Sciweavers

40 search results - page 3 / 8
» Network Tomography-Based Unresponsive Flow Detection and Con...
Sort
View
ACSAC
2003
IEEE
13 years 11 months ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
LCN
2006
IEEE
14 years 8 days ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
WORM
2004
13 years 7 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
GLOBECOM
2007
IEEE
13 years 8 months ago
A Novel False Congestion Detection Scheme for TCP over OBS Networks
– This paper introduces a novel congestion control scheme for TCP over OBS networks, called Statistical Additive Increase Multiplicative Decrease (SAIMD), which aims to improve t...
Basem Shihada, Pin-Han Ho, Qiong Zhang
TON
2010
161views more  TON 2010»
13 years 29 days ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...