Limpar
128 resultados

Acesso Aberto

Tipo do recurso

Ano de criação

Editores

Revisado por pares

Áreas

Produção nacional

Idioma

Capítulo de livro Revisado por pares

Matteo Varvello, Kyle Schomp, David Naylor, Jeremy Blackburn, Alessandro Finamore, Konstantina Papagiannaki,

Version 2 of the Hypertext Transfer Protocol (HTTP/2) was finalized in May 2015 as RFC 7540. It addresses well-known problems with HTTP/1.1 (e.g., head of line blocking ... e.g., server push and content priority). Though HTTP/2 is designed to be the future of the ... question, we built a measurement platform that monitors HTTP/2 adoption and performance across the Alexa top 1 ... October 2015, we find 68,000 websites reporting HTTP/2 support, of which about 10,000 actually serve ... it. Unsurprisingly, popular sites are quicker to adopt HTTP/2 and 31 % of the Alexa top 100 already ...

Tópico(s): Digital Platforms and Economics

2016 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Enrico Bocchi, Luca De Cicco, Marco Mellia, Dario Rossi,

... particular on the impact of HTTP/1 vs HTTP/2. We adopt an experimental methodology that uses real ... that we explore to tackle the question whether HTTP/2 improves users experience, to what extent, and in ... report marginal differences, with 22%, 52%, 26% of HTTP/2 MOS being better, identical, or worse than HTTP/1, respectively. Even in scenarios that favor HTTP/2, results are not as sharp as expected. This ... metrics, which instead record a positive impact with HTTP/2 usage. This shows the complexity of understanding the ...

Tópico(s): Image and Video Quality Assessment

2017 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Amit Praseed, P. Santhi Thilagam,

The introduction of HTTP/2 has led to a dramatic change in web traffic. The steady flow of requests in HTTP/1.1 has ... largely due to the introduction of multiplexing in HTTP/2 which allows users to send multiple requests through ... to launch sophisticated application layer DDoS attacks against HTTP/2 servers. Instead of the intended use of multiplexing, ... Multiplexed Asymmetric Attacks, pose a dangerous threat to HTTP/2 servers and stem from the lack of verification ... In this work, an approach to model an HTTP/2 request set as a fuzzy multiset is presented. ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2021 - Elsevier BV | Expert Systems with Applications

Capítulo de livro Revisado por pares

Kyriakos Zarifis, Mark Holland, Manish Jain, Ethan Katz-Bassett, Ramesh Govindan,

With the standardization of HTTP/2, content providerswant to understand the benefits and pitfalls of transitioning to the new standard. Using a large dataset of HTTP/ ... on Akamai's CDN, and a model of HTTP/2 behavior, we obtain the distribution of performance differences ... for nearly 280,000 downloads. We find that HTTP/2 provides significant performanceimprovements in the tail, and, for websites for which HTTP/2 does not improve median performance, we explore how ...

Tópico(s): Peer-to-Peer Network Technologies

2016 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Erwin Adi, Zubair Baig, Philip Hingston,

... vulnerable to such attacks. With the emergence of HTTP/2 as the successor of HTTP/1.x, existing ... web servers as yet have not migrated to HTTP/2, DoS attack modelling and detection is essential to ... DoS attack traffic that can be directed towards HTTP/2 web servers. The research conducted also extends previous studies that provided DoS attack models against HTTP/2 services, to present a novel and stealthy DoS ...

Tópico(s): Advanced Malware Detection Techniques

2017 - Elsevier BV | Journal of Network and Computer Applications

Artigo Revisado por pares

Nikhil Tripathi, Neminath Hubballi,

HTTP/2 is a newly standardized protocol designed to efficiently utilize the TCP's transmission rate and has ... First we describe few new threat vectors of HTTP/2 which are Slow Rate DoS attacks and can ... proposed attacks using both clear text and encrypted HTTP/2 requests and find that the attack is effective ... attacks with HTTP/1.1 and report that HTTP/2 has more threat vectors compared to its predecessor. ...

