Sciweavers

27 search results - page 4 / 6
» Anomaly detection in TCP IP networks using immune systems pa...
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
MICRO
2002
IEEE
156views Hardware» more  MICRO 2002»
13 years 6 months ago
TCP Switching: Exposing Circuits to IP
There has been much discussion about the best way to combine the benefits of new optical circuit switching technology with the established packet switched Internet. In this paper,...
Pablo Molinero-Fernández, Nick McKeown
IM
2007
13 years 7 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
SAC
2004
ACM
13 years 11 months ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
CN
2008
84views more  CN 2008»
13 years 6 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari