Sciweavers

288 search results - page 30 / 58
» Performance anomaly of 802.11b
Sort
View
APNOMS
2006
Springer
15 years 1 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
CCS
2008
ACM
14 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
JSAC
2006
95views more  JSAC 2006»
14 years 9 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
CEEMAS
2007
Springer
15 years 3 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
79
Voted
IPPS
2006
IEEE
15 years 3 months ago
Instability in parallel job scheduling simulation: the role of workload flurries
The performance of computer systems depends, among other things, on the workload. This motivates the use of real workloads (as recorded in activity logs) to drive simulations of n...
Dan Tsafrir, Dror G. Feitelson