Sciweavers

74 search results - page 2 / 15
» Network Traffic Anomalies Detection and Identification with ...
Sort
View
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
14 years 10 days ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
APNOMS
2006
Springer
13 years 9 months ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka
USS
2008
13 years 8 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
CONEXT
2006
ACM
13 years 12 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
IMC
2010
ACM
13 years 3 months ago
Revisiting the case for a minimalist approach for network flow monitoring
Network management applications require accurate estimates of a wide range of flow-level traffic metrics. Given the inadequacy of current packet-sampling-based solutions, several ...
Vyas Sekar, Michael K. Reiter, Hui Zhang