J Regan - US Patent 7,486,674, 2009 - Google Patents
Data mirroring in a service such as a virtual private LAN service is disclosed. Data packets, segments, frames, or other forms of encapsulation may be mirrored off of a core network (eg …
R Pries, F Wamser, D Staehle, K Heck… - 2009 Next Generation …, 2009 - ieeexplore.ieee.org
Internet traffic measurements and traffic characterization are essential for managing and optimizing network infrastructures. The increasing number of wireless Internet users and the …
M Cola, G De Lucia, D Mazza… - 2009 Proceedings of …, 2009 - ieeexplore.ieee.org
We propose a novel, passive, nonintrusive method to measure the one-way delay of all the packets flowing between customer sites connected by a provider backbone. Our approach …
T Zseby, H Pfeffer, S Steglich - Autonomic Computing and Networking, 2009 - Springer
Network protection should be a number one priority on every network operator's list. Even the best network is useless, if an intruder can gain control. Although the research community …
Abstract “Network management” in a large organization often involves—whether explicitly or implicitly—the responsibility for ensuring the availability and responsiveness of network …
T Zseby, T Hirsch, M Kleis… - Future Internet …, 2009 - books.google.com
The Internet today is a complex agglomerate of protocols that inherits the grown legacies of decades of patchwork solutions. Network management costs explode. Security problems are …
Cette thèse porte sur la mesure et la caractérisation du trafic dans le Réseau National Universitaire (RNU) avec des applications à la détection des anomalies. Pour ce faire, une …
P Kenyeres, T Mészáros, A Szentgyörgyi, G Fehér - math.bme.hu
Widespread usage of broadband Internet connections has allowed the birth of a new threat against service providers and subscribers as well. Botnets are vast networks of …
S Dai, X Li - 2009 5th International Conference on Wireless …, 2009 - ieeexplore.ieee.org
Traceback is the technique to trace packets back to the sources or the routers near the sources, which is essential while defending against IP spoofing and denial of service …