The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user's behavior etc. There are several types of attacks...
Due to the rapid increase of the Internet traffic encryption HTTPS, and the newly adopted protocols HTTP2 and SPDY, the need for a comprehensive high-level information extraction tool that supports the new protocols becomes essential for critical applications such as digital and network forensic and web penetration testing. In spite of the availability of big data from the Internet traffic, current...
Malicious network intrusions which exfiltrate data from computer networks are extremely damaging for organisations and governments worldwide. Combating these network intrusions and large-scale cyber-attacks requires mining and analysis of large volumes of computer network data. We present a statistical filtering and temporal PageRank technique that improves the probability of discovering network intrusions...
The Internet is a medium for people to communicate with each other. Individuals and/or organizations are faced with increased security threats on the Internet. Many organizations prioritize on handling external security threats over internal security threats and for this reason, internal security threats are often missed or worst ignored. Domain Name System (DNS) is one of major Internet services...
There are several methods proposed to extract data from biological databases developed by bioinformatics experts. These methods retrieve bioinformatics information through the use of structured and semi-structured data tools from remote database servers. This paper investigates and evaluates the performance of these methods in terms of their ability to gain access to a cross representation of bioinformatics...
Botnets are a class of internet attacks having different characteristics as compared to the normal internet attacks. One of the features that uniquely characterize a botnet attack is that "the infected machine (Bot) is being remotely controlled by an entity called "Botmaster". The Botmaster remotely controls these infected systems through "Command and Control" servers (C&C)...
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks. By this study we aim to explore and comprehend the current state of these attacks. Focusing on the Indian Autonomous System...
With the rapid growth of the Internet speed and emergence of new applications, the amount of Internet traffic is continuously increasing. In order to provide stable Internet service, efficient network management based on accurate traffic identification is gaining much importance than ever. Header signature-based identification method for network management can be identified the network traffic quickly...
Internet of Things (IoT) is extension of current internet to provide communication, connection, and inter-networking between various devices or physical objects also known as “Things.” In this paper we have reported an effective use of IoT for Environmental Condition Monitoring and Controlling in Homes. We also provide fault detection and correction in any devices connected to this system automatically...
This paper examines the detection properties of obfuscated network buffer overflow attacks by selected IDS and NBA. The obfuscation was performed by tunneling the malicious traffic in HTTP and HTTPS protocols with the intention of simulating the usual legitimate characteristics of the HTTP traffic's flow. The buffer overflow vulnerabilities of four services were used: Samba, BadBlue, Apache, DCOM...
Nowadays, the Internet offers data to anyone at any time. Websites on the Internet have been warehousing data for many years ago, i.e., for 10 years and more. In the meantime, many websites have became obsolete. This means they no longer have owner because of either they have no-one to maintain them or they have become unavailable for indexing by spiders that retrieves information about documents...
One of the key technologies on the Internet is the DNS protocol. While many studies have taken a statistical approach, the representation of DNS traces as a graph has not received enough attention. In this position paper we present our work of applying Process Mining (PM) techniques to study DNS traffic. Process Mining has been successfully used to understand processes on the enterprise as part of...
In this article we present our first approach in using Passive Testing (used in protocol and software conformance checking) and Process Mining (used in enterprise workflow analysis) techniques for analyzing DNS operation traces.
This paper presents one solution for a extendable application which is used to collect EPG (Electronic Program Guide) data from various internet sources. The aim of the software is to complement or replace incomplete EPG information received from DTV (Digital television) stream with Internet data. The acquired data is processed and forwarded to remote server which further stores it to a database.
Data Mining promises potential improvements in a variety of real-world problems. However large-scale implementations face an array of challenges between their inception and deployment, many of which are not technical in nature. This paper will describe the author's experience building one of the largest data mining systems in the world. The objective is to help orientate practitioners to the challenges...
As the Internet rapidly establishes itself as a major communications conduit, growing concern exists about personal privacy issues and the related ownership of personal data. Privacy and personal data may be vulnerable to exposure by unauthorized individuals, by commercial entities wishing to profit from the data, and even by the individual to whom the data pertains. Although fragments of data may...
We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and botnet participating hosts can be identified and malicious backdoor communications can be detected. Any passive DNS monitoring solution needs to address several challenges that range from architectural...
P2P applications supposedly constitute a substantial proportion of today's Internet traffic. The ability to accurately identify different P2P applications in internet traffic is important to a broad range of network operations including application-specific traffic engineering, capacity planning, resource provisioning, service differentiation, etc. However, current P2P applications use several obfuscation...
These days many of the data centers are looking for new ways in order to increase the amount of responding to requests and also offering effectual and optimal services. Hence, in many of the data centers procedures like cache management of physical resources same as routers, load balancing, controlling over load, QOS mechanisms are utilized. One of the reasons that decrease the effectiveness of a...
Ubiquitous computing technologies have been developed fast and various decision support systems were proposed. Consecutively, in recently, people are working on an implicit service agent of mobile phone to make people to be provided useful services without paying attentions. However, when people want to buy some products or to go somewhere, people are still going to use Internet to get preference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.