Results 11 to 20 of about 944,819 (280)

Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts

open access: yesIEEE Access, 2022
Network-based monitoring and intrusion detection systems generate a high number of alerts reporting the suspicious activity of IP addresses. The majority of alerts are dropped due to their low relevance, low priority, or due to high number of alerts ...
Martin Zadnik   +4 more
doaj   +1 more source

Neural Network Based of a New User IP Address Determination and Address Conflict Elimination

open access: yesDiyala Journal of Engineering Sciences, 2019
In this paper, the neural network (NN) is used to control the remote IP address that related to user device. When the IP address assigned carefully and controlled by a novel tool, the work performance and service quality will be better.
Raid W. Daoud, Wissam S. Hassan
doaj   +1 more source

Visualization analysis and design of DDoS attack

open access: yes网络与信息安全学报, 2017
Firstly, the IP address of the Web log were visualized, and an integral system was presented by using proper visualization methods. Secondly, the whole system was related to the IP address, containing source IP address, target IP address and their ...
Yi-fan ZHANG,Xiao-ju DONG
doaj   +3 more sources

Survival Analysis and Prediction Model of IP Address Assignment Duration

open access: yesIEEE Access, 2020
IP addresses of end hosts change when they are re-assigned. We apply survival analysis, which is commonly used in healthcare, on IP addresses to predict their assignment duration (their lifetime). We propose a survival parametric model based on a history
Dan Komosny, Saeed Ur Rehman
doaj   +1 more source

Rancang Bangun Pengoperasian Lampu Menggunakan Sinyal Analog Smartphone Berbasis Mikrokontroller

open access: yesJournal of Electrical Engineering and Computer, 2019
Umumnya piranti elektonik pada rumah tangga dikendalikan secara manual, contohnya lampu. Lampu adalah piranti elektronik yang berfungsi untuk penerangan sehingga sangat penting untuk kegiatan di dalam rumah setiap harinya.
Zainal Abidin, Tijaniyah Tijaniyah
doaj   +1 more source

The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack

open access: yesIJID (International Journal on Informatics for Development), 2021
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially
Dio Aditya Pradana, Ade Surya Budiman
doaj   +1 more source

Efficient hardware architecture for fast IP address lookup [PDF]

open access: yes, 2002
A multigigabit IP router may receive several millions packets per second from each input link. For each packet, the router needs to find the longest matching prefix in the forwarding table in order to determine the packet's next-hop.
Chan, KS   +4 more
core   +1 more source

Scalable Balanced Pipelined IPv6 Lookup Algorithm

open access: yesElektronika ir Elektrotechnika, 2021
One of the most critical router’s functions is the IP lookup. For each incoming IP packet, IP lookup determines the output port to which the packet should be forwarded.
Zoran Cica
doaj   +1 more source

Support Service for Reciprocal Computational Resource Sharing in Wireless Community Networks [PDF]

open access: yes, 2013
In community networks, individuals and local organizations from a geographic area team up to create and run a community-owned IP network to satisfy the community's demand for ICT, such as facilitating Internet access and providing services of local ...
Buyuksahin, Umit C   +2 more
core   +1 more source

Freeing the IP Internet Architecture from Fixed IP Addresses [PDF]

open access: yes2015 IEEE 23rd International Conference on Network Protocols (ICNP), 2015
The IP Internet architecture is such that applications must bind fixed IP addresses and ports before any other operations can be executed. These early bindings cause bottlenecks, reliability issues, and force applications and protocols to manage complex lower-layer issues. This poses a big challenge to the future of the IP Internet, given the large and
Sevilla, Spencer   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy