Monitoring, anomaly detection and forensics are essential tasks that must be carried out routinely for every computer network. The sheer volume of data generated by conventional …
Intentional attack incurs fatal threats on modern networks by paralyzing a small fraction of nodes with highest degrees to disrupt the network. To enhance the network robustness, in …
EG Bakhoum - EURASIP Journal on Information Security, 2011 - Springer
Recent experimental work by Androulidakis and Papavassiliou (IET Commun 2 (3): 399, 2008; IEEE Netw 23 (1): 6, 2009) has shown that it is possible to maintain a high level of …
D Saucez - FP7 ECODE Deliverable D, 2011 - academia.edu
This deliverable is part of WP2 (Cognitive network & system architecture and design), which is a research and technological development activity. The overall objective of this work …
Sampling has become an essential component of scalable Internet traffic monitoring and anomaly detection. This paper emphasizes on the analysis and evaluation of the impact of …