Sciweavers

642 search results - page 22 / 129
» Detecting Spoofed Packets
Sort
View
IADIS
2004
15 years 3 months ago
A note on the distribution of packet arrivals in high-speed data networks
A simple explanation is given of an anomaly often detected in traffic measurement when packet timings are truncated to nearest whole numbers. The correct observed discrete distrib...
Vic Grout, Stuart Cunningham, Denise Oram, Rich He...
89
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Surveillance Detection in High Bandwidth Environments
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...
111
Voted
MASCOTS
2007
15 years 3 months ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
113
Voted
WISEC
2010
ACM
15 years 9 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
ICNSC
2007
IEEE
15 years 8 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen