFOSR International Conference on DNS and LES Held at Rutgers - The State University of New Jersey, New Brunswick, New Jersey ...

DTIC Science & Technology

31
Monitoring Tools for Domain Name System (DNS) Security ...
2007-10-01

... 14. ABSTRACT The Domain Name System (DNS) converts names such as www.afrl.mil into IP addresses that can be used for communication. ...

DTIC Science & Technology

32
DNS of Incompressible Flows Using Lattice Boltzmann ...
2001-08-01

... Accession Number : ADP013637. Title : DNS of Incompressible Flows Using Lattice Boltzmann Method. Descriptive Note : Conference paper. ...

DTIC Science & Technology

33
DNS and Linear Stability Analyses of Unsteady 3-D ...
2000-06-02

... Accession Number : ADA378988. Title : DNS and Linear Stability Analyses of Unsteady 3-D Hypersonic Wall-Bounded Flows with Real-Gas Effects. ...

DTIC Science & Technology

34
DNS and Embedded DNS as Tools for Investigating ... - GLTRS - NASA

Project: Pre-transitional heat transfer with Venema & Rodi. Instantaneous temperature contours ( wall-adjacent cell at large heated cylinder ). 10. Dominic ...

NASA Website

35
DNS Studies of Transitional Hypersonic Reacting Flows Over ...
2003-03-05

... Accession Number : ADA413149. Title : DNS Studies of Transitional Hypersonic Reacting Flows Over 3-D Hypersonic Vehicles. ...

DTIC Science & Technology

36
DNS Studies of Transitional Hypersonic Reacting Flows Over ...
2003-03-05

... Accession Number : ADA412861. Title : DNS Studies of Transitional Hypersonic Reacting Flows Over 3-D Hypersonic Vehicles. ...

DTIC Science & Technology

37
AFRL Defensive IO Programs
2002-04-22

... Action/Protection Open Source (DNS, Whois) Open Source (DNS, Whois) Network Control (Firewalls, Routers) Network Control (Firewalls, Routers) ...

DTIC Science & Technology

38
Application Filters for TCP/IP Industrial Automation Protocols
2010-01-01

The use of firewalls is a common approach usually meant to secure Automation Technology (AT) from Information Technology (TI) networks. This work proposes a filtering system for TCP/IP-based automation networks in which only certain kind of industrial traffic is permitted. All network traffic which does not conform with a proper industrial protocol pattern ...

NASA Astrophysics Data System (ADS)

39
Multilayered Mobility Management for Survivable Network
2001-01-01

A variety of mobility management scheme have been developed for commercial networks ranging from Mobile IP (network layer support), to the Session Initiation Protocol (SIP) based on application layer support such as DNS and SMTP, and Micro-Mobility approaches like Cellular IP, HAWAII. There are significant challenges, however, with regard to the robustness, management overhead ...

E-print Network

40
Carbon monoxide poisoning.
2005-11-01

CO is an ubiquitous poison with many sources of exposure. CO poisoning produces diverse signs and symptoms that are often subtle and may be easily misdiagnosed. Failure to diagnose CO poisoning may result insignificant morbidity and mortality and permit continued exposure to a dangerous environment. Treatment of CO poisoning begins with inhalation of supplemental oxygen and aggressive supportive ...

PubMed

First Page Previous Page 1 2 3 Next Page Last Page
 
First Page Previous Page 1 2 3 Next Page Last Page
 
41
Turning your AWIPS HP Workstations into SACs Step by Step

, DNS, IP and DNS Server, Network Gateway and its IP, the domain the computer will be on, an IP of the questions. IP address - xxx.xxx.xxx.xxx DNS Server - ddddddddd.nnnnnn.sssssss.noaa.gov DNS IP - xxx a Harris scan at Albany. However it may not meet the 2004 NOAA security protocal. A SAC set up

E-print Network

42
DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

than cache poisoning that lead to inconsistencies among clients. 1) Stale Cache: DNS cache uses a TTLDoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan cache poisoning, which causes the DNS to return false name-to-IP mappings and can be used as a foothold

E-print Network

43
DNS and LES of a Shear-Free Mixing Layer
2003-01-01

The purpose of this work is twofold. First, given the computational resources available today, it is

NASA Technical Reports Server (NTRS)

First Page Previous Page 1 2 3 Next Page Last Page