The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the start of the 21st century, computer networks have been through an exponential growth in terms of the network capacity, the number of the users and the type of tasks that are performed over the network. With the resent boom of mobile devices (e.g., Tablet computers, smart phones, smart devices, and wearable computing), the number of network users is bound to increase exponentially. But, most...
To combat with botnet, early detection of the botnet communication and fast identification of the bot-infected PCs is very important for network administrators. However, in DNS protocol, which appears to have been used for botnet communication recently, it is difficult to differentiate the ordinary domain name resolution and suspicious communication. Our key idea is that the most of domain name resolutions...
This paper proposes a single adequate scheme for accessing the web sites instantly without delay in the web. By studying the existing techniques, new investigation has been done on DNS reply for improving performance of the web. As web traffic increases, improving the performance of the web has become a challenging issue. Efficient transmission of data through the existing network is necessary for...
Botnet is one of the most serious threats to the security of the Internet nowadays. This paper introduces Botnet-based distributed denial of service (DDoS) attacks and the characteristics of botnet, research botnet detection and control technologies, summarized the botnet trends.
The introduction of mobile technologies in class provide instructors with tools for contextualized, active, situated, any-time any-where learning. In fact, the role of the instructor can be partially delegated to the student by the use of a mobile device. This paper assesses if this delegation can be brought to the limit of eliminating the need of the physical presence of the instructor in the particular...
Phishing is an attempt by an individual or a group to thieve personal confidential information (Security purpose) such as usernames, passwords, credit card information, etc., from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very much similar to the original ones are being hosted to achieve this. Thus the users assume that they...
Many people want to know how the Internet grows. However, it is hard to answer, especially for the huge Internet today. In this paper, a new choice for the Internet growth measurement is introduced. As a fundamental component of the modern Internet, the Domain Name System (DNS) contains plenty of information about the Internet. By performing a longitudinal evolution analysis on the DNS traffic sampled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.