Sciweavers

272 search results - page 2 / 55
» A flow based approach for SSH traffic detection
Sort
View
TON
2008
106views more  TON 2008»
13 years 5 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
EAAI
2008
131views more  EAAI 2008»
13 years 5 months ago
A behavioral multi-agent model for road traffic simulation
Multi-agent systems allow the simulation of complex phenomena that cannot easily be described analytically. Multi-agent approaches are often based on coordinating agents whose act...
Arnaud Doniec, René Mandiau, Sylvain Piecho...
USS
2008
13 years 7 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
IJBIDM
2008
114views more  IJBIDM 2008»
13 years 5 months ago
Traffic mining in a road-network: How does the traffic flow?
: The flow of data coming from modern sensing devices enables the development of novel research techniques related to data management and knowledge extraction. In this work, we und...
Irene Ntoutsi, Nikos Mitsou, Gerasimos Marketos
LCN
2006
IEEE
13 years 11 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...