Sciweavers

272 search results - page 21 / 55
» A flow based approach for SSH traffic detection
Sort
View
CCR
2004
157views more  CCR 2004»
13 years 7 months ago
Designing BGP-based outbound traffic engineering techniques for stub ASes
Today, most multi-connected autonomous systems (AS) need to control the flow of their interdomain traffic for both performance and economical reasons. This is usually done by manu...
Steve Uhlig, Olivier Bonaventure
ATAL
2008
Springer
13 years 9 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
DKE
2010
112views more  DKE 2010»
13 years 7 months ago
An integer programming based approach for verification and diagnosis of workflows
Workflow analysis is indispensable to capture modeling errors in workflow designs. While several workflow analysis approaches have been defined previously, these approaches do not...
Rik Eshuis, Akhil Kumar
CONEXT
2010
ACM
13 years 5 months ago
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
14 years 9 months ago
ViEWNet: Visual Exploration of Region-Wide Traffic Networks
Location-based services and data mining algorithms analyzing objects moving on a complex traffic network are becoming increasingly important. In this paper, we introduce a new app...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...