Sciweavers

68 search results - page 3 / 14
» Strategic deployment of network monitors for attack attribut...
Sort
View
ICDCN
2009
Springer
14 years 24 days ago
Tracking Dynamics Using Sensor Networks: Some Recurring Themes
Abstract. Much of the data consumed today is dynamic, typically gathered from distributed sources including sensors, and used in real-time monitoring and decision making applicatio...
Krithi Ramamritham
CONEXT
2005
ACM
13 years 8 months ago
Optimal positioning of active and passive monitoring devices
Network measurement is essential for assessing performance issues, identifying and locating problems. Two common strategies are the passive approach that attaches specific device...
Claude Chaudet, Eric Fleury, Isabelle Guéri...
DISCEX
2003
IEEE
13 years 11 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
AIMS
2009
Springer
13 years 10 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
IMC
2007
ACM
13 years 7 months ago
On the impact of route monitor selection
Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering realtime BGP updates from different networks. Many stud...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...