• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 4
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 18
  • 18
  • 18
  • 8
  • 8
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Klientská aplikace protokolu DNS s grafickým rozhraním pro účely výuky / DNS client application with a graphical interface for teaching purposes

Biolek, Martin January 2021 (has links)
The goal of the Master thesis on the topic of the Client application of DNS protocol with graphical interface for teaching purposes is to create a program with the features of sending, receiving DNS, MDNS and LLMNR protocols with optional parameters. Additionally, compare the created application with available tools such as Nslookup, Dig and create examples of application for teaching.
2

Legal framework for domain names /

Montes, Io. January 2005 (has links) (PDF)
Diss. jur. Zürich. / Literaturverz.
3

Zum Kennzeichenrecht im Internet : eine Untersuchung der Verletzungsansprüche des Kennzeicheninhabers unter Berücksichtigung deutscher und amerikanischer Spruchpraxis /

Kanz, Christine. January 2002 (has links) (PDF)
Univ., Diss.--Düsseldorf, 2002.
4

Dynamika obchodního modelu v telekomunikacích / Dynamics of business model in telecommunications

Filipová Fuchsová, Regina January 2002 (has links)
This doctoral thesis is focused on the most progressive part of telecommunications nowadays, on Internet governance and Internet domain name system. This field is not only highly interesting, but only very little researched area from the point of view of economics sciences compared to the traditional fields. Recently, the question of Internet governance was highlighted, but it has been neither resolved nor sufficiently discussed so far. The theory does not answer many questions raised by the praxis sufficiently. The aim of the thesis was to describe the branch in detail and to develop an original model, which would characterise the dependency of the number of registrations on other indicators. This doctoral thesis of Regina Filipova Fuchsova brings a detailed analysis of factors influencing the domain name system. This is the first analysis of this art ever, which targets top level domains .cz and .eu. Typology of TLD registries and connection of domain name selection with the company strategy are further new findings. Based on own analysis and case studies, the author concludes, that there is a relatively strong dependency of the number of registered domains under the respective TLD on national economy characteristics and that the model of the relationship of a ccTLD registry and respective government significantly varies in particular countries. This is due to the historical development and national specifics. The author further came to the conclusion, that national and generic TLDs are partially substitutes and partially complements on national markets. It depends on concrete market and the degree of ccTLD liberalisation, because generic TLDs act as substitutes to the country code TLD on not liberalised markets and/or where the ccTLD is rather expensive. As for the liberalised markets, the growth of a ccTLD goes hand in hand with the growth of gTLD and they compete less. National TLDs of the EU countries and the European TLD .eu show the nature of complements according to the statistical analysis. There are significant theoretical and practical contributions of this work because of its wide content and original analysis in this field. The findings can be practically used for registry benchmarking and ideas related to the delegation of new top level domains.
5

Early detection of malicious web content with applied machine learning

Likarish, Peter F. 01 July 2011 (has links)
This thesis explores the use of applied machine learning techniques to augment traditional methods of identifying and preventing web-based attacks. Several factors complicate the identification of web-based attacks. The first is the scale of the web. The amount of data on the web and the heterogeneous nature of this data complicate efforts to distinguish between benign sites and attack sites. Second, an attacker may duplicate their attack at multiple, unexpected locations (multiple URLs spread across different domains) with ease. Third, attacks can be hosted nearly anonymously; there is little cost or risk associated with hosting or publishing a web-based attack. In combination, these factors lead one to conclude that, currently, the webs threat landscape is unfavorably tilted towards the attacker. To counter these advantages this thesis describes our novel solutions to web se- curity problems. The common theme running through our work is the demonstration that we can detect attacks missed by other security tools as well as detecting attacks sooner than other security responses. To illustrate this, we describe the development of BayeShield, a browser-based tool capable of successfully identifying phishing at- tacks in the wild. Progressing from specific to a more general approach, we next focus on the detection of obfuscated scripts (one of the most commonly used tools in web-based attacks). Finally, we present TopSpector, a system we've designed to forecast malicious activity prior to it's occurrence. We demonstrate that by mining Top-Level DNS data we can produce a candidate set of domains that contains up to 65% of domains that will be blacklisted. Furthermore, on average TopSpector flags malicious domains 32 days before they are blacklisted, allowing the security community ample time to investigate these domains before they host malicious activity.
6

The Globalisation Of Regulation And Its Impact On The Domain Name System : Domain Names And A New Regulatory Economy

