Sciweavers

6812 search results - page 36 / 1363
» Detection of Information Flows
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 4 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
ACMACE
2007
ACM
15 years 1 months ago
Gaze-based infotainment agents
We propose an infotainment presentation system that relies on eye gaze as an intuitive and unobtrusive input modality. The system analyzes eye movements in real-time to infer user...
Helmut Prendinger, Tobias Eichner, Elisabeth Andr&...
ACSAC
2007
IEEE
15 years 1 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
CN
2006
84views more  CN 2006»
14 years 9 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
APNOMS
2007
Springer
15 years 1 months ago
End-to-End Flow Monitoring with IPFIX
End-to-End (E2E) flow monitoring is useful for observing performance of networks such as throughput, loss rate, and jitter. Typically, E2E flow monitoring is carried out at end hos...
Byungjoon Lee, Hyeongu Son, Seunghyun Yoon, Youngs...