Sciweavers

22 search results - page 2 / 5
» Tracing E-mail Headers
Sort
View
EUROSEC
2009
ACM
14 years 3 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
ICDCSW
2006
IEEE
14 years 2 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
ICNP
1999
IEEE
14 years 25 days ago
A Behavioral Model of Web Traffic
The growing importance of Web traffic on the Internet makes it important that we have accurate traffic models in order to plan and provision. In this paper we present a Web traffi...
Hyoung-Kee Choi, John O. Limb
CMG
2004
13 years 10 months ago
Generating Realistic TCP Workloads
The workload of a network is usually a heterogeneous aggregate of services and applications, driven by a large number of users. This complexity makes it challenging to evaluate th...
Félix Hernández-Campos, F. Donelson ...
IMC
2005
ACM
14 years 2 months ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...