Sciweavers

62 search results - page 3 / 13
» A Case for Exploiting Self-Similarity of Network Traffic in ...
Sort
View
KIVS
2001
Springer
14 years 29 days ago
Improving the Performance of TCP on Guaranteed Bandwidth Connections
This paper discusses the performance of the Transmission Control Protocol under two aspects: First, the future Internet will provide some kind of service differentiation and bandw...
Hartmut Ritter, Klaus Wehrle, Lars C. Wolf
ISCC
2002
IEEE
14 years 1 months ago
The interrelation of TCP responsiveness and smoothness in heterogeneous networks
TCP(α,β) protocols trade the congestion window increase value α for the decrease ratio β , to generate smoother traffic patterns and to maintain a friendly behavior. In this p...
Chi Zhang, Vassilios Tsaoussidis
APNOMS
2006
Springer
14 years 8 days ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
CN
2006
84views more  CN 2006»
13 years 8 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
CCR
2011
13 years 3 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer