Sciweavers

78 search results - page 6 / 16
» Packet doppler: network monitoring using packet shift detect...
Sort
View
IJNSEC
2010
112views more  IJNSEC 2010»
14 years 4 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 3 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
ACSC
2003
IEEE
15 years 2 months ago
Policies for Sharing Distributed Probabilistic Beliefs
In this paper, we present several general policies for deciding when to share probabilistic beliefs between agents for distributed monitoring. In order to evaluate these policies,...
Christopher Leckie, Kotagiri Ramamohanarao
ICN
2007
Springer
15 years 3 months ago
ABW - Short-Timescale Passive Bandwidth Monitoring
ct Bandwidth usage monitoring is important for network troubleshooting and planning. Traditionally, used bandwidth is computed from router interface byte counters read by SNMP. Thi...
Sven Ubik, Demetres Antoniades, Arne Øsleb&...
CONEXT
2009
ACM
14 years 10 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...