نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

Journal: :Sensors 2021

In an Internet of Things (IoT) environment, a large volume potentially confidential data might be leaked from sensors installed everywhere. To ensure the authenticity such sensitive data, it is important to initially verify source and its identity. Practically, IoT device identification primary step toward secure system. An appropriate approach can counteract malicious activities as sending fal...

2007
Álvaro Herrero Emilio Corchado Paolo Gastaldo Rodolfo Zunino

This paper reviews one nonlinear and two linear projection architectures, in the context of a comparative study, which are used as either alternative or complementary tools in the identification and analysis of anomalous situations by Intrusion Detection Systems (IDSs). Three neural projection models are empirically compared, using real traffic data sets in an IDS framework. The specific multiv...

Journal: :Comput. J. 2007
Zhongqiang Chen Zhongrong Chen Alex Delis

By penetrating into a large number of machines and stealthily installing malicious pieces of code, a distributed denial of service (DDoS) attack constructs a hierarchical network and uses it to launch coordinated assaults. DDoS attacks often exhaust the network bandwidth, processing capacity and information resources of victims, thus, leading to unavailability of computing systems services. Var...

2013
Suresh Sharma

The proposed RFID traffic control avoids problems that usually arise with standard traffic control systems, especially those related to image processing and beam interruption techniques. This RFID technique deals with a multivehicle, multilane, multi road junction area. It provides an efficient time management scheme, in which a dynamic time schedule is worked out in real time for the passage o...

Journal: :RFC 2012
Sri Gundavelli Jouni Korhonen Mark Grayson Kent Leung Rajesh Pazhyannur

The local mobility anchor in a Proxy Mobile IPv6 (PMIPv6) domain is able to provide access-networkand access-operator-specific handling or policing of the mobile node traffic using information about the access network to which the mobile node is attached. This specification defines a mechanism and a related mobility option for carrying the access network identifier and the access operator ident...

دی جست, مارتین, رهنمایی, محمدتقی, سالاروندیان, فاطمه, فرهودی, رحمت اله, پوراحمد, احمد,

Today, with the increasing use of cars and intense traffic and pollution in cities, sustainable urban transport has become one of the main concerns of managers and urban planners. So identification the patterns of travel is one of requirements to achieve the sustainable transport management. One aspect of travel is the number of daily trips and identification of the factors affecting it. The ma...

Journal: :journal of advances in computer research 0

we consider a grid network where nodes contain small buffers. a packet that faces a crowded buffer in its route will get extra latency and may be dropped. in this paper, we propose a novel flow control protocol called rfcc for grid networks. rfcc tries to reroute delayed packets and utilizes network coding to introduce a configurable amount of redundant information in the network, thereby incre...

Hooman Kashaniana Negar Chitgar,

The industrial Internet of Things (IoT) is aiming to interconnect humans, machines, materials, processes and services in a network. Wireless Sensor Network (WSN) comprises the less power consuming, light weight and effective Sensor Nodes (SNs) for higher network performance. Radio Frequency Identification (RFID) and sensor networks are both wireless technologies that provide limitless future po...

2005
Larry G. Irwin Richard J. Enbody

Can a network be protected from single-packet Warhol worms [14]? This paper generates and simulates random network environments to answer that question. The research assumes a perfect detection algorithm and varies the time required to perform the identification. Perfect detection alone is not sufficient; it must also be swift in recognizing threats as some cases presented here show that perfec...

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید