Sciweavers

109 search results - page 2 / 22
» Towards Peer-to-Peer Traffic Analysis Using Flows
Sort
View
CP
2006
Springer
13 years 10 months ago
Constraint Based Resilience Analysis
Abstract. In this paper we give an overview of applications of Constraint Programming for IP (Internet Protocol) data networks, and discuss the problem of Resilience Analysis in mo...
Helmut Simonis
LISA
2004
13 years 7 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
ICDCSW
2006
IEEE
14 years 12 days ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
IFIP
2009
Springer
13 years 4 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
FPL
2010
Springer
108views Hardware» more  FPL 2010»
13 years 4 months ago
FPGA Based Network Traffic Analysis Using Traffic Dispersion Patterns
The problem of Network Traffic Classification (NTC) has attracted significant amount of interest in the research community, offering a wide range of solutions at various levels. Th...
Faisal Khan, Maya Gokhale, Chen-Nee Chuah