Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts
Network-based monitoring and intrusion detection systems generate a high number of alerts reporting the suspicious activity of IP addresses. The majority of alerts are dropped due to their low relevance, low priority, or due to high number of alerts ...
Martin Zadnik +4 more
doaj +1 more source
Neural Network Based of a New User IP Address Determination and Address Conflict Elimination
In this paper, the neural network (NN) is used to control the remote IP address that related to user device. When the IP address assigned carefully and controlled by a novel tool, the work performance and service quality will be better.
Raid W. Daoud, Wissam S. Hassan
doaj +1 more source
Visualization analysis and design of DDoS attack
Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their ...
Yi-fan ZHANG,Xiao-ju DONG
doaj +3 more sources
Survival Analysis and Prediction Model of IP Address Assignment Duration
IP addresses of end hosts change when they are re-assigned. We apply survival analysis, which is commonly used in healthcare, on IP addresses to predict their assignment duration (their lifetime). We propose a survival parametric model based on a history
Dan Komosny, Saeed Ur Rehman
doaj +1 more source
Rancang Bangun Pengoperasian Lampu Menggunakan Sinyal Analog Smartphone Berbasis Mikrokontroller
Umumnya piranti elektonik pada rumah tangga dikendalikan secara manual, contohnya lampu. Lampu adalah piranti elektronik yang berfungsi untuk penerangan sehingga sangat penting untuk kegiatan di dalam rumah setiap harinya.
Zainal Abidin, Tijaniyah Tijaniyah
doaj +1 more source
The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially
Dio Aditya Pradana, Ade Surya Budiman
doaj +1 more source
Efficient hardware architecture for fast IP address lookup [PDF]
A multigigabit IP router may receive several millions packets per second from each input link. For each packet, the router needs to find the longest matching prefix in the forwarding table in order to determine the packet's next-hop.
Chan, KS +4 more
core +1 more source
Scalable Balanced Pipelined IPv6 Lookup Algorithm
One of the most critical router’s functions is the IP lookup. For each incoming IP packet, IP lookup determines the output port to which the packet should be forwarded.
Zoran Cica
doaj +1 more source
Support Service for Reciprocal Computational Resource Sharing in Wireless Community Networks [PDF]
In community networks, individuals and local organizations from a geographic area team up to create and run a community-owned IP network to satisfy the community's demand for ICT, such as facilitating Internet access and providing services of local ...
Buyuksahin, Umit C +2 more
core +1 more source
Freeing the IP Internet Architecture from Fixed IP Addresses [PDF]
The IP Internet architecture is such that applications must bind fixed IP addresses and ports before any other operations can be executed. These early bindings cause bottlenecks, reliability issues, and force applications and protocols to manage complex lower-layer issues. This poses a big challenge to the future of the IP Internet, given the large and
Sevilla, Spencer +1 more
openaire +2 more sources

