[HTML][HTML] Detection of Hacker Intention Using Deep Packet Inspection

J Foreman, WL Waters, CA Kamhoua… - … of Cybersecurity and …, 2024 - mdpi.com
Ideally, in a real cyberattack, the early detection of probable hacker intent can lead to
improved mitigation or prevention of exploitation. With the knowledge of basic principles of …

[PDF][PDF] Improving network performance: an evaluation of TCP/UDP on networks

S Narayan - 2014 - Citeseer
Computer networks are complex-they are a heterogeneous environment in which numerous
services, such as electronic mail, web browsing, voice and multimedia data, traverse the …

Modeling Upper Layer Reaction to QoS Degradation as a Congestion Avoidance Mechanism

S Harada, K Ishibashi, R Kawahara - IEICE Transactions on …, 2020 - search.ieice.org
On the Internet, end hosts and network nodes interdependently work to smoothly transfer
traffic. Observed traffic dynamics are the result of those interactions among those entities. To …

Packet analysis in congested networks

M Fukushima, S Goto - Progress in Discovery Science: Final Report of the …, 2002 - Springer
This paper proposes new methods of measuring the Internet traffic. These are useful to
analysing the network status, especially when the traffic is heavy, ie the network is …

PDUs Header-Based Online User Behavior Detection Algorithm

D Valarezo, D Avila-Pesantez - International Conference on Applied …, 2020 - Springer
The goal of this research is to present a detection algorithm for data interception between a
Legitimate Access Point (LAP) and wireless devices employing passive eavesdropping …

Behavioural Detection for Internet Scanning Worm Attack.

MM Rasheed - Computer Science & Telecommunications, 2015 - search.ebscohost.com
This research introduces the analysis of the request and reply message for infected and
victim machine. The problem of the research is cannot focus on specific scanning worm …

A method of IP traffic management using the relationship between TCP flow behavior and link utilization

R Kawahara, K Ishibashi, T Asaka… - IEICE transactions on …, 2003 - search.ieice.org
We propose a method of IP traffic management where the TCP performance at a bottleneck
link is estimated from monitored data about the behavior of the number of active flows versus …

On Added Value of Layer 4 ControlInformation for QoE Estimations

SK Srinivas - 2018 - diva-portal.org
Background: In the recent years, the focus of research has shifted to Quality of Experience
(QoE) to maintain the user satisfaction levels and fulfill their expectations of the …

Behavioural Detection for Internet Scanning Worm Attack

MR Mohammad - Computer Sciences and Telecommunications, 2015 - elibrary.ru
This research introduces the analysis of the request and reply message for infected and
victim machine. The problem of the research is cannot focus on specific scanning worm …

A traffic measurement system using time synchronization mechanism

T Fujiura, S Naito, S Ono - … of the 1999 ICPP Workshops on …, 1999 - ieeexplore.ieee.org
This paper presents a time synchronization mechanism and its application to a multipoint
traffic measurement system. The time synchronization system uses the time delivered from …