Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
Abstract-- Creating high quality network trace files is a difficult task to accomplish on a limited budget. High network speeds may overburden an individual system running packet l...
Chad D. Mano, Jeff Smith, Bill Bordogna, Andrew Ma...
—In most existing sender-initiated handshaking based underwater Media Access Control (MAC) protocols, only the initiating sender is allowed to transmit data packets to its intend...
There is a growing interest in designing high-performance network devices to perform packet processing at flow level. Applications such as stateful access control, deep inspection...
Yaxuan Qi, Bo Xu, Fei He, Baohua Yang, Jianming Yu...
— In this paper we perform a detailed analysis of point-to-point packet delay in an operational tier-1 network. The point-to-point delay is the time between a packet entering a r...
Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konsta...