phone book
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 5)

H-INDEX

5
(FIVE YEARS 0)

Author(s):  
Mohammed Al-Drees ◽  
Marwah M. Almasri ◽  
Mousa Al-Akhras ◽  
Mohammed Alawairdhi

Background:: Domain Name System (DNS) is considered the phone book of the Internet. Its main goal is to translate a domain name to an IP address that the computer can understand. However, DNS can be vulnerable to various kinds of attacks, such as DNS poisoning attacks and DNS tunneling attacks. Objective:: The main objective of this paper is to allow researchers to identify DNS tunnel traffic using machine-learning algorithms. Training machine-learning algorithms to detect DNS tunnel traffic and determine which protocol was used will help the community to speed up the process of detecting such attacks. Method:: In this paper, we consider the DNS tunneling attack. In addition, we discuss how attackers can exploit this protocol to infiltrate data breaches from the network. The attack starts by encoding data inside the DNS queries to the outside of the network. The malicious DNS server will receive the small chunk of data decoding the payload and put it together at the server. The main concern is that the DNS is a fundamental service that is not usually blocked by a firewall and receives less attention from systems administrators due to a vast amount of traffic. Results:: This paper investigates how this type of attack happens using the DNS tunneling tool by setting up an environment consisting of compromised DNS servers and compromised hosts with the Iodine tool installed in both machines. The generated dataset contains the traffic of HTTP, HTTPS, SSH, SFTP, and POP3 protocols over the DNS. No features were removed from the dataset so that researchers could utilize all features in the dataset. Conclusion:: DNS tunneling remains a critical attack that needs more attention to address. DNS tunneled environment allows us to understand how such an attack happens. We built the appropriate dataset by simulating various attack scenarios using different protocols. The created dataset contains PCAP, JSON, and CSV files to allow researchers to use different methods to detect tunnel traffic.


2019 ◽  
Vol 19 (2) ◽  
pp. 35-37
Author(s):  
Mohanad Abdulhamid

AbstractThe paper generally seeks to demonstrate an in depth understanding of computer communication using Bluetooth. The working principle of this technology has to be fully understood and thus the software required to save the phone book to the computer needs to be developed and implemented and thus demonstrated on how it works. The paper clearly illustrates how reliable the Bluetooth phone book manager is in terms of creating a backup of one’s contacts. The software program is developed and then analysed in depth to understand the workability of the phone book manager which runs on any computer and is compatible with any phone. The hardware used is USB Bluetooth dongle, a cell phone and a computer.


2019 ◽  
Vol 7 (1) ◽  
pp. 164
Author(s):  
Muhammad Abid Mukhlisin ◽  
Budhi Setiawan ◽  
Sri Hastuti

<em>The research was aimed to know whether cooperative learning model with teams games tournament type could improve both process and the scanning reading competention on finding  information from phone book. This research subjects was the eighth grade students of PKBM Sahabat Karanganyar in academic year of 2016/2017. Data were collected by document analysis, observation, and interview. The data validity was tested by data triangulation technique. Data was analyzed by comparative descriptive technique. This research procedure consists of: (1) the planning; (2) the act of learning; (3) observation; and (4) analysis and reflection. The result showed that there were improvement of process and scanning reading competention on finding information from phone book through cooperative learning model with teams games tournament type in the eighth grade students of PKBM Sahabat Karanganyar in academic year of 2016/2017.</em>


Author(s):  
Ayu Fatimah ◽  
Titi Sriwahyuni ◽  
Nurindah Dwiyani

This projects aims to provide an information system to search for the important address in Padang. The important address in Padang still use the phone book (yellow  pages),  but  not  everyone can  use and  have it.  In  the  search  for  the important address in Padang, not everyone has a mobile phone that can access the internet and if using a mobile phone, it will need the charge. As well as in the search for important addresses in Padang, not everyone can call the operator, and call the operator also takes the charge. Because of that problem, this application created with no internet service, so it does not cost money. This mobile application system can provide information such as text display with detailed  address  and  phone  numbers  and  addresses  an  important  route  in Padang. The starting address point is from Padang’s Market because a lot of public transport with the important addresses major roads in Padang is passing along this way. The mobile application comes with a list of important address like Mosques, Hospitals, Hotels, Universities and Government Offices which contain such as info address, phone number and the address route to search the important address for the application’s user. This is an implementation on mobile phone based on java language programming with jar extension file.   Keywords : Information Systems, Mobile Application, Addresses, Java .


2018 ◽  
Vol 56 (6) ◽  
pp. 370-372
Author(s):  
Francisco Vera ◽  
Nicolas Fernandez ◽  
Manuel Ortiz

2016 ◽  
Vol 2 (2) ◽  
pp. 41-54
Author(s):  
Lidija Gligorova ◽  
Marijana Kožul

Abstract Until 2014, the sample for the statistical survey Tourist Activity of the Population of the Republic of Croatia, shortly named as TADS, was a quota sample. The sample selection and the data collection for the survey in the Computer Assisted Telephone Interviewing (CATI) mode were conducted by a hired marketing research agency. In the summer of 2014, the Croatian Bureau of Statistics (CBS) set up its own call centre for CATI surveys. At the beginning of 2015, the CBS started developing a new probability sample design and a weighting strategy of TADS. The surveys of all the four quarters of 2015, fully conducted by the CBS, were treated as test surveys. The purpose of this paper is to describe and evaluate the finally accepted overlapping dual-frame survey design and a weighting procedure based on the sample data collected in all the quarters of 2015. The paper shows how the new design is incorporated in the existing circumstances in which surveys are conducted. The overlapping dual-frame survey design of TADS produces survey estimates related to the whole survey population based on two independent samples from two overlapping sampling frames (the first sampling frame consists of landline phone numbers from the phone book and the second one consists of mobile phone numbers from the phone book). In spite of a large undercoverage of the survey population in the phone book, using both phone types in TADS improves the total coverage of the survey population and relieves a problem of coverage and response bias. The applied weighting procedure is described systematically. The probability sampling allows calculating quality indicators such as standard errors of survey estimates and helps optimizing the survey process.


Sign in / Sign up

Export Citation Format

Share Document