Williams, Elizabeth A. January 2003 (has links)
This is a multidisciplinary work that encompasses considerations of politics, regulation and technology. It considers the impact of technology on the way in which, politically, we are able to regulate technology and how we devise policy to guide that regulation. The added complication is that Internet technology knows no jurisdiction. The rulemaking established in recent years is globally applicable and is carried out without the direct involvement of national governments in the key decision making processes, particularly in the environment under examination here which focuses on the management of the technical resources of the Internet. In formulating the hypothesis that grounds this work, I have focused on two things. Firstly, that technical regulation has political, and therefore, policy implications. Secondly, that where there are policy implications with direct commercial impact, we can expect to see the vigorous involvement of corporations as they manage the environment in which they do business. These two critical conditions have driven the formulation of policies and procedures for making decisions about Internet governance. They have also driven the actual decisions which have been implemented, to a greater or lesser degree of success. This research contributes to the scholarship in four significant ways. The first is that the Internet Domain Name System (IDNS) and its governance present a new perspective on the discussion of the globalisation of business regulation. The data used to support the analysis has not been collated or examined previously and is presented here to illustrate the extension of the literature and to frame the hypothesis. The second is that I have found that national governments have, despite ongoing control within their national jurisdiction, little effective influence over the management and governance of the Domain Name System (DNS) at an international level. Thirdly, I have found that corporations have significant power to determine the way in which policies for the management of the technical resources of the Internet are discussed, developed to consensus policy positions, implemented and reviewed. Finally, the research has opened up new lines of inquiry into the rise of a new class of bureaucrats, the cosmocrats and their cosmocracy, on which further research continues.
7

Die Verwechselbarkeit von Internet Domain Names : nach schweizerischen Firmen-, Marken-, Namens- und Lauterbarkeitsrecht /

Buri, Ueli. January 2000 (has links) (PDF)
Univ., Diss.--Bern, 1999.
8

Rechtsfragen von Domain-Namen : eine empirische und dogmatische Untersuchung zivilrechtlicher Probleme, die durch die Benutzung von Domain-Namen im Internet aufgeworfen werden, insbesondere im Namens- und Kennzeichenrecht /

Krumpholz, Otfried. January 2003 (has links) (PDF)
Univ., Diss.--Frankfurt am Main, 2002. / Literaturverz. S. XV - XIX.
9

Nasazení DNSSEC na klientské straně / Client side DNSSEC deployment

Nekuža, Karel January 2018 (has links)
Diplomová práce se zabývá problémem přístupu koncového uživatele k odpovědím ověřeným pomocí protokolu DNSSEC. Práce posuzuje možnosti nasazení a nastavování resolveru za účelem zlepšení bezpečnosti pro koncové uživatele. V práci je navrhnuto řešení problému pro operační systém Fedora Workstation. Navrhnuté řešení je realizováno a porovnáno s již existujícím řesením.
10

Attacking and securing Network Time Protocol

Malhotra, Aanchal 14 February 2020 (has links)
Network Time Protocol (NTP) is used to synchronize time between computer systems communicating over unreliable, variable-latency, and untrusted network paths. Time is critical for many applications; in particular it is heavily utilized by cryptographic protocols. Despite its importance, the community still lacks visibility into the robustness of the NTP ecosystem itself, the integrity of the timing information transmitted by NTP, and the impact that any error in NTP might have upon the security of other protocols that rely on timing information. In this thesis, we seek to accomplish the following broad goals: 1. Demonstrate that the current design presents a security risk, by showing that network attackers can exploit NTP and then use it to attack other core Internet protocols that rely on time. 2. Improve NTP to make it more robust, and rigorously analyze the security of the improved protocol. 3. Establish formal and precise security requirements that should be satisfied by a network time-synchronization protocol, and prove that these are sufficient for the security of other protocols that rely on time. We take the following approach to achieve our goals incrementally. 1. We begin by (a) scrutinizing NTP's core protocol (RFC 5905) and (b) statically analyzing code of its reference implementation to identify vulnerabilities in protocol design, ambiguities in specifications, and flaws in reference implementations. We then leverage these observations to show several off- and on-path denial-of-service and time-shifting attacks on NTP clients. We then show cache-flushing and cache-sticking attacks on DNS(SEC) that leverage NTP. We quantify the attack surface using Internet measurements, and suggest simple countermeasures that can improve the security of NTP and DNS(SEC). 2. Next we move beyond identifying attacks and leverage ideas from Universal Composability (UC) security framework to develop a cryptographic model for attacks on NTP's datagram protocol. We use this model to prove the security of a new backwards-compatible protocol that correctly synchronizes time in the face of both off- and on-path network attackers. 3. Next, we propose general security notions for network time-synchronization protocols within the UC framework and formulate ideal functionalities that capture a number of prevalent forms of time measurement within existing systems. We show how they can be realized by real-world protocols (including but not limited to NTP), and how they can be used to assert security of time-reliant applications-specifically, cryptographic certificates with revocation and expiration times. Our security framework allows for a clear and modular treatment of the use of time in security-sensitive systems. Our work makes the core NTP protocol and its implementations more robust and secure, thus improving the security of applications and protocols that rely on time.

Page generated in 0.0619 seconds