Adaptive caching approach to prevent DNS cache poisoning attack

被引:0
|
作者
机构
[1] [1,Hmood, Haider Salim
[2] Li, Zhitang
[3] Abdulwahid, Hasan Khalaf
[4] Zhang, Yang
来源
Li, Zhitang (leeying@mail.hust.edu.cn) | 1600年 / Oxford University Press卷 / 58期
关键词
Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Journal article (JA)
引用
收藏
相关论文
共 50 条
  • [41] Adaptive TTL based Approach to Balance DNS Server Load
    Mackus, T.
    Simonaitis, T.
    Tamulioniene, D.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2012, 117 (01) : 81 - 84
  • [42] An ICMP based Secondary Cache approach for the detection and prevention of ARP Poisoning
    Tripathi, Nikhil
    Mehtre, B. M.
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 269 - 274
  • [43] Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack
    Zhou, Zan
    Xu, Changqiao
    Ma, Tengchao
    Kuan, Xiaohui
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [44] Caching Efficiency Maximization for Device-to-Device Communication Networks: A Recommend to Cache Approach
    Fu, Yaru
    Salaun, Lou
    Yang, Xiaolong
    Wen, Wanli
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (10) : 6580 - 6594
  • [45] On-line Cache Strategy Reconfiguration for Elastic Caching Platform: A Machine Learning Approach
    Qin, Xiulei
    Zhang, Wenbo
    Wang, Wei
    Wei, Jun
    Zhong, Hua
    Huang, Tao
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 523 - 534
  • [46] Integrated approach to prevent SQL injection attack and reflected cross site scripting attack
    Sharma, Pankaj
    Johari, Rahul
    Sarma, S. S.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2012, 3 (04) : 343 - 351
  • [47] WaterPurifier: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network
    Yin, Lihua
    Zhu, Muyijie
    Liu, Wenxin
    Luo, Xi
    Wang, Chonghua
    Li, Yangyang
    COMPUTER COMMUNICATIONS, 2023, 199 : 186 - 195
  • [48] An adaptive KPCA approach for detecting LDoS attack
    Zhang, Xiaoyu
    Wu, Zhijun
    Chen, Jiusheng
    Yue, Meng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (04)
  • [49] A New Approach to Prevent Reentrant Attack in Solidity Smart Contracts
    Dong, Chunyan
    Li, Yuanhong
    Tan, Liang
    BLOCKCHAIN TECHNOLOGY AND APPLICATION: SECOND CCF CHINA BLOCKCHAIN CONFERENCE (CBCC 2019), 2020, 1176 : 83 - 103
  • [50] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Naveen Kumar
    Ashutosh Kumar Singh
    Shashank Srivastava
    International Journal of Networked and Distributed Computing, 2018, 6 (3) : 174 - 184