• No results found

dynamic traffic monitoring network

Hybrid Intrusion detection
network monitoring with honeypots

Hybrid Intrusion detection network monitoring with honeypots

... malicious traffic or be immune to evasion, even if a detector specializes in a specific type of malicious ...the dynamic nature allows detecting of unknown ...malicious traffic, but make many errors ...

82

MONITORING AND IDENTIFICATION OF DYNAMIC IN TRAFFIC FLOWS ANONYMOUS DETECTION VIA BOTNET

MONITORING AND IDENTIFICATION OF DYNAMIC IN TRAFFIC FLOWS ANONYMOUS DETECTION VIA BOTNET

... Since the testing procedure requires distributing intra session requests to different virtual servers, the overhead for maintaining consistent session state is incurred. Our motivation of utilizing virtual servers is to ...

10

Improved Technique for Simulation of Digital
Forensic Architecture Framework in Cloud

Improved Technique for Simulation of Digital Forensic Architecture Framework in Cloud

... the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion ...forensics, network investigations deal with volatile and ...

8

Network Management Control Based on Change of Self-Similarity and Fuzzy Logic in Network Traffic

Network Management Control Based on Change of Self-Similarity and Fuzzy Logic in Network Traffic

... a network are complex and difficult to ...of network devices, networks need continuous maintenance for optima l utilization with the help of monitoring and management ...tools. Network ...

8

Survey of the High Volume Network Traffic Data Monitoring

Survey of the High Volume Network Traffic Data Monitoring

... Abstract- Network Traffic monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator ...

5

An efficient algorithm for modelling and dynamic prediction of network traffic

An efficient algorithm for modelling and dynamic prediction of network traffic

... self-adaptive network traffic. The traffic prediction method based on PRF in this paper shown the discrete time node of the packet queuing system, used the length of queue at steady-state and ...

11

Taylor_unc_0153D_16421.pdf

Taylor_unc_0153D_16421.pdf

... DNS traffic has significant impact on the detection performance of network-based malfeasance detectors, and thus the ideas proposed in this dissertation will help security analysts be more efficient and ...

176

Doubly Dynamic Equilibrium Distribution Approximation Model for Dynamic Traffic Assignment

Doubly Dynamic Equilibrium Distribution Approximation Model for Dynamic Traffic Assignment

... the network side we shall consider the continuous-time dynamic network loading map as a relationship between a given vector of path flows (by departure interval and origin-destination movement) and ...

21

Dynamic timeslot allocation technique for wireless sensor network

Dynamic timeslot allocation technique for wireless sensor network

... Figure 1.2 summarizes phenomenon of funnelling effect in WSN and existing approach to address the issue. The funnelling is usually occurred in WSN that characterized by many-to-one uplink traffic that transmits ...

24

JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM

JAVA FRAMEWORK FOR SIGNATURE BASED NETWORK INTRUSION DETECTION SYSTEM

... outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a ...captures network data as well as ...

12

A network game of dynamic traffic

A network game of dynamic traffic

... the network manager acts as the leader picking a capacity for each edge within its given limit, and the agents act as followers, each of whom picks a ...directed network to reduce edge capacities such that ...

37

Universal Network for Intelligent Traffic Control System: Stolen vehicle detection, Emergency vehicle clearance, Fine Collection and Dynamic Traffic Light Control

Universal Network for Intelligent Traffic Control System: Stolen vehicle detection, Emergency vehicle clearance, Fine Collection and Dynamic Traffic Light Control

... The traffic challan is issued manually this has led to corruption in Traffic Department of ...the traffic signals are statistically controlled and have fixed red light timing for a particular ...

5

Intelligent Traffic Management System Based on Smart Internet of Vehicles

Intelligent Traffic Management System Based on Smart Internet of Vehicles

... In this paper IoT is an emerging research paradigm and apparently the discovery of its body of knowledge is still in an infancy stage. So, the exact definition, architecture, scope, and standard are still not concretely ...

7

REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK

REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK

... for monitoring the process of regulating the total amount of data entering the network to keep traffic levels at an acceptable ...controlling traffic entry into a network, so as to ...

6

Congestion Control for Wireless Sensor Network: A Study

Congestion Control for Wireless Sensor Network: A Study

... sensor network classifies as Congestion Mitigation, Congestion Avoidance, and Reliable Data ...as Traffic Control, Resource Control, and Hybrid Method. Traffic based congestion control protocol ...

8

Optimal RWA for SDM Optical Network under Dynamic Traffic

Optimal RWA for SDM Optical Network under Dynamic Traffic

... Internet traffic, progress has been made in using alternative media of communication such as optical ...The network in which the dominant physical layer of technology for transport in optical fiber is known ...

83

Computation of Shortest Path based on Traffic Analysis Dynamic Network

Computation of Shortest Path based on Traffic Analysis Dynamic Network

... Pushed by the nonappearance of off-the-rack answer for OSP, in this proposed structure we show another course of action familiarizing so as with consider the summary transmission model improvement archive (LTI) as within ...

8

An Approach to Dynamic Asymptotic Estimation for Hurst Index of Network Traffic

An Approach to Dynamic Asymptotic Estimation for Hurst Index of Network Traffic

... Superposition of a large number of independent ON/OFF sources can generate self-similar volume of business. In the ON period, the packets enter the network, in the OFF period, no packet generated. ON/OFF dura- ...

6

A Unified Monitoring Framework for Energy Consumption and Network Traffic

A Unified Monitoring Framework for Energy Consumption and Network Traffic

... Contrary to RRD, the HDF5 format does not implement any data rotation mechanism. A similar feature has been imple- mented inside Kwapi’s HDF5 plugin as ability to split and merge HDF5 files: every month (this period is ...

10

DOS Attack Reduction by using Web Service Filter

DOS Attack Reduction by using Web Service Filter

... If the number of incoming requests hitting at specified service port increases beyond set point, then Traffic Monitoring system will detect it as high traffic over the network and activa[r] ...

6

Show all 10000 documents...

Related subjects