Sciweavers

ESORICS
2006
Springer
14 years 4 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
APNOMS
2006
Springer
14 years 4 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
AICCSA
2005
IEEE
104views Hardware» more  AICCSA 2005»
14 years 6 months ago
Multicast address management in the Internet: a study of the port blocking problem
A critical issue in multicast communication is how to identify multicast groups. In the Internet, multicast addresses and port numbers distinguish multicast groups from each other...
Emad Eldin Mohamed, Hussein M. Abdel-Wahab, I. Sal...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
14 years 6 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...