Sciweavers

741 search results - page 91 / 149
» Tools and techniques for Network Forensics
Sort
View
NSDI
2010
13 years 10 months ago
Reverse traceroute
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to help identify routing failures, poor performance, and router misconfigurations. Rese...
Ethan Katz-Bassett, Harsha V. Madhyastha, Vijay Ku...
IWCMC
2010
ACM
14 years 2 months ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
ACSAC
2004
IEEE
14 years 19 days ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
CHI
2007
ACM
14 years 9 months ago
The life and death of online gaming communities: a look at guilds in world of warcraft
Massively multiplayer online games (MMOGs) can be fascinating laboratories to observe group dynamics online. In particular, players must form persistent associations or "guil...
Nicolas Ducheneaut, Nicholas Yee, Eric Nickell, Ro...
DSN
2009
IEEE
14 years 3 months ago
LFI: A practical and general library-level fault injector
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
Paul Dan Marinescu, George Candea