Results 1 - 10
of
1,223
Statistical Study of Unusual DNS Query Traffic
"... Abstract — We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS server from a university local campus network in April 11th, 2006. The following results are obtained: (1) In April 11th, the DNS query traffic includes a lot of fully qualified domain names ..."
Abstract
- Add to MetaCart
Abstract — We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS server from a university local campus network in April 11th, 2006. The following results are obtained: (1) In April 11th, the DNS query traffic includes a lot of fully qualified domain names
Statistical Study of Unusual DNS Query Traffic
"... We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS server from a university local campus network in April 11th, 2006. The following results are obtained: (1) In April 11th, the DNS query traffic includes a lot of fully qualified domain names (FQDNs) of ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS server from a university local campus network in April 11th, 2006. The following results are obtained: (1) In April 11th, the DNS query traffic includes a lot of fully qualified domain names (FQDNs
Analysis of IPv6 Based DNS Query Traffic
"... Abstract: We investigated statistically on the IPv6 source IP address-based DNS query traffic a university campus network through January 1st to December 31st, 2005. The results are summarized, as follows: (1) Several security incidents in the IPv6-based DNS query traffic can be observed in or synch ..."
Abstract
- Add to MetaCart
Abstract: We investigated statistically on the IPv6 source IP address-based DNS query traffic a university campus network through January 1st to December 31st, 2005. The results are summarized, as follows: (1) Several security incidents in the IPv6-based DNS query traffic can be observed
Threats of Unusual DNS Query Traffic from NIS Clients
"... Abstract We statistically investigated on unusual DNS query traffic from the several Linux PC servers employing network information system (NIS) as their authentication in the campus network of a university. The following re-sults are obtained: (1) The DNS query traffic includes specific keywords of ..."
Abstract
- Add to MetaCart
Abstract We statistically investigated on unusual DNS query traffic from the several Linux PC servers employing network information system (NIS) as their authentication in the campus network of a university. The following re-sults are obtained: (1) The DNS query traffic includes specific keywords
Search and replication in unstructured peer-to-peer networks
, 2002
"... Abstract Decentralized and unstructured peer-to-peer networks such as Gnutella are attractive for certain applicationsbecause they require no centralized directories and no precise control over network topologies and data placement. However, the flooding-based query algorithm used in Gnutella does n ..."
Abstract
-
Cited by 692 (6 self)
- Add to MetaCart
not scale; each individual query gener-ates a large amount of traffic and, as it grows, the system quickly becomes overwhelmed with the query-induced load. This paper explores, through simulation, various alternatives to gnutella's query algorithm, data replicationmethod, and network topology. We
On the Self-Similarity of Web Query Traffic: Evidence, Cause and Performance Implications
"... Temporal distribution of the web query traffic has a signif-icant influence on the performance and scalability of large scale information systems. Most of the existing performance analysis assume a standard Poisson distribution. In this pa-per, we demonstrate that the temporal distribution of web qu ..."
Abstract
- Add to MetaCart
Temporal distribution of the web query traffic has a signif-icant influence on the performance and scalability of large scale information systems. Most of the existing performance analysis assume a standard Poisson distribution. In this pa-per, we demonstrate that the temporal distribution of web
Summary cache: A scalable wide-area web cache sharing protocol
, 1998
"... The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called "Summary Cache"; each proxy keeps a su ..."
Abstract
-
Cited by 894 (3 self)
- Add to MetaCart
The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the overhead of existing protocols. In this paper we propose a new protocol called "Summary Cache"; each proxy keeps a
The Performance of Query Control Schemes for the Zone Routing Protocol
, 2001
"... In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information for a local neighborhood (routing zone), while reactively acquiring routes to destinations beyond the routing zone. This hy ..."
Abstract
-
Cited by 325 (15 self)
- Add to MetaCart
. This hybrid routing approach can be more efficient than traditional routing schemes. However, without proper query control techniques, the ZRP cannot provide the expected reduction in the control traffic.
Fjording the Stream: An Architecture for Queries over Streaming Sensor Data
, 2002
"... If industry visionaries are correct, our lives will soon be full of sensors, connected together in loose conglomerations via wireless networks, each monitoring and collecting data about the environment at large. These sensors behave very differently from traditional database sources: they have inter ..."
Abstract
-
Cited by 281 (8 self)
- Add to MetaCart
multiple queries over many sensors, and show how it can be used to limit sensor resource demands while maintaining high query throughput. We evaluate our architecture using traces from a network of traffic sensors deployed on Interstate 80 near Berkeley and present performance results that show how query
Gigascope: a stream database for network applications
- In SIGMOD
, 2003
"... We have developed Gigascope, a stream database for network ap-plications including traffic analysis, intrusion detection, router con-figuration analysis, network research, network monitoring, and and performance monitoring and debugging. Gigascope is undergoing installation at many sites within the ..."
Abstract
-
Cited by 323 (14 self)
- Add to MetaCart
We have developed Gigascope, a stream database for network ap-plications including traffic analysis, intrusion detection, router con-figuration analysis, network research, network monitoring, and and performance monitoring and debugging. Gigascope is undergoing installation at many sites within
Results 1 - 10
of
1,223