• No results found

computer network traffic monitoring

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... monitors network or system activities for malicious ...a monitoring system, this work proposes a mechanism for real-world traffic and statistically analyzes these ...

5

Hybrid Intrusion detection
network monitoring with honeypots

Hybrid Intrusion detection network monitoring with honeypots

... distribute traffic these attacks did not seem to suffer any negative effects and in all cases we observed near instant results as soon as the anomaly detector raised alerts for ...host computer to locate ...

82

Network Traffic Monitoring Analysis System with Built in Monitoring Data Gathering

Network Traffic Monitoring Analysis System with Built in Monitoring Data Gathering

... alternative network-based devices will have an effect on body ...of network-oriented, the importance of network traffic observation and analysis ...existing traffic observation and ...

6

Wireless Network for Road Traffic Monitoring With Vision System

Wireless Network for Road Traffic Monitoring With Vision System

... Road network of a country is one of the most important mean of overall ...speed. Traffic congestion and incident detection are the serious issues in Traffic engineering applications and Intelligent ...

6

Online Full Text

Online Full Text

... Invigilator monitoring system and will record all network packets to disk and conduct the analysis of the network traffic according to the rules that have been setup for the assessment as ...

6

Computer Network Simulation of Firewall and VoIP Performance Monitoring

Computer Network Simulation of Firewall and VoIP Performance Monitoring

... the network has a tremendous effect and impacts on many network parameters like throughput, data transfer, delay, packet transfer ...these network parameters showed increas- ing values and others ...

15

Survey of the High Volume Network Traffic Data Monitoring

Survey of the High Volume Network Traffic Data Monitoring

... Abstract- Network Traffic monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network ...

5

EFFICIENT ROUTING SOLUTIONS FOR AVOIDING NETWORK TRAFFIC USING FINE GRAINED TREAM BASED MEASUREMENT SCHEME

EFFICIENT ROUTING SOLUTIONS FOR AVOIDING NETWORK TRAFFIC USING FINE GRAINED TREAM BASED MEASUREMENT SCHEME

... for computer communications In that paper [1], Traffic monitoring, accounting, and network anomaly detection, it is often important to be able to detect high-volume traffic clusters in ...

10

Improved Technique for Simulation of Digital
Forensic Architecture Framework in Cloud

Improved Technique for Simulation of Digital Forensic Architecture Framework in Cloud

... the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion ...forensics, network investigations deal with volatile ...

8

Agent Base Network Traffic Monitoring

Agent Base Network Traffic Monitoring

... card-sized computer then announced every last piece of code running on the computer‟s ARM chip has been open ...the computer could already run several Linux-based operating systems, not all the ...

5

Anomaly Detection Using Context-Based Intrusion
          Detection System

Anomaly Detection Using Context-Based Intrusion Detection System

... computer network and protects it from unauthorized users, including sometimes insiders ...incoming traffic and notify ...input traffic given to this intrusion checker system consisted of many ...

6

Analysis of Traffic Patterns using Computer Vision and Wireless Sensor Network

Analysis of Traffic Patterns using Computer Vision and Wireless Sensor Network

... The government or the statutory bodies who are responsible for catering the transportation and mobility needs are one of the major stake holders as because of unorganized, timed lagged data- they end up over engineering ...

5

Intelligent Traffic Management System Based on Smart Internet of Vehicles

Intelligent Traffic Management System Based on Smart Internet of Vehicles

... The [6] article presents a kind of scheme of direct TPMS, introduces the principle of the system. The communication can greatly improved through carefully choosing the RF module. The transmission module has the low power ...

7

Analysation of Computer Network Models

Analysation of Computer Network Models

... AREA NETWORK (WAN): A wide area network(WAN) provides long_ distance transmission of data, image, audio and video information over large geographic areas that comprise a country, a continent or even the ...

5

State Probability Analysis of Internet Traffic Sharing in Computer Network

State Probability Analysis of Internet Traffic Sharing in Computer Network

... of Computer Science & Applications in the same University since ...of Computer Networking and Internet traffic ...of Computer Network and Internet Traffic Sharing ...

6

Automatic detection of computer network traffic anomalies based on eccentricity analysis

Automatic detection of computer network traffic anomalies based on eccentricity analysis

... It is often very difficult to get a data stream or set from a real computer network under attack for understandable reasons. Moreover, the amount of data is not balanced between the different cases: i) ...

8

Automatic Monitoring & Detection System (AMDS) for Grey Traffic

Automatic Monitoring & Detection System (AMDS) for Grey Traffic

... Grey Traffic also cause a security risk as, it cannot be monitored ...grey traffic. Generally, the grey traffic is initiated by small entities through VOIP routers setup in homes and offices ...

5

Relay Selection in Multihop Wireless Network

Relay Selection in Multihop Wireless Network

... sensor network offers a wide range of applications in areas such as traffic monitoring, medical care, inhospitable terrain, robotic exploration, and agriculture surveillance In this paper we will ...

6

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... limited network and computing resources available during its ...vulnerable computer and duplicate hit reaching a previously infected vulnerable ...control network for Realizing their behavior in ...

6

REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK

REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK

... for monitoring the process of regulating the total amount of data entering the network to keep traffic levels at an acceptable ...controlling traffic entry into a network, so as to ...

6

Show all 10000 documents...

Related subjects