Sciweavers

259 search results - page 13 / 52
» ccr 2008
Sort
View
CCR
2006
114views more  CCR 2006»
13 years 4 months ago
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification
The identification of network applications through observation of associated packet traffic flows is vital to the areas of network management and surveillance. Currently popular m...
Nigel Williams, Sebastian Zander, Grenville J. Arm...
CCR
2005
65views more  CCR 2005»
13 years 4 months ago
The IETF, the IRTF, and the networking research community
Some in the research community perceive the Internet Engineering Task Force (IETF) as ossified and see the difficulty in standardizing new protocols as an indication that there is...
Aaron Falk
CCR
2005
63views more  CCR 2005»
13 years 4 months ago
The internet measurement data catalog
Internet data remains one of the basic components of computer science network research. Despite its necessity, available data is limited by legal, social, and technical constraint...
Colleen Shannon, David Moore, Ken Keys, Marina Fom...
CCR
2004
94views more  CCR 2004»
13 years 4 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
CCR
2004
74views more  CCR 2004»
13 years 4 months ago
Unveiling the transport
Traditional application programming interfaces for transport protocols make a virtue of hiding most internal per-connection state. We argue that this informationhiding precludes m...
Jeffrey C. Mogul, Lawrence S. Brakmo, David E. Low...