Sciweavers

89 search results - page 4 / 18
» Selective and Early Threat Detection in Large Networked Syst...
Sort
View
LCN
2002
IEEE
14 years 3 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
14 years 24 days ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
DISCEX
2003
IEEE
14 years 4 months ago
Statistical Approaches to DDoS Attack Detection and Response
The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These me...
Laura Feinstein, Dan Schnackenberg, Ravindra Balup...
ACSAC
2008
IEEE
14 years 5 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
14 years 5 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan