Sciweavers

642 search results - page 27 / 129
» Detecting Spoofed Packets
Sort
View
LISA
2008
15 years 4 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 8 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda
INFOCOM
2005
IEEE
15 years 7 months ago
RID: radio interference detection in wireless sensor networks
— In wireless sensor networks, many protocols assume that if node A is able to interfere with node B’s packet reception, then node B is within node A’s communication range. I...
Gang Zhou, Tian He, John A. Stankovic, Tarek F. Ab...
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 3 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 8 months ago
Analysis of Payload Based Application level Network Anomaly Detection
Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
Like Zhang, Gregory B. White