Sciweavers

107 search results - page 1 / 22
» Visual Correlation of Host Processes and Network Traffic
Sort
View
VIZSEC
2005
Springer
13 years 11 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
WISE
2000
Springer
13 years 10 months ago
A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks
A closed form of autocorrelation functions about asymptotically self-similar processes is presented. The verification shows that this form best the realtrajfic data on Ethernet in...
Ming Li, Weijia Jia, Wei Zhao
CCS
2003
ACM
13 years 10 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
PAM
2007
Springer
13 years 11 months ago
Neuro-fuzzy Processing of Packet Dispersion Traces for Highly Variable Cross-Traffic Estimation
Cross-traffic data rate over the tight link of a path can be estimated using different active probing packet dispersion techniques. Many of these techniques send large amounts of p...
Marco A. Alzate, Néstor M. Peña, Mig...
SIGCOMM
1996
ACM
13 years 9 months ago
On the Relevance of Long-Range Dependence in Network Traffic
There is much experimental evidence that network traffic processes exhibit ubiquitous properties of self-similarity and long-range dependence, i.e., of correlations over a wide ran...
Matthias Grossglauser, Jean-Chrysostome Bolot