Tópico(s): Advanced Malware Detection Techniques

2017 - Elsevier BV | Computers & Security

Artigo Revisado por pares

Amit Praseed, P. Santhi Thilagam,

... are extremely difficult to detect. The introduction of HTTP/2 has been welcomed by developers because it improves ... in this area. Existing research demonstrates that the HTTP/2 protocol allows users to launch DDoS attacks easily, but does not focus on whether an HTTP/2 server can handle DDoS attacks more efficiently or ... this work, we analyse the performance of an HTTP/2 server compared to an HTTP/1.1 server ...

Tópico(s): Advanced Malware Detection Techniques

2019 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Artigo Revisado por pares

Mariem Ben Yahia, Yannick Le Louédec, Gwendal Simon, Loutfi Nuaymi, Xavier Corbillon,

... switching between successive video segments. We also propose HTTP/2-based algorithms to apply video frame discarding policies ... algorithms, we request the video frames individually through HTTP/2 multiple streams, and we selectively drop the least meaningful video frames thanks to HTTP/2 stream resetting feature. Our simulations show that the ... also show that requesting video frames separately with HTTP/2 slightly increases the overhead from 4.34% to ...

Tópico(s): Advanced Data Compression Techniques

2019 - Association for Computing Machinery | ACM Transactions on Multimedia Computing Communications and Applications

Artigo Revisado por pares

Hua Wu, Xin Li, Gang Wang, Guang Cheng, Xiaoyan Hu,

... measure the video resolution from traffic. However, with HTTP/2 being gradually adopted in video services, the multiplexing feature of HTTP/2 allows audio and video chunks to be mixed ... monitor resolution for adaptive encrypted video traffic under HTTP/2. We consider the size of the mixed data ... and monitor the QoE of video services under HTTP/2.

Tópico(s): Digital Media Forensic Detection

2022 - Association for Computing Machinery | ACM Transactions on Multimedia Computing Communications and Applications

Artigo Acesso aberto

Biljana Dimitrova, Aleksandra Mileva,

... new covert channels which utilize the new standard, HTTP/2, and which can be used regardless its transport ... is the first research about hiding data in HTTP/2. Also, we give a small survey of existing ... do they work or not work with the HTTP/2.

Tópico(s): Network Security and Intrusion Detection

2017 - Scientific Research Publishing | Journal of Computer and Communications

Artigo Revisado por pares

Zhimin Xu, Xinggong Zhang, Zongming Guo,

... the current DAS systems. With dynamic k-push, HTTP/2 live streaming promises to achieve low live latency ... driven adaptive k-push mechanism (QK-Push) for HTTP/2 live streaming. The client just sends one request ... a discrete space Lagrangian method. We implement an HTTP/2 live streaming prototype system, with the QK-Push ...

Tópico(s): Video Coding and Compression Technologies

2018 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology

Artigo Revisado por pares

Hung T. Le, Thoa Nguyen, Nam Pham Ngoc, Anh T. Pham, Truong Cong Thang,

... has limitations for live streaming. Meanwhile, the new HTTP/2 was standardized in 2015 with many improvements. In this letter, we present a novel HTTP/2-based adaptation scheme for low-delay live streaming over mobile networks. The proposed scheme leverages two HTTP/2 features called server push and stream termination to ...

Tópico(s): Multimedia Communication and Technology

2018 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Circuits and Systems for Video Technology

Artigo

Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Elias Bou‐Harb, Chadi Assi,

... technologies such as Hypertext Transfer Protocol version 2 (HTTP/2) used for signaling and application programming interfaces (APIs) ... solutions in this new architecture. We carefully examine HTTP/2 features, standards, and custom headers, and discuss their ... We comment on the applicability of some known HTTP/2 attacks in 5G SBA in light of the ...

Tópico(s): Advanced Malware Detection Techniques

2022 - Institute of Electrical and Electronics Engineers | IEEE Communications Magazine

Artigo Acesso aberto

Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, Vikas Kumar,

... underwent a consequential enhancement and was released as HTTP/2.HTTP/2 includes pipelining, response multiplexing, server push and header ... to monitor or fingerprint a website running on HTTP/2.This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. ... monitoring a live network traffic, its properties with HTTP/2 is assessed.This study helps understand the different ...

