Sciweavers

109 search results - page 20 / 22
» Predicting the resource consumption of network intrusion det...
Sort
View
TON
2010
161views more  TON 2010»
13 years 2 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...
IM
2003
13 years 9 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
ICON
2007
IEEE
14 years 1 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen
ICCCN
2007
IEEE
14 years 1 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms tha...
Theodor Richardson, Chin-Tser Huang
IPPS
2010
IEEE
13 years 5 months ago
Scalable multi-pipeline architecture for high performance multi-pattern string matching
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho...
Weirong Jiang, Yi-Hua Edward Yang, Viktor K. Prasa...