Filters








2,167 Hits in 16.4 sec

Inferring Packet Processing Behavior Using Input/Output Monitors

Danai Chasaki, Qiang Wu, Tilman Wolf
2011 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems  
Using information about the processing time distribution of individual modules, input/output traffic characteristics can be inferred and abnormal behavior can be detected.  ...  We propose a modular packet processor monitoring technique that can help in detecting and avoiding such attacks.  ...  We are able to verify each module separately and thus the system operation as a whole, by setting up and using a processing monitor and an input/output monitor (packet flow monitor) for every element.  ... 
doi:10.1109/ancs.2011.23 dblp:conf/ancs/ChasakiWW11 fatcat:kpeq6acdnrhznhfkws7cfwuyxq

Co-processor-based Behavior Monitoring

Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet
2017 Proceedings of the 33rd Annual Computer Security Applications Conference on - ACSAC 2017  
To detect such attacks, we propose an event-based behavior monitoring approach that relies on an isolated co-processor.  ...  We instrument the code executed on the main CPU to send information about its behavior to the monitor. This information helps to resolve the semantic gap issue.  ...  Thus, there is a semantic gap between the current behavior of the target and what the monitor, executed on the co-processor, can infer about this behavior [7, 43] .  ... 
doi:10.1145/3134600.3134622 dblp:conf/acsac/ChevalierVPH17 fatcat:jizvvr647rgmpfbvc7xp7x7rsu

Live Traffic Monitoring with Tstat: Capabilities and Experiences [chapter]

A. Finamore, M. Mellia, M. Meo, M. M. Munafò, D. Rossi
2010 Lecture Notes in Computer Science  
Started as a scalable tool to continuously monitor packets that flow on a link, Tstat has evolved into a complex application that gives to network researchers and operators the possibility to derive extended  ...  Today, monitoring traffic has become a key element to characterize network usage and users' activities, to understand how complex applications work, to identify anomalous or malicious behaviors, etc.  ...  The flexible input/output interface makes it worth using for researchers (with a great deal of information available for post-processing) but also simple to deploy and use as-is (with a nice browsable  ... 
doi:10.1007/978-3-642-13315-2_24 fatcat:3km763twtzg2hklhu4ysd5xpoi

A stealth monitoring mechanism for cyber-physical systems

Vitor Graveto, Luís Rosa, Tiago Cruz, Paulo Simões
2019 International Journal of Critical Infrastructure Protection  
observation of both physical inputs/outputs (i.e. the physical processes under control) and network communication flows -allowing the exploitation of various novel monitoring approaches able to address  ...  Such devices, which are deployed at the edge of the SCADA infrastructure, directly interface with the physical processes under control.  ...  635 inputs/outputs status, followed by a detection stage.  ... 
doi:10.1016/j.ijcip.2018.10.006 fatcat:qw27k7lgfrdsvc6g5la3qwsg4q

INRISCO: INcident monitoRing In Smart COmmunities

Monica Aguilar Igartua, Florina Almenares, Rebeca P. Diaz Redondo, Manuela I. Martin, Jordi Forne, Celeste Campo, Ana Fernandez, Luis J. De la Cruz, Carlos Garcia-Rubio, Andres Marin, Ahmad Mohamad Mezher, Daniel Diaz (+4 others)
2020 IEEE Access  
Regarding the detecting process, INRISCO uses citizens' activity in LBSNs in order to infer typical behavioral patterns in the urban area under study.  ...  The classifier is a deep learning multilayered engine with multiple configuration modes which adapts to several input/output formats.  ... 
doi:10.1109/access.2020.2987483 fatcat:hdf3mkezczg47naqm633we47k4

Reconfigurable monitoring for telecommunication networks

Man Tianxing, Vasiliy Yurievich Osipov, Alexander Ivanovich Vodyaho, Andrey Kalmatskiy, Natalia Alexandrovna Zhukova, Sergey Vyacheslavovich Lebedev, Yulia Alexandrovna Shichkina
2020 PeerJ Computer Science  
It shows that reconfigurable systems are necessary for their monitoring process in real life.  ...  This article presents a new method for the synthesis of monitoring programs and develops a new language to describe the monitoring programs.  ...  For the reconfiguration of monitoring processes, business rules can be used. The rules define processes behavior for different known situations.  ... 
doi:10.7717/peerj-cs.288 pmid:33816939 pmcid:PMC7924672 fatcat:dwkrm4fadffuffarpe6vh7t24u

Link-level reliability control for wireless electrocardiogram monitoring in indoor hospital

Juyoung Park, Jaemyoun Lee, Kyