Sciweavers

22 search results - page 4 / 5
» On the performance of Internet worm scanning strategies
Sort
View
LCN
2005
IEEE
13 years 11 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...
MMMACNS
2005
Springer
13 years 11 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
INFOCOM
2009
IEEE
14 years 19 days ago
Fit a Spread Estimator in Small Memory
—The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a...
MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Pei...
INFOCOM
2008
IEEE
14 years 12 days ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin
PDPTA
2010
13 years 3 months ago
Morphing Parallelization Strategy to Support On-the-Fly Video Analysis
To automate and accelerate Internet video search, we propose a parallelized on-the-fly video analysis that is distinguished from the conventional approaches in the following two f...
Munehiro Fukuda, Shuichi Kurabayashi, Jeremy K. Ha...