Internet Society

Displaying 1-4 of 4 results

  • White Papers // Dec 2013

    DSpin: Detecting Automatically Spun Content on the Web

    Web spam is an abusive search engine optimization technique that artificially boosts the search result rank of pages promoted in the spam content. A popular form of web spam today relies upon automated spinning to avoid duplicate detection. Spinning replaces words or phrases in an input article to create new...

    Provided By Internet Society

  • White Papers // Dec 2013

    CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers

    Cybercriminals use different types of geographically distributed servers to run their operations such as C&C servers for managing their malware, exploit servers to distribute the malware, payment servers for monetization, and redirectors for anonymity. Identifying the server infrastructure used by a cybercrime operation is fundamental for defenders, as it enables...

    Provided By Internet Society

  • White Papers // Oct 2009

    Advisory Council (AC) Consultation on Cloud Computing

    Cloud computing promises a powerful new platform for innovation. It allows entrepreneurs to develop, deploy, market, and sell cloud applications worldwide without having to invest in expensive IT computing infrastructure. It also gives smaller businesses access to the same industrial-strength computing systems as large multinational corporations, boosting the competitiveness of...

    Provided By Internet Society

  • White Papers // Dec 2003

    Session Initiation Protocol (SIP) Public Switched Telephone Network (PSTN) Call Flows

    This paper contains best current practice examples of Session Initiation Protocol (SIP) call flows showing interworking with the Public Switched Telephone Network (PSTN). Elements in these call flows include SIP User Agents, SIP Proxy Servers, and PSTN Gateways. Scenarios include SIP to PSTN, PSTN to SIP, and PSTN to PSTN...

    Provided By Internet Society

  • White Papers // Dec 2013

    CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers

    Cybercriminals use different types of geographically distributed servers to run their operations such as C&C servers for managing their malware, exploit servers to distribute the malware, payment servers for monetization, and redirectors for anonymity. Identifying the server infrastructure used by a cybercrime operation is fundamental for defenders, as it enables...

    Provided By Internet Society

  • White Papers // Dec 2013

    DSpin: Detecting Automatically Spun Content on the Web

    Web spam is an abusive search engine optimization technique that artificially boosts the search result rank of pages promoted in the spam content. A popular form of web spam today relies upon automated spinning to avoid duplicate detection. Spinning replaces words or phrases in an input article to create new...

    Provided By Internet Society

  • White Papers // Dec 2003

    Session Initiation Protocol (SIP) Public Switched Telephone Network (PSTN) Call Flows

    This paper contains best current practice examples of Session Initiation Protocol (SIP) call flows showing interworking with the Public Switched Telephone Network (PSTN). Elements in these call flows include SIP User Agents, SIP Proxy Servers, and PSTN Gateways. Scenarios include SIP to PSTN, PSTN to SIP, and PSTN to PSTN...

    Provided By Internet Society

  • White Papers // Oct 2009

    Advisory Council (AC) Consultation on Cloud Computing

    Cloud computing promises a powerful new platform for innovation. It allows entrepreneurs to develop, deploy, market, and sell cloud applications worldwide without having to invest in expensive IT computing infrastructure. It also gives smaller businesses access to the same industrial-strength computing systems as large multinational corporations, boosting the competitiveness of...

    Provided By Internet Society