Tópico(s): Network Traffic and Congestion Control

2018 - | Journal of Cyber Security and Mobility

Artigo Revisado por pares

Hung T. Le, Thang Vu, Nam Pham Ngoc, Anh T. Pham, Truong Cong Thang,

... servers, as well as network nodes. The new HTTP/2 protocol provides a server push feature, which allows ... adaptation method to leverage the push feature of HTTP/2. Our method takes into account not only the ...

Tópico(s): Advanced Data Compression Techniques

2016 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Communications

Artigo Acesso aberto Revisado por pares

Jeroen van der Hooft, Stefano Petrangeli, Tim Wauters, Rafael Huysegems, Tom Bostoen, Filip De Turck,

... in live streaming scenarios. In the meantime, the HTTP/2 protocol was standardized in February 2015, providing new ... novel push-based approach for HAS, in which HTTP/2’s push feature is used to actively push ...

Tópico(s): Multimedia Communication and Technology

2017 - Springer Science+Business Media | Journal of Network and Systems Management

Artigo Revisado por pares

Mohammad R. Momeni, Zeyu Zhang, David Dell’Angelo, Farnaz A. Shakib,

... calculations. Our computed O2 adsorption energies of Co3(HTTP)2 (HTTP = hexathiotriphenylene), as a representative of the 2D ... adsorptive capability of its redox-active linkers, Co3(HTTP)2 is superior to the analogues 3D MOFs where ... that the conductive behavior of the studied Co3(HTTP)2 2D MOF changes dramatically from metallic in the ...

Tópico(s): 2D Materials and Applications

2021 - American Institute of Physics | APL Materials

Artigo Revisado por pares

Mohammad R. Momeni, Zeyu Zhang, David Dell’Angelo, Farnaz A. Shakib,

... layered electrically conductive Cu3(HHTP)2 and Cu3(HTTP)2 metal-organic frameworks (HHTP = 2,3,6,7,10,11-hexahydroxytriphenylene and HTTP = 2,3,6,7,10,11-hexathiotriphenylene). Comparing water ... open-Cu2+ sites. Theory predicts that in Cu3(HTTP)2 the van der Waals interactions are stronger which ...

Tópico(s): Covalent Organic Framework Applications

2021 - Royal Society of Chemistry | Physical Chemistry Chemical Physics

Artigo Acesso aberto Revisado por pares

Efstratios Chatzoglou, Vasileios Kouliaridis, Georgios Kambourakis, Γεώργιος Καρόπουλος, Stefanos Gritzalis,

... we provide a complete review of attacks against HTTP/2, and elaborate on if and in which way ... quartet of attacks, either stemming directly from the HTTP/2 relevant literature or being entirely new. This scrutiny ...

Tópico(s): Privacy, Security, and Data Protection

2022 - Elsevier BV | Computers & Security

Artigo Acesso aberto Revisado por pares

Md Siduzzaman, Md Monir Hossan, Rakibul Alom, Talha Bin Sarwar, M. Saef Ullah Miah,

Abstract HTTP/2 is a cutting-edge Web convention predicated on Google’s SPDY convention which tries to tackle the ... for Online shopping, this paper demonstrates that whether HTTP/2 can authentically avail the performance of an e- ... paper states that we have studied about the HTTP/2 Implementation & performance analysis for prevalent web frameworks, where ... in HTTP, then we have implemented those into HTTP/2. We additionally deployed them on the live server. ... tool has exhibited some errors only for the http/2. This is our only constraint for this work. ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2020 - IOP Publishing | Journal of Physics Conference Series

Artigo Acesso aberto Revisado por pares

Nikhil Tripathi,

... 1. However, those defence approaches are incompatible with HTTP/2 because of several operation differences between HTTP/1.1 and its successor, HTTP/2. Also, to the best of our knowledge, no ... to detect Slow Rate DoS attacks against an HTTP/2 supporting web server in real-time . To bridge ... event sequence analysis-based scheme to detect Slow HTTP/2 DoS attacks. Using extensive experiments, we show that ... present a study on the behaviour of popular HTTP/2 servers on the Internet against Slow HTTP/2 DoS attacks. Surprisingly, we noticed that several of ...

