نتایج جستجو برای: network traffic identification
تعداد نتایج: 1117736 فیلتر نتایج به سال:
Outlier detection is of considerable interest in fields such as physical sciences, medical diagnosis, surveillance detection, fraud detection and network anomaly detection. The data mining and network management research communities are interested in improving existing score-based network traffic anomaly detection techniques because of ample scopes to increase performance. In this paper, we pre...
We consider a grid network where nodes contain small buffers. A packet that faces a crowded buffer in its route will get extra latency and may be dropped. In this paper, we propose a novel flow control protocol called RFCC for grid networks. RFCC tries to reroute delayed packets and utilizes network coding to introduce a configurable amount of redundant information in the network, thereby incre...
Traditional attacks against anonymous routing systems aim to uncover the identities of those involved, however, a more likely goal of attackers is to block or degrade the network itself, discouraging participation and forcing vulnerable users to communicate using less secure means. Since these anonymous networks operate on known protocols and employ strong encryption it is difficult to distingu...
Increased adoption of mobile devices introduces a new spin to Internet: mobile apps are becoming a key source of user traffic. Surprisingly, service providers and enterprises are largely unprepared for this change as they increasingly lose understanding of their traffic and fail to persistently identify individual apps. App traffic simply appears no different than any other HTTP data exchange. ...
Over the past few years, Peer-to-Peer traffic has been consuming a lot of Internet traffic bandwidth and is still rising which brings great difficulties to network management. Traditional classification techniques such as port based and payload based have significant limitations. Hence, newer statistical approaches are adopted for P2P identification. P2P traffic uses both TCP and UDP protocols ...
rapid urban growth is resulting into increase in travel demand and private vehicle ownership in urban areas. in the present scenario the existing infrastructure has failed to match the demand that leads to traffic congestion, vehicular pollution and accidents. with traffic congestion augmentation on the road, delay of commuters has increased and reliability of road network has decreased. four s...
This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification. Network traffic characterization with behavior modeling could be a good guidance of attack detection. Aggregated traffic has been found to be s...
We consider a grid network where nodes contain small buffers. A packet that faces a crowded buffer in its route will get extra latency and may be dropped. In this paper, we propose a novel flow control protocol called RFCC for grid networks. RFCC tries to reroute delayed packets and utilizes network coding to introduce a configurable amount of redundant information in the network, thereby incre...
One of the major reasons for accidents is speed. Top of Form Inappropriate speed has been identified as the most important causal factor for serious traffic accidents. Traffic calming measures (TCMs) are engineering measures that are widely implemented to improve road safety by considerably reducing vehicle speed. TCMs have been widely used in urban areas to reduce vehicle flow rat...
Normal 0 false false false EN-US X-NONE AR-SA MicrosoftInternetExplorer4 ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید