نتایج جستجو برای: traffic phase detection

تعداد نتایج: 1223932  

2010
Irfan Ul Haq Sardar Ali Hassan Khan Syed Ali Khayam

Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today’s Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detection has not been investigated. In this paper, we collect and use a labeled dataset containing diverse network anomalies (portscans, TCP floods, UDP floods, at varying rates) and p2p traffic (encrypted and unencrypted with BitTorrent, ...

2011
Basant Agarwal

Intrusion detection systems (IDS) have a vital role in protecting computer networks and information systems. In this paper, we propose a method for identifying abnormal traffic behaviour based on entropy and support vector machine. Main challenge is to distinguish between normal traffic and attack traffic since there is no major difference between normal and attack traffic. Our objective is to ...

Journal: :international journal of architecture and urban development 0
hossein zabihi assistant professor, department of art and architecture, science and research branch, islamic azad university, tehran, iran mohammad reza daroudi, ph.d candidate, department of art and architecture, science and research branch, islamic azad university, tehran, iran nastaran peimani master of urban design, department of art and architecture, science and research branch, islamic azad university, tehran, iran

in recent decades, urban planning has tended to humanist urbanism. in this regard foot travels and bicycle use are the two strategies that urban planners and transportation engineers are using them as adequate alternatives for making cities more people friendly. using bicycle is known as a strategy that has a great role in decreasing traffic among developing countries in recent decades. these c...

2013
Pieter Burghouwt Marcel E. M. Spruit Henk J. Sips

The Command and Control communication of a botnet is evolving into sophisticated covert communication. Techniques as encryption, steganography, and recently the use of social network websites as a proxy, impede conventional detection of botnet communication. In this paper we propose detection of covert communication by passive hostexternal analysis of causal relationships between traffic flows ...

Journal: :Network Protocols & Algorithms 2010
Qinghua Wang

Wireless sensor network (WSN) has emerged as a promising technology thanks to the recent advances in electronics, networking, and information technologies. However, there is still a great deal of additional research required before it finally becomes a mature technology. This article concentrates on three factors which are holding back the development of WSNs. Firstly, there is a lack of traffi...

2006
Ahren Studer Chenxi Wang

Network attacks often employ scanning to locate vulnerable hosts and services. Unimpeded scanning can lead to the subversion of an entire vulnerable population in a matter of minutes. Fast and accurate detection of local scanners is key to contain a spreading epidemic in its early stage. Existing scan detection schemes can detect fast scanners whose behavior can be clearly delineated from that ...

Journal: :IEICE Transactions 2010
Yosuke Himura Kensuke Fukuda Patrice Abry Kenjiro Cho Hiroshi Esaki

In this paper, we discuss the validity of the multi-scale gamma model and characterize the differences in host-level application traffic with this model by using a real traffic trace collected on a 150-Mbps transpacific link. First, we investigate the dependency of the model (parameters α and β, and fitting accuracy ) on time scale Δ, then find suitable time scales for the model. Second, we ins...

2016
Zhou Yuan Miao Yao Feng

With the development of social economy and city urbanization, city road traffic network has developed rapidly, great convenience for people's travel, but also led to a sharp increase in traffic demand. The direct consequence is the rapid expansion of traffic flow, traffic-jam, the city has becoming increasingly serious, frequent traffic accidents. The worsening traffic environment has become a ...

2009
Celil Ozkurt Fatih Camci C. Ozkurt F. Camci

It is important to know the road traffic density real time especially in mega cities for signal control and effective traffic management. In recent years, video monitoring and surveillance systems have been widely used in traffic management. Hence, traffic density estimation and vehicle classification can be achieved using video monitoring systems. In most vehicle detection methods in the liter...

2010
Martin Treiber Arne Kesting Dirk Helbing

Despite the availability of large empirical data sets and the long history of traffic modeling, the theory of traffic congestion on freeways is still highly controversial. In this contribution, we compare Kerner’s three-phase traffic theory with the phase diagram approach for traffic models with a fundamental diagram. We discuss the inconsistent use of the term “traffic phase” and show that pat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید