A Quantitative Method for Measuring Health of Authoritative Name Servers

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

The Domain Name System - DNS is regarded as one of the critical infrastructure component of the global Internet because a large-scale DNS outage would effectively take a typical user offline. Therefore, the Internet community should ensure that critical components of the DNS ecosystem - that is, root name servers, top-level domain registrars and registries, authoritative name servers, and recursive resolvers - function smoothly. To this end, the community should monitor them periodically and provide public alerts about abnormal behavior. The authors propose a novel quantitative approach for evaluating the health of authoritative name servers – a critical, core, and a large component of the DNS ecosystem. The performance is typically measured in terms of response time, reliability, and throughput for most of the Internet components. This research work proposes a novel list of parameters specifically for determining the health of authoritative name servers: DNS attack permeability, latency comparison, and DNSSEC validation.

Author(s):  
Mohammed A. Hajeeh

Operational systems consist of components that deteriorate and eventually fail. Upon failure, components are either repaired or replaced. Cheap and critical components are usually replaced, while expensive and non-critical ones are repaired before replacement. In this research work, repairable systems undergoing imperfect repair are examined where upon failure each component is repaired several times before being replaced. The main objective is to assess systems' performance by measuring the asymptotic availability. Closed forms analytical expressions are derived for the availability of some non-complicated systems while simulation is used to asses and analyze the performance of complex systems.


Author(s):  
André Årnes

Network monitoring is becoming increasingly important, both as a security measure for corporations and organizations, and in an infrastructure protection perspective for nation-states. Governments are not only increasing their monitoring efforts, but also introducing requirements for data retention in order to be able to access traffic data for the investigation of serious crimes, including terrorism. In Europe, a resolution on data retention was passed in December 2005 (The European Parliament, 2005). However, as the level of complexity and connectivity in information systems increases, effective monitoring of computer networks is getting harder. Systems for efficient threat identification and assessment are needed in order to handle high-speed traffic and monitor data in an appropriate manner. We discuss attacks relating to critical infrastructure, specifically on the Internet. The term critical infrastructure refers to both systems in the digital domain and systems that interface with critical infrastructure in the physical world. Examples of a digital critical infrastructure are the DNS (domain name service) and the routing infrastructure on the Internet. Examples of systems that interface with the physical world are control systems for power grids and telecommunications systems. In 1988, the first Internet worm (called the Morris worm) disabled thousands of hosts and made the Internet almost unusable. In 2002, the DNS root servers were attacked by a distributed denial-of-service (DDoS) attack specifically directed at these servers, threatening to disrupt the entire Internet.1 As our critical infrastructure, including telecommunication systems and power grids, becomes more connected and dependent on digital systems, we risk the same types of attacks being used as weapons in information warfare or cyber terrorism. Any digital system or infrastructure has a number of vulnerabilities with corresponding threats. These threats can potentially exploit vulnerabilities, causing unwanted incidents. In the case of critical infrastructures, the consequences of such vulnerabilities being exploited can become catastrophic. In this chapter, we discuss methods relating to the monitoring, detection, and identification of such attacks through the use of monitoring systems. We refer to the data-capturing device or software as a sensor. The main threats considered in this chapter are information warfare and cyber terrorism. These threats can lead to several different scenarios, such as coordinated computer attacks, worm attacks, DDoS attacks, and large scale scanning and mapping efforts. In this context, the primary task of network monitoring is to detect and identify unwanted incidents associated with threats in order to initiate appropriate precautionary measures and responses.


2019 ◽  
Author(s):  
Chem Int

This research work presents a facile and green route for synthesis silver sulfide (Ag2SNPs) nanoparticles from silver nitrate (AgNO3) and sodium sulfide nonahydrate (Na2S.9H2O) in the presence of rosemary leaves aqueous extract at ambient temperature (27 oC). Structural and morphological properties of Ag2SNPs nanoparticles were analyzed by X-ray diffraction (XRD) and transmission electron microscopy (TEM). The surface Plasmon resonance for Ag2SNPs was obtained around 355 nm. Ag2SNPs was spherical in shape with an effective diameter size of 14 nm. Our novel approach represents a promising and effective method to large scale synthesis of eco-friendly antibacterial activity silver sulfide nanoparticles.


Telecom IT ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 50-55
Author(s):  
D. Saharov ◽  
D. Kozlov

The article deals with the СoAP Protocol that regulates the transmission and reception of information traf-fic by terminal devices in IoT networks. The article describes a model for detecting abnormal traffic in 5G/IoT networks using machine learning algorithms, as well as the main methods for solving this prob-lem. The relevance of the article is due to the wide spread of the Internet of things and the upcoming update of mobile networks to the 5g generation.


