Sciweavers

49 search results - page 2 / 10
» Anomaly Detection and Mitigation for Disaster Area Networks
Sort
View
TMA
2010
Springer
314views Management» more  TMA 2010»
13 years 11 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
VEE
2012
ACM
215views Virtualization» more  VEE 2012»
12 years 15 days ago
SecondSite: disaster tolerance as a service
This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability...
Shriram Rajagopalan, Brendan Cully, Ryan O'Connor,...
NCA
2008
IEEE
13 years 11 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
ICCSA
2009
Springer
13 years 9 months ago
Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol
IEEE 802.11 Distributed Coordination Function (DCF) guarantees fair transmission opportunity to stations. Channel occupation of low rate stations in IEEE 802.11 Wireless Local Area...
Jin-Seong Kim, Tae-Jin Lee