Sciweavers

282 search results - page 36 / 57
» Monitoring Network Traffic to Detect Stepping-Stone Intrusio...
Sort
View
PST
2004
13 years 10 months ago
A novel visualization technique for network anomaly detection
Visualized information is a technique that can encode large amounts of complex interrelated data, being at the same time easily quantified, manipulated, and processed by a human us...
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
ICDCSW
2005
IEEE
14 years 2 months ago
Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks
∗ In this paper, we propose a transport control performance improvement algorithm in heterogeneous networks. This paper discusses some novel algorithms to estimate the available...
Fang Qi, Weijia Jia, Jie Wu
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
13 years 3 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
14 years 2 months ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
MASCOTS
2007
13 years 10 months ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...