Sciweavers

2672 search results - page 405 / 535
» Testing Self-Similar Networks
Sort
View
141
Voted
RAID
2001
Springer
15 years 8 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
DSN
2000
IEEE
15 years 8 months ago
Whither Generic Recovery from Application Faults? A Fault Study using Open-Source Software
This paper tests the hypothesis that generic recovery techniques, such as process pairs, can survive most application faults without using application-specific information. We ex...
Subhachandra Chandra, Peter M. Chen
DSN
2000
IEEE
15 years 8 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
ICDCS
1999
IEEE
15 years 8 months ago
Fault Tolerant Video on Demand Services
This paper describes a highly available distributedvideo on demand (VoD) service which is inherently fault tolerant. The VoD service is provided by multiple servers that reside at...
Tal Anker, Danny Dolev, Idit Keidar
LCN
1999
IEEE
15 years 8 months ago
Time Series Models for Internet Data Traffic
A statistical analysis of Internet traffic measurements from a campus site is carried out to examine the influence of the constituent protocols and applications on the characteris...
Chun You, Kavitha Chandra