Inverting sampled traffic

N Hohn, D Veitch - Proceedings of the 3rd ACM SIGCOMM conference …, 2003 - dl.acm.org
Routers have the ability to output statistics about packets and flows of packets that traverse
them. Since however the generation of detailed traffic statistics does not scale well with link …

Error analysis of background adaption

X Gao, TE Boult, F Coetzee… - … IEEE Conference on …, 2000 - ieeexplore.ieee.org
Background modeling is a common component in video surveillance systems and is used to
quickly identify regions of interest. To increase the robustness of background subtraction …

Flow length and size distributions in campus Internet traffic

P Jurkiewicz, G Rzym, P Boryło - Computer Communications, 2021 - Elsevier
The efficiency of flow-based networking mechanisms strongly depends on traffic
characteristics and should thus be assessed using accurate flow models. For example, in …

Improving end-users utility in software-defined wide area network systems

KS Sahoo, P Mishra, M Tiwary… - … on Network and …, 2019 - ieeexplore.ieee.org
Software Defined Networks (SDNs) has brought a new form of network architecture that
simplifies network management through innovations and programmability. But, the …

Effective switch memory management in OpenFlow networks

A Vishnoi, R Poddar, V Mann… - Proceedings of the 8th …, 2014 - dl.acm.org
OpenFlow networks require installation of flow rules in a limited capacity switch memory
(Ternary Content Addressable Memory or TCAMs, in particular) from a logically centralized …

Monitoring very high speed links

G Iannaccone, C Diot, I Graham… - Proceedings of the 1st …, 2001 - dl.acm.org
Our goal is to build passive monitoring equipment for use at 10Gb/s (eg 10GE and OC-192)
and above. We already have in place an OC-48 passive monitoring system for capturing and …

System and method for flow table management

E Goldfarb, Y Altman, N Frid, G Yaari - US Patent 8,767,551, 2014 - Google Patents
Methods and systems for managing the actions that are applied to packet flows by packet
processing systems. A packet processing system maintains a flow table, ie, a list of active …

AHTM: Achieving efficient flow table utilization in software defined networks

L Zhang, R Lin, S Xu, S Wang - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
In Software Defined Networks (SDN), more packet fields are included to design fine-grained
policies. These policies are stored as entries in switch Flow Table. However, fine-grained …

Crowd crawling: Towards collaborative data collection for large-scale online social networks

C Ding, Y Chen, X Fu - Proceedings of the first ACM conference on …, 2013 - dl.acm.org
The emerging research for online social networks (OSNs) requires a huge amount of data.
However, OSN sites typically enforce restrictions for data crawling, such as request rate …

[PDF][PDF] 多特征关联的入侵事件冗余消除

龚俭, 梅海彬, 丁勇, 魏德昊 - 2005 - jslab6.edu.cn
通过对事件的源地址, 宿地址和宿端口3 个空间属性进行分析, 枚举出事件在空间属性上的所有
可能的关联特征; 通过对相邻事件的时间间隔进行统计分析, 提出了事件的时间关联特征可以用 …