Tópico(s): Advanced Malware Detection Techniques

2023 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing

Artigo Acesso aberto Revisado por pares

Hussein Bakri, Colin Allison, Alan Miller, Iain Oliver,

... being deployed on the web such as SPDY, HTTP/2 and QUIC seek to reduce latency and routinely ...

Tópico(s): Simulation and Modeling Applications

2015 - Elsevier BV | Procedia Computer Science

Artigo Acesso aberto

Duc V. Nguyen, Hung T. Le, Pham Ngoc Nam, Anh T. Pham, Truong Cong Thang,

... adaptation method for adaptive streaming over the new HTTP/2 protocol, leveraging its server push feature. The method ...

Tópico(s): Advanced Data Compression Techniques

2016 - | IEICE Communications Express

Artigo Acesso aberto Revisado por pares

Jeroen van der Hooft, Stefano Petrangeli, Tim Wauters, Rafael Huysegems, Patrice Rondão Alface, Tom Bostoen, Filip De Turck,

... this letter, we discuss the merits of an HTTP/2 push-based approach. We present the details of ...

Tópico(s): Multimedia Communication and Technology

2016 - IEEE Communications Society | IEEE Communications Letters

Artigo Acesso aberto Revisado por pares

Sarfraz Ahmad, Muhammad Junaid Arshad,

Hypertext Transfer Protocol-2 (HTTP/2) partially resolved the problem of Head-of-Line Blocking (HoLB) by multiplexing independent messages at the application layer. This enables ... single TCP connection. It makes TCP compatible with HTTP/2, reduces data delivery latency between transport and application ...

Tópico(s): Advanced Wireless Network Optimization

2019 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Revisado por pares

Anwang Dong, Zhenjie Mu, Xiangjian Meng, Shuai Li, Jiani Li, Lu Dai, Jianning Lv, Pengfei Li, Bo Wang,

... hybridization. Beyond controlling the EM parameters of Cu3(HTTP)2 (2,3,6,7,10,11-hexahydroxytriphenylene, HHTP), ... among another three isostructural 2D c-MOFs M3(HTTP)2 (M = Zn, Ni, or Co). The strongest EM ...

Tópico(s): Metamaterials and Metasurfaces Applications

2022 - Elsevier BV | Chemical Engineering Journal

Artigo Acesso aberto

Meenakshi Suresh, P. P. Amritha, Ashok Kumar Mohan, V. Anil Kumar,

... underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header ... to monitor or fingerprint a website running on HTTP/2. This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. ... monitoring a live network traffic, its properties with HTTP/2 is assessed. This study helps understand the different ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2018 - | Journal of Cyber Security and Mobility

Artigo Acesso aberto Revisado por pares

Nguyễn Viết Hưng, Duy Tien Bui, Thanh Lam Tran, Cong Thang Truong, Trương Thu Hương,

... novel approach for 360-degree video streaming over HTTP/2 that can provide consumers with a good watching ... network and user adaptivity. With the support of HTTP/2's stream termination capability, the delivery of late ...

Tópico(s): Multimedia Communication and Technology

2024 - Elsevier BV | Computer Communications

Artigo Acesso aberto

S. Abdullah, Alshammari, Ahmad Al Mogren,

... the current status of HTTP 1.1, SPDY, HTTP/2 and HTTP over UDP protocols. In addition to the analysis and benchmarking of HTTP/2 in modern web services and mobile sensing-based ...

Tópico(s): Water Quality Monitoring Technologies

2016 - OMICS Publishing Group | Journal of Electrical & Electronic Systems

Artigo Acesso aberto Revisado por pares

Liang Ming, Yu‐Beng Leau, Ying Xie,

... a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the network transmission speed and ... of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions ... attack detection. By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2024 - Institute of Electrical and Electronics Engineers | IEEE Access