Sciweavers

COMCOM
2007
98views more  COMCOM 2007»
14 years 14 days ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry
ESORICS
2004
Springer
14 years 5 months ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
John McHugh
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
14 years 6 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown
ANCS
2006
ACM
14 years 6 months ago
A methodology for evaluating runtime support in network processors
Modern network processor systems require the ability to adapt their processing capabilities at runtime to changes in network traffic. Traditionally, network processor applications...
Xin Huang, Tilman Wolf
ACSAC
2008
IEEE
14 years 7 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
DAMON
2009
Springer
14 years 7 months ago
Spinning relations: high-speed networks for distributed join processing
By leveraging modern networking hardware (RDMA-enabled network cards), we can shift priorities in distributed database processing significantly. Complex and sophisticated mechani...
Philip Werner Frey, Romulo Goncalves, Martin L. Ke...