Sciweavers

1244 search results - page 150 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ISPASS
2009
IEEE
15 years 11 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
P2P
2010
IEEE
202views Communications» more  P2P 2010»
15 years 3 months ago
Optimizing Near Duplicate Detection for P2P Networks
—In this paper, we propose a probabilistic algorithm for detecting near duplicate text, audio, and video resources efficiently and effectively in large-scale P2P systems. To thi...
Odysseas Papapetrou, Sukriti Ramesh, Stefan Siersd...
DSN
2005
IEEE
15 years 10 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
ESORICS
2012
Springer
13 years 7 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...