Sciweavers

1639 search results - page 253 / 328
» Degree-constrained network flows
Sort
View
IWNAS
2008
IEEE
15 years 7 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
ICNP
2007
IEEE
15 years 7 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
108
Voted
ICICS
2005
Springer
15 years 6 months ago
PCAV: Internet Attack Visualization on Parallel Coordinates
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
Hyunsang Choi, Heejo Lee
139
Voted
VIZSEC
2004
Springer
15 years 6 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee
LCN
2002
IEEE
15 years 5 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung