A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
2009
2009 Annual Computer Security Applications Conference
We present an efficient and robust stepping-stone detection scheme based on succinct packet-timing sketches of network flows. ...
These sketches are then used to identify pairs of network flows with similar packet-timing characteristics, which indicates potential stepping-stones. ...
INTRODUCTION We consider the real-time network-based stepping-stone detection problem. ...
doi:10.1109/acsac.2009.51
dblp:conf/acsac/CoskunM09
fatcat:mizoclnfvbhrbkat6x6qjuwdli
DDOS Attack Detection on Wireless Sensor Network using DSR Algorithm with Cryptography
2017
International Journal of Computer Applications
Since DDoS attacks will greatly degrade the performance of the network and square measure troublesome to find, they need become one amongst the foremost serious security challenges to this intrusion detection ...
Base station (BS) Apply HEED for maintaining the energy and RTBDG for data transmission ...
be utilized in online detection, thanks to time and area complexities. ...
doi:10.5120/ijca2017915481
fatcat:k46o57kfmrfcnmrrnc32ps5mva
Design of System for Monitoring Seepage of Levee Engineering Based on Distributed Optical Fiber Sensing Technology
2013
International Journal of Distributed Sensor Networks
Leakage may be undetected by conventional monitoring methods and techniques, but optical fiber distributed temperature sensor (DTS) temperature measuring system can achieve real-time temperature monitoring ...
in internal soil of levees. ...
, real-time, online, and whole section monitoring of levee temperature field and strain field. ...
doi:10.1155/2013/358784
fatcat:otw5bsuqzfcpzko3ry4b2l5phi
Tracking encrypted VoIP calls via robust hashing of network flows
2010
2010 IEEE International Conference on Acoustics, Speech and Signal Processing
These robust hashes are then used to detect pairs of parties communicating with each other. ...
The basic intuition behind the proposed hash function is twofolds: i)The variable bitrate codec employed in most VoIP applications result in a distinctive bitrate variations over time for each VoIP flow ...
Similar to robust hashing, in [5] , Coskun and Memon propose a flow sketch to identify packet-timing characteristics of network flows for real time stepping-stone detection. ...
doi:10.1109/icassp.2010.5495398
dblp:conf/icassp/CoskunM10
fatcat:dgezpm3yhfc27d2l2dypnvdwby
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads
[article]
2020
arXiv
pre-print
Our key insight is to leverage retargeted ads as a tool for identifying information flows. ...
In this study, we develop a methodology that is able to detect client- and server-side flows of information between arbitrary ad exchanges. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. ...
arXiv:1811.00920v2
fatcat:vxphbqdyujcwjfmgld3pg22bwm
High-level modelling of critical infrastructures' interdependencies
2009
International Journal of Critical Infrastructures
His research interests include understanding and proposing solutions for the security of critical infrastructures. ...
In this article, we study the potential effect of interdependencies that may occur between two of these infrastructures: the telecommunication networks and the electrical network. ...
of the electrical flow is detected. ...
doi:10.1504/ijcis.2009.022852
fatcat:dk57plz7z5ayfamxq4x5fijctu
A Survey on Deep Reinforcement Learning Network for Traffic Light Cycle Control
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
A Traffic signal control is a challenging problem and to minimize the travel time of vehicles by coordinating their movements at the road intersections. ...
of intelligent transportation. ...
For the former, recent advances in sensor and networking technology enables taking real-time traffic information as input, such as the number of vehicles, the locations of vehicles, and their waiting time ...
doi:10.32628/cseit206458
fatcat:iyp2r73tqjdq5pqpvxv77mrdra
The Practice of Agent-Based Model Visualization
2014
Artificial Life
Visualizations used here ought to be rapidly produced sketches, their development matching the flow of ideas. ...
A pencil sketch is great and can easily set the course for years of future work! ...
and material flow visualized in the form of networks. ...
doi:10.1162/artl_a_00129
pmid:24494616
fatcat:t437ls7oyjf5tp4zbcklkk6afi
On Scalable Attack Detection in the Network
2007
IEEE/ACM Transactions on Networking
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. ...
Unfortunately, all the IDS systems we know of keep per-connection or per-flow state. ...
We would like to thank Colleen Shannon, David Moore, Andre Broido for their immense help with the OC-48 traces. We would also like to thank the anonymous reviewers for their comments. ...
doi:10.1109/tnet.2006.890115
fatcat:ebx7l7itzrhk5e6hs7ssfurspi
On scalable attack detection in the network
2004
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. ...
Unfortunately, all the IDS systems we know of keep per-connection or per-flow state. ...
We would like to thank Colleen Shannon, David Moore, Andre Broido for their immense help with the OC-48 traces. We would also like to thank the anonymous reviewers for their comments. ...
doi:10.1145/1028788.1028812
dblp:conf/imc/KompellaSV04
fatcat:j5c3rnnlnra5por3sk4324zqtm
The Embedding Capacity of Information Flows Under Renewal Traffic
2013
IEEE Transactions on Information Theory
We evaluate our solution on real network traces, which shows a noticeable match for tight delay constraints. ...
., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no traffic analysis can detect it ...
the fact of relaying, which is often an indicator of network attacks (such as stepping-stone attacks [5] , [6] ). ...
doi:10.1109/tit.2012.2227672
fatcat:s6yfji4t6fe4rdlpe5djp7ao5q
MANAGEMENT AND SEGREGATION OF GARBAGE BINS AUTOMATION
2022
Zenodo
Waste Management involves planning, financing, construction and operation of facilities for the collection, transportation, recycling and final disposition of the waste. ...
Every five years the waste generated is rising by 1 million tons, In case it is not disposed within a stipulated time, it tends to create serious health hazards and reflects negatively on the infrastructure ...
The time overhead is sometimes measured as the percentage of CPU time needed for memory management. For real-time systems this measure alone is not an adequate measure of the overhead. ...
doi:10.5281/zenodo.6400667
fatcat:mgr66objcbaqxf2juyujqbw3k4
SoK: Making Sense of Censorship Resistance Systems
2016
Proceedings on Privacy Enhancing Technologies
We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client ...
To this end, we first sketch a comprehensive attack model to set out the censor's capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor's decision ...
and flow timing. ...
doi:10.1515/popets-2016-0028
dblp:journals/popets/KhattakESSMG16
fatcat:qy2wv24bqbgnbgqao7whndrihq
Evaluating Collaboration Effectiveness of Patient-to-Doctor Interaction in a Healthcare Territorial Network
[chapter]
2012
IFIP Advances in Information and Communication Technology
The emerging crucial point of healthcare organizations is to involve patients in autonomous monitoring their own health status by using personal ICT-based systems to manage data, and to ask for an effective ...
doctor in case of a critical or suspicious health situation. ...
real-time feedback to the user and medical personnel. ...
doi:10.1007/978-3-642-32775-9_13
fatcat:owululwosvgqtdq6pzyk4t7n5y
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
2010
Requirements Engineering
Analogous to STRIDE, an information flow oriented model of the system is leveraged to guide the analysis and to provide broad coverage. ...
Therefore, the selection of sound privacy countermeasures is simplified. ...
Detectability of data flow The threat tree of detectability of data flow, as depicted in Figure 15 suggests five preconditions for the threat to occur. ...
doi:10.1007/s00766-010-0115-7
fatcat:pecasx6ohbbphjgemhilttt5re
« Previous
Showing results 1 — 15 out of 4,516 results