Streams, Security and Scalability

نویسندگان

  • Theodore Johnson
  • S. Muthukrishnan
  • Oliver Spatscheck
  • Divesh Srivastava
چکیده

Network-based attacks, such as DDoS attacks and worms, are threatening the continued utility of the Internet. As the variety and the sophistication of attacks grow, early detection of potential attacks will become crucial in mitigating their impact. We argue that the Gigascope data stream management system has both the functionality and the performance to serve as the foundation for the next generation of network intrusion detection systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption

Partial encryption is often used as a tradeoff between security and performance to protect scalable video data. In this paper, we argue that although partial encryption is strong enough for access control, it is not adequate for content confidentiality protection. We conduct experiments to show that partially encrypted H.264/SVC (scalable video coding) streams leak significant content informati...

متن کامل

WHIM: watermarking multicast video with a hierarchy of intermediaries

|Fingerprinting, watermarking content to identify the recipient, provides a good deterrence to unauthorized duplication and propagation of multimedia streams. This is straightforward in a unicast environment; however, in a multicast environment, inserting a ngerprint at the source does not provide any security since many receivers will share a common ngerprint. A simple solution would be to nge...

متن کامل

Large Scale distributed watermarking of multicast media through encryption

In this paper we describe a scheme in which each receiver of a multicast session receives a stream with a different, unique watermark, while still retaining the scalability of multicast. The watermarked streams can be used to trace those users who make unauthorized copies of a stream. The watermarking is enabled by encryption of two slightly different copies of the original stream with a large ...

متن کامل

Stream on the Sky: Outsourcing Access Control Enforcement for Stream Data to the Cloud

There is an increasing trend for businesses to migrate their systems towards the cloud. Security concerns that arise when outsourcing data and computation to the cloud include data confidentiality and privacy. Given that a tremendous amount of data is being generated everyday from plethora of devices equipped with sensing capabilities, we focus on the problem of access controls over live stream...

متن کامل

Data Allocation and Spatio-Temporal Implications for Video-On-Demand Systems

As the number of video streams to be supported by a Digital Video Delivery System (DVDS) increases, we more and more start to understand that the ability to reliably and cost-eeciently support a considerable number of video streams (in the magnitude of tens of thousands) largely depends on software capabilities. Even in the presence of the best hardware connguration (not ignoring software vs ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005