Sciweavers

60 search results - page 5 / 12
» Internet traffic behavior profiling for network security mon...
Sort
View
CCR
2006
76views more  CCR 2006»
13 years 7 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
CCR
2006
76views more  CCR 2006»
13 years 7 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
GRIDNETS
2008
13 years 8 months ago
The Measurement and Modeling of a P2P Streaming Video Service
Most of the work on grid technology in the video area has been generally restricted to aspects of resource scheduling and replica management. The traffic of such a service has a lo...
Peng Gao, Tao Liu, Yanming Chen, Xingyao Wu, Yehia...
WORM
2004
13 years 9 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
CCS
2008
ACM
13 years 9 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan