نتایج جستجو برای: network traffic identification
تعداد نتایج: 1117736 فیلتر نتایج به سال:
Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic
In an Internet of Things (IoT) environment, a large volume potentially confidential data might be leaked from sensors installed everywhere. To ensure the authenticity such sensitive data, it is important to initially verify source and its identity. Practically, IoT device identification primary step toward secure system. An appropriate approach can counteract malicious activities as sending fal...
This paper reviews one nonlinear and two linear projection architectures, in the context of a comparative study, which are used as either alternative or complementary tools in the identification and analysis of anomalous situations by Intrusion Detection Systems (IDSs). Three neural projection models are empirically compared, using real traffic data sets in an IDS framework. The specific multiv...
By penetrating into a large number of machines and stealthily installing malicious pieces of code, a distributed denial of service (DDoS) attack constructs a hierarchical network and uses it to launch coordinated assaults. DDoS attacks often exhaust the network bandwidth, processing capacity and information resources of victims, thus, leading to unavailability of computing systems services. Var...
The proposed RFID traffic control avoids problems that usually arise with standard traffic control systems, especially those related to image processing and beam interruption techniques. This RFID technique deals with a multivehicle, multilane, multi road junction area. It provides an efficient time management scheme, in which a dynamic time schedule is worked out in real time for the passage o...
The local mobility anchor in a Proxy Mobile IPv6 (PMIPv6) domain is able to provide access-networkand access-operator-specific handling or policing of the mobile node traffic using information about the access network to which the mobile node is attached. This specification defines a mechanism and a related mobility option for carrying the access network identifier and the access operator ident...
Today, with the increasing use of cars and intense traffic and pollution in cities, sustainable urban transport has become one of the main concerns of managers and urban planners. So identification the patterns of travel is one of requirements to achieve the sustainable transport management. One aspect of travel is the number of daily trips and identification of the factors affecting it. The ma...
we consider a grid network where nodes contain small buffers. a packet that faces a crowded buffer in its route will get extra latency and may be dropped. in this paper, we propose a novel flow control protocol called rfcc for grid networks. rfcc tries to reroute delayed packets and utilizes network coding to introduce a configurable amount of redundant information in the network, thereby incre...
The industrial Internet of Things (IoT) is aiming to interconnect humans, machines, materials, processes and services in a network. Wireless Sensor Network (WSN) comprises the less power consuming, light weight and effective Sensor Nodes (SNs) for higher network performance. Radio Frequency Identification (RFID) and sensor networks are both wireless technologies that provide limitless future po...
Can a network be protected from single-packet Warhol worms [14]? This paper generates and simulates random network environments to answer that question. The research assumes a perfect detection algorithm and varies the time required to perform the identification. Perfect detection alone is not sufficient; it must also be swift in recognizing threats as some cases presented here show that perfec...
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید