Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    REVIEW

    The Impact of Domain Name Server (DNS) over Hypertext Transfer Protocol Secure (HTTPS) on Cyber Security: Limitations, Challenges, and Detection Techniques

    Muhammad Dawood1, Shanshan Tu1, Chuangbai Xiao1, Muhammad Haris2, Hisham Alasmary3, Muhammad Waqas4,5,*, Sadaqat Ur Rehman6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4513-4542, 2024, DOI:10.32604/cmc.2024.050049 - 12 September 2024

    Abstract The DNS over HTTPS (Hypertext Transfer Protocol Secure) (DoH) is a new technology that encrypts DNS traffic, enhancing the privacy and security of end-users. However, the adoption of DoH is still facing several research challenges, such as ensuring security, compatibility, standardization, performance, privacy, and increasing user awareness. DoH significantly impacts network security, including better end-user privacy and security, challenges for network security professionals, increasing usage of encrypted malware communication, and difficulty adapting DNS-based security measures. Therefore, it is important to understand the impact of DoH on network security and develop new privacy-preserving techniques to allow More >

  • Open Access

    ARTICLE

    A Cascading Fault Path Prediction Method for Integrated Energy Distribution Networks Based on the Improved OPA Model under Typhoon Disasters

    Yue He1, Yaxiong You1, Zhian He1, Haiying Lu1, Lei Chen2,*, Yuqi Jiang2, Hongkun Chen2

    Energy Engineering, Vol.121, No.10, pp. 2825-2849, 2024, DOI:10.32604/ee.2024.052371 - 11 September 2024

    Abstract In recent times, the impact of typhoon disasters on integrated energy active distribution networks (IEADNs) has received increasing attention, particularly, in terms of effective cascading fault path prediction and enhanced fault recovery performance. In this study, we propose a modified ORNL-PSerc-Alaska (OPA) model based on optimal power flow (OPF) calculation to forecast IEADN cascading fault paths. We first established the topology and operational model of the IEADNs, and the typical fault scenario was chosen according to the component fault probability and information entropy. The modified OPA model consisted of two layers: An upper-layer model to More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952 - 29 November 2023

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can… More >

  • Open Access

    ARTICLE

    Domain Name Service Mechanism Based on Master-Slave Chain

    Siyuan Liu1, Shaoyong Guo1,*, Ziwei Hu2, Xin Xu3, Wei Bai2, Ningzhe Xing4, Xuesong Qiu1, Siwen Xu5

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 951-962, 2022, DOI:10.32604/iasc.2022.021202 - 17 November 2021

    Abstract Although the current Domain Name System (DNS) has been able to satisfy the use of network services, there are still many challenges in the future development of the Internet. The centralized management of traditional domain name management systems has many risks, and cannot defend against Distributed Denial of Service (DDoS) attacks and single points of failure. As a decentralized tool, blockchain provides innovative ideas for the improvement of domain name management systems. Starting from the existing network resolution system and combining the application of cross-chain communication in DNS, this paper proposes a domain name resolution More >

  • Open Access

    ARTICLE

    IDV: Internet Domain Name Verification Based on Blockchain

    Ning Hu1, Yu Teng2, Yan Zhao1, Shi Yin1, Yue Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 299-322, 2021, DOI:10.32604/cmes.2021.016839 - 24 August 2021

    Abstract The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification… More >

  • Open Access

    ARTICLE

    DNS Service Model Based on Permissioned Blockchain

    Yantao Shen1,*, Yang Lu2, Zhili Wang1, Xin Xv3, Feng Qi1, Ningzhe Xing4, Ziyu Zhao5

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 259-268, 2021, DOI:10.32604/iasc.2021.013704 - 07 January 2021

    Abstract With the continuous development of the Internet, the domain name system (DNS) as infrastructure is playing an increasingly important role. However, traditional DNS architecture is centralized, and there are some security problems such as the right concentration and power abuse. This paper combines blockchain technology with DNS technology and proposes a domain name service model based on the permissioned blockchain. At first, this paper designs a top-level domain chain (TLDChain) model to conduct consensus on block transactions and achieve decentralization of domain name service. Then, this paper introduces a data model to upload data. At More >

  • Open Access

    ARTICLE

    Blockzone: A Decentralized and Trustworthy Data Plane for DNS

    Ning Hu1, Shi Yin1, Shen Su1, *, Xudong Jia1, Qiao Xiang2, Hao Liu3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1531-1557, 2020, DOI:10.32604/cmc.2020.010949 - 20 August 2020

    Abstract The domain name system (DNS) provides a mapping service between memorable names and numerical internet protocol addresses, and it is a critical infrastructure of the Internet. The authenticity of DNS resolution results is crucial for ensuring the accessibility of Internet services. Hundreds of supplementary specifications of protocols have been proposed to compensate for the security flaws of DNS. However, DNS security incidents still occur frequently. Although DNS is a distributed system, for a specified domain name, only authorized authoritative servers can resolve it. Other servers must obtain the resolution result through a recursive or iterative… More >

  • Open Access

    ARTICLE

    Self-Certificating Root: A Root Zone Security Enhancement Mechanism for DNS

    Wenfeng Liu1, *, Yu Zhang1, Wenjia Zhang1, Lu Liu1, Hongli Zhang1, Binxing Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 521-536, 2020, DOI:10.32604/cmc.2020.07982 - 30 March 2020

    Abstract As a critical Internet infrastructure, domain name system (DNS) protects the authenticity and integrity of domain resource records with the introduction of security extensions (DNSSEC). DNSSEC builds a single-center and hierarchical resource authentication architecture, which brings management convenience but places the DNS at risk from a single point of failure. When the root key suffers a leak or misconfiguration, top level domain (TLD) authority cannot independently protect the authenticity of TLD data in the root zone. In this paper, we propose self-certificating root, a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol. More >

  • Open Access

    ARTICLE

    Therapeutic Injection of a C-Type CpG ODN Induced an Antitumor Immune Response in C57/BL6 Mice of Orthotopically Transplanted Hepatocellular Carcinoma

    Huijie Jia*†1, Tiesuo Zhao‡§1, Di Zou, Xiaolong Jia§, Ji Gao#, Xiangfeng Song‡§

    Oncology Research, Vol.23, No.6, pp. 321-326, 2015, DOI:10.3727/096504016X14570992647041

    Abstract Synthetic CpG oligodeoxynucleotides (ODNs), as TLR9 agonists, have been found to play a possible role in antitumor effect. In order to determine the effect of YW002, known as a C-type CpG ODN, on the treatment of hepatocellular carcinoma (HCC), which is one of the most aggressive carcinomas, we chose to inject YW002 at the doses of 12.5 μg and 25 μg per mouse 7 days post-tumor challenge. The survival rate of mice was recorded every day. On day 14 postinjection, five mice in each group were bled and randomly sacrificed. The level of IFN-γ or… More >

Displaying 1-10 on page 1 of 9. Per Page