Sciweavers

54 search results - page 5 / 11
» On Inferring Application Protocol Behaviors in Encrypted Net...
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
INFOCOM
1997
IEEE
13 years 11 months ago
An Empirical Model of HTTP Network Traffic
The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies ...
Bruce A. Mah
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
13 years 11 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
ISCC
2002
IEEE
14 years 16 days ago
The interrelation of TCP responsiveness and smoothness in heterogeneous networks
TCP(α,β) protocols trade the congestion window increase value α for the decrease ratio β , to generate smoother traffic patterns and to maintain a friendly behavior. In this p...
Chi Zhang, Vassilios Tsaoussidis
IMC
2010
ACM
13 years 5 months ago
Flowroute: inferring forwarding table updates using passive flow-level measurements
The reconvergence of routing protocols in response to changes in network topology can impact application performance. While improvements in protocol specification and implementati...
Amogh Dhamdhere, Lee Breslau, Nick G. Duffield, Ch...