Design of a high availability system with HAProxy and domain name service for web services

Author(s):  
Jose Emmanuel Cruz de la Cruz ◽  
Ing. Christian Augusto Romero Goyzueta
2022 ◽  
Vol 32 (2) ◽  
pp. 951-962
Author(s):  
Siyuan Liu ◽  
Shaoyong Guo ◽  
Ziwei Hu ◽  
Xin Xu ◽  
Wei Bai ◽  
...  

2016 ◽  
pp. 204-220
Author(s):  
Zakaria Maamar ◽  
Noura Faci ◽  
Ejub Kajan ◽  
Emir Ugljanin

As part of our ongoing work on social-intensive Web services, also referred to as social Web services, different types of networks that connect them together are developed. These networks include collaboration, substitution, and competition, and permit the addressing of specific issues related to Web service use such as composition, discovery, and high-availability. “Social” is embraced because of the similarities of situations that Web services run into at run time with situations that people experience daily. Indeed, Web services compete, collaborate, and substitute. This is typical to what people do. This chapter sheds light on some criteria that support Web service selection of a certain network to sign up over another. These criteria are driven by the security means that each network deploys to ensure the safety and privacy of its members from potential attacks. When a Web service signs up in a network, it becomes exposed to both the authority of the network and the existing members in the network as well. These two can check and alter the Web service's credentials, which may jeopardize its reputation and correctness levels.


Author(s):  
Lech J. Janczewski ◽  
Andrew M. Colarik

The Domain Name Service (DNS) is a mechanism for recognizing and translating domain name addresses. These operations are carried out by devices called Domain Name Servers. Thus, DNS attacks are attacks against the Domain Name Servers.


2006 ◽  
Vol 6 (1) ◽  
pp. 1-19 ◽  
Author(s):  
Jeng-Wei Lin ◽  
Jan-Ming Ho ◽  
Li-Ming Tseng ◽  
Feipei Lai
Keyword(s):  

2017 ◽  
Vol 13 (7) ◽  
pp. 155014771772079 ◽  
Author(s):  
Futai Zou ◽  
Siyu Zhang ◽  
Linsen Li ◽  
Li Pan ◽  
Jianhua Li

In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. In total, 3027 malware command-and-control domains in the network traffic of Shanghai Jiao Tong University, affecting 249 hosts, were successfully detected, with a high precision of 92.0%. This algorithm can find those malware with expired command-and-control domains that are usually ignored by current research and would have important value for eliminating network security risks and improving network security environment.


Sign in / Sign up

Export Citation Format

Share Document