Sciweavers

75 search results - page 2 / 15
» Detecting Policy Violations through Traffic Analysis
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 3 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
SSIAI
2002
IEEE
13 years 10 months ago
Automated Detection of All Kinds of Violations at a Street Intersection Using Real Time Individual Vehicle Tracking
2. Tracking traveling trajectory The traveling trajectory of eachvehicle is evaluatedfrom the analog images of 30 frames/sec.The computation of a traveling trajectory is mainly di...
Dae-Woon Lim, Sung-Hoon Choi, Joon-Suk Jun
NETWORKING
2004
13 years 6 months ago
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
If efficient network analysis tools were available, it could become possible to detect the attacks, anomalies and to appropriately take action to contain the attacks. In this paper...
Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannu...
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 6 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
TON
2008
106views more  TON 2008»
13 years 5 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy