Sciweavers

642 search results - page 78 / 129
» Detecting Spoofed Packets
Sort
View
124
Voted
INFOCOM
2006
IEEE
15 years 11 months ago
Design and Evaluation of a Fast and Robust Worm Detection Algorithm
— Fast spreading worms are a reality, as amply demonstrated by worms such as Slammer, which reached its peak propagation in a matter of minutes. With these kinds of fast spreadin...
Tian Bu, Aiyou Chen, Scott A. Vander Wiel, Thomas ...
JSAC
2008
94views more  JSAC 2008»
15 years 4 months ago
Detection, Synchronization, and Doppler Scale Estimation with Multicarrier Waveforms in Underwater Acoustic Communication
In this paper, we propose a novel method for detection, synchronization and Doppler scale estimation for underwater acoustic communication using orthogonal frequency division multi...
Sean F. Mason, Christian R. Berger, Shengli Zhou, ...
IPPS
2010
IEEE
15 years 2 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
JAIR
2010
181views more  JAIR 2010»
14 years 11 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
15 years 11 months ago
Discontinuity-induced bifurcations in TCP/RED communication algorithms
— In this paper, we describe a simple second-order discrete-time model for the Transmission Control Protocol (TCP) with Random Early Detection (RED) algorithm. The TCP/RED mechan...
Mingjian Liu, A. Marciello, Mario di Bernardo, Lji...