Sciweavers

751 search results - page 35 / 151
» Internet inter-domain traffic
Sort
View
ACSAC
2006
IEEE
13 years 11 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
WISE
2000
Springer
13 years 12 months ago
A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks
A closed form of autocorrelation functions about asymptotically self-similar processes is presented. The verification shows that this form best the realtrajfic data on Ethernet in...
Ming Li, Weijia Jia, Wei Zhao
CCR
2004
110views more  CCR 2004»
13 years 7 months ago
Analysis of long duration traces
This paper introduces a new set of long duration captures of Internet traffic headers. The capture is being performed on a continuous on-going basis and is approaching a year in d...
Richard Nelson, Daniel Lawson, Perry Lorier
IDEAL
2004
Springer
14 years 29 days ago
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL...
Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi...
TON
2008
88views more  TON 2008»
13 years 7 months ago
Traffic modeling and proportional partial caching for peer-to-peer systems
Peer-to-peer (P2P) file sharing systems generate a major portion of the Internet traffic, and this portion is expected to increase in the future. We explore the potential of deploy...
Mohamed Hefeeda, Osama Saleh