Sciweavers

25 search results - page 2 / 5
» Passive visual fingerprinting of network attack tools
Sort
View
INFOCOM
2005
IEEE
13 years 10 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
VIROLOGY
2010
165views more  VIROLOGY 2010»
12 years 11 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
DSD
2008
IEEE
130views Hardware» more  DSD 2008»
13 years 11 months ago
On the Need for Passive Monitoring in Sensor Networks
—Debugging and analyzing Wireless Sensor Networks (WSNs) are important tasks for improving the quality and performance of the network. In this paper, Pimoto is to be presented, w...
Abdalkarim Awad, Rodrigo Nebel, Reinhard German, F...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 3 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
JSAC
2006
165views more  JSAC 2006»
13 years 4 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy