Sciweavers

15 search results - page 3 / 3
» Blocking Skype through Deep Packet Inspection
Sort
View
ICASSP
2011
IEEE
12 years 9 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
ISCC
2000
IEEE
131views Communications» more  ISCC 2000»
13 years 10 months ago
An Empirical Study of Today's Internet Traffic for Differentiated Services IP QoS
The IETF is currently focused on Differentiated Services (Diffserv) as the architecture to provide Quality of Service in IP networks (IP-QoS). The Diffserv architecture consists o...
Fulu Li, Nabil Seddigh, Biswajit Nandy, Diego Matu...
IMC
2006
ACM
13 years 11 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
ANCS
2007
ACM
13 years 9 months ago
Compiling PCRE to FPGA for accelerating SNORT IDS
Deep Payload Inspection systems like SNORT and BRO utilize regular expression for their rules due to their high expressibility and compactness. The SNORT IDS system uses the PCRE ...
Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
13 years 12 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...