1990 ◽  
Vol 22 (3-4) ◽  
pp. 291-298
Author(s):  
Frits A. Fastenau ◽  
Jaap H. J. M. van der Graaf ◽  
Gerard Martijnse

More than 95 % of the total housing stock in the Netherlands is connected to central sewerage systems and in most cases the wastewater is treated biologically. As connection to central sewerage systems has reached its economic limits, interest in on-site treatment of the domestic wastewater of the remaining premises is increasing. A large scale research programme into on-site wastewater treatment up to population equivalents of 200 persons has therefore been initiated by the Dutch Ministry of Housing, Physical Planning and Environment. Intensive field-research work did establish that the technological features of most on-site biological treatment systems were satisfactory. A large scale implementation of these systems is however obstructed in different extents by problems of an organisational, financial and/or juridical nature and management difficulties. At present research is carried out to identify these bottlenecks and to analyse possible solutions. Some preliminary results are given which involve the following ‘bottlenecks':-legislation: absence of co-ordination and absence of a definition of ‘surface water';-absence of subsidies;-ownership: divisions in task-setting of Municipalities and Waterboards; divisions involved with cost-sharing;-inspection; operational control and maintenance; organisation of management;-discharge permits;-pollution levy;-sludge disposal. Final decisions and practical elaboration of policies towards on-site treatment will have to be formulated in a broad discussion with all the authorities and interest groups involved.


2020 ◽  
Vol 27 ◽  
Author(s):  
Zaheer Ullah Khan ◽  
Dechang Pi

Background: S-sulfenylation (S-sulphenylation, or sulfenic acid) proteins, are special kinds of post-translation modification, which plays an important role in various physiological and pathological processes such as cytokine signaling, transcriptional regulation, and apoptosis. Despite these aforementioned significances, and by complementing existing wet methods, several computational models have been developed for sulfenylation cysteine sites prediction. However, the performance of these models was not satisfactory due to inefficient feature schemes, severe imbalance issues, and lack of an intelligent learning engine. Objective: In this study, our motivation is to establish a strong and novel computational predictor for discrimination of sulfenylation and non-sulfenylation sites. Methods: In this study, we report an innovative bioinformatics feature encoding tool, named DeepSSPred, in which, resulting encoded features is obtained via n-segmented hybrid feature, and then the resampling technique called synthetic minority oversampling was employed to cope with the severe imbalance issue between SC-sites (minority class) and non-SC sites (majority class). State of the art 2DConvolutional Neural Network was employed over rigorous 10-fold jackknife cross-validation technique for model validation and authentication. Results: Following the proposed framework, with a strong discrete presentation of feature space, machine learning engine, and unbiased presentation of the underline training data yielded into an excellent model that outperforms with all existing established studies. The proposed approach is 6% higher in terms of MCC from the first best. On an independent dataset, the existing first best study failed to provide sufficient details. The model obtained an increase of 7.5% in accuracy, 1.22% in Sn, 12.91% in Sp and 13.12% in MCC on the training data and12.13% of ACC, 27.25% in Sn, 2.25% in Sp, and 30.37% in MCC on an independent dataset in comparison with 2nd best method. These empirical analyses show the superlative performance of the proposed model over both training and Independent dataset in comparison with existing literature studies. Conclusion : In this research, we have developed a novel sequence-based automated predictor for SC-sites, called DeepSSPred. The empirical simulations outcomes with a training dataset and independent validation dataset have revealed the efficacy of the proposed theoretical model. The good performance of DeepSSPred is due to several reasons, such as novel discriminative feature encoding schemes, SMOTE technique, and careful construction of the prediction model through the tuned 2D-CNN classifier. We believe that our research work will provide a potential insight into a further prediction of S-sulfenylation characteristics and functionalities. Thus, we hope that our developed predictor will significantly helpful for large scale discrimination of unknown SC-sites in particular and designing new pharmaceutical drugs in general.


Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 219
Author(s):  
Phuoc Duc Nguyen ◽  
Lok-won Kim

People nowadays are entering an era of rapid evolution due to the generation of massive amounts of data. Such information is produced with an enormous contribution from the use of billions of sensing devices equipped with in situ signal processing and communication capabilities which form wireless sensor networks (WSNs). As the number of small devices connected to the Internet is higher than 50 billion, the Internet of Things (IoT) devices focus on sensing accuracy, communication efficiency, and low power consumption because IoT device deployment is mainly for correct information acquisition, remote node accessing, and longer-term operation with lower battery changing requirements. Thus, recently, there have been rich activities for original research in these domains. Various sensors used by processing devices can be heterogeneous or homogeneous. Since the devices are primarily expected to operate independently in an autonomous manner, the abilities of connection, communication, and ambient energy scavenging play significant roles, especially in a large-scale deployment. This paper classifies wireless sensor nodes into two major categories based the types of the sensor array (heterogeneous/homogeneous). It also emphasizes on the utilization of ad hoc networking and energy harvesting mechanisms as a fundamental cornerstone to building a self-governing, sustainable, and perpetually-operated sensor system. We review systems representative of each category and depict trends in system development.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2008 ◽  
Vol 2008 ◽  
pp. 1-9 ◽  
Author(s):  
Peter Quax ◽  
Jeroen Dierckx ◽  
Bart Cornelissen ◽  
Wim Lamotte

The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. However, from a research point of view, the inherent weaknesses in their architectures are quickly exposed. The Architecture for Large-Scale Virtual Interactive Communities (ALVICs) was originally developed to serve as a generic framework to deploy networked virtual environment applications on the Internet. While it has been shown to effectively scale to the numbers originally put forward, our findings have shown that, on a real-life network, such as the Internet, several drawbacks will not be overcome in the near future. It is, therefore, that we have recently started with the development of ALVIC-NG, which, while incorporating the findings from our previous research, makes several improvements on the original version, making it suitable for deployment on the Internet as it exists today.


Sign in / Sign up

Export Citation Format

Share Document