Sciweavers

121 search results - page 15 / 25
» Detecting Disruptive Routers: A Distributed Network Monitori...
Sort
View
CCS
2009
ACM
14 years 2 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
DSOM
2006
Springer
13 years 11 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
JSAC
2006
95views more  JSAC 2006»
13 years 7 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
IMC
2007
ACM
13 years 9 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
ICCNMC
2005
Springer
14 years 1 months ago
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...