Sciweavers

382 search results - page 70 / 77
» Performance evaluation of packet capturing systems for high-...
Sort
View
IMC
2004
ACM
14 years 2 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
WORM
2003
13 years 10 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
INFOCOM
2000
IEEE
14 years 29 days ago
Admission Control Based on End-to-End Measurements
— This paper proposes a controlled-load service that provides a network state with bounded and well known worst-case behavior. The service is primarily developed for real-time ap...
Viktória Elek, Gunnar Karlsson, Robert R&ou...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 6 days ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
POLICY
2007
Springer
14 years 2 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...