Sciweavers

40 search results - page 8 / 8
» Using router stamping to identify the source of IP packets
Sort
View
LCN
2003
IEEE
13 years 10 months ago
A Performance Study of Fast Handovers for Mobile IPv6
We conducted a simulative evaluation of the overall performance of Fast Handovers for Mobile IPv6 in comparison with the baseline Mobile IPv6 using the network simulator ns-2 for ...
Marc Torrent-Moreno, Xavier Pérez Costa, Se...
CCS
2004
ACM
13 years 10 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
INFOCOM
2006
IEEE
13 years 11 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
WS
2005
ACM
13 years 11 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
SIGMETRICS
2005
ACM
100views Hardware» more  SIGMETRICS 2005»
13 years 11 months ago
On AS-level path inference
The ability to discover the AS-level path between two end-points is valuable for network diagnosis, performance optimization, and reliability enhancement. Virtually all existing t...
Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang