Abnormally Malicious Autonomous Systems and Their Internet Connectivity
نویسندگان
چکیده
منابع مشابه
Autonomous Malicious Activity Inspector - AMAI
Computer networks today are far more complex and managing such networks is not more then a job of an expert. Monitoring systems helps network administrator in monitoring and protecting the network by not allowing the users to run illegal application or changing the configuration of the network node. In this paper, we have proposed Autonomous Malicious Activity Inspector – AMAI which uses ontolo...
متن کاملConnectivity Measures for Internet Topologies on the Level of Autonomous Systems
Classical measures of network connectivity are the number of disjoint paths between a pair of nodes, and the size of a minimum cut. For standard graphs, these measures can be computed efficiently using network flow techniques. However, in the Internet on the level of Autonomous Systems (ASs), referred to as AS-level Internet, routing policies impose restrictions on the paths that traffic can ta...
متن کاملOvercomming Malicious Read/Write Requests in Internet File Systems
Hashing of data blocks is a common approach in peer-to-peer and Internet based distributed file systems as a way to simulate a virtual hard disk over a set of servers. One problem with such an approach is a situation where many clients’ requests are temporarily mapped (by the hashing) to the same server making it overloaded. We consider the case where a amalicious dversary attempts to overload ...
متن کاملAutonomous Decentralised Systems and their Applications
A distributed system is a system with multiple autonomous computers managed by a coherent operating system. The main purpose is to increase the performance/cost ratio of the system. The multiple computers are transparent to users. A user uses a distributed system like a simplex computer. It is up to the operating system to select the best computer, find and transport all the input files to that...
متن کاملMalicious Internet Use and Homeland Security
The advantages of speed, security and connectivity, which Information Technology brings to businesses and government, are increasingly empowering international terrorist groups. Tools previously only available to national security agencies are increasingly at the disposal of terrorist cells and rogue nations. Powerful encryption methods are now widely available. Anonymizers, which remove the co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/ACM Transactions on Networking
سال: 2012
ISSN: 1063-6692,1558-2566
DOI: 10.1109/tnet.2011.2157699