Sciweavers

54 search results - page 7 / 11
» Traffic Analysis Based Identification of Attacks
Sort
View
CN
2004
95views more  CN 2004»
14 years 9 months ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
ADHOC
2008
132views more  ADHOC 2008»
14 years 9 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
NETWORKING
2010
14 years 11 months ago
A Longitudinal Study of Small-Time Scaling Behavior of Internet Traffic
We carry out a longitudinal study of evolution of small-time scaling behavior of Internet traffic on the MAWI dataset spanning 8 years. MAWI dataset contains a number of anomalies ...
Himanshu Gupta, Vinay J. Ribeiro, Anirban Mahanti
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 3 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...