Abnormally Malicious Autonomous Systems and Their Internet Connectivity

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Autonomous Malicious Activity Inspector - AMAI

Computer networks today are far more complex and managing such networks is not more then a job of an expert. Monitoring systems helps network administrator in monitoring and protecting the network by not allowing the users to run illegal application or changing the configuration of the network node. In this paper, we have proposed Autonomous Malicious Activity Inspector – AMAI which uses ontolo...

متن کامل

Connectivity Measures for Internet Topologies on the Level of Autonomous Systems

Classical measures of network connectivity are the number of disjoint paths between a pair of nodes, and the size of a minimum cut. For standard graphs, these measures can be computed efficiently using network flow techniques. However, in the Internet on the level of Autonomous Systems (ASs), referred to as AS-level Internet, routing policies impose restrictions on the paths that traffic can ta...

متن کامل

Overcomming Malicious Read/Write Requests in Internet File Systems

Hashing of data blocks is a common approach in peer-to-peer and Internet based distributed file systems as a way to simulate a virtual hard disk over a set of servers. One problem with such an approach is a situation where many clients’ requests are temporarily mapped (by the hashing) to the same server making it overloaded. We consider the case where a amalicious dversary attempts to overload ...

متن کامل

Autonomous Decentralised Systems and their Applications

A distributed system is a system with multiple autonomous computers managed by a coherent operating system. The main purpose is to increase the performance/cost ratio of the system. The multiple computers are transparent to users. A user uses a distributed system like a simplex computer. It is up to the operating system to select the best computer, find and transport all the input files to that...

متن کامل

Malicious Internet Use and Homeland Security

The advantages of speed, security and connectivity, which Information Technology brings to businesses and government, are increasingly empowering international terrorist groups. Tools previously only available to national security agencies are increasingly at the disposal of terrorist cells and rogue nations. Powerful encryption methods are now widely available. Anonymizers, which remove the co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE/ACM Transactions on Networking

سال: 2012

ISSN: 1063-6692,1558-2566

DOI: 10.1109/tnet.2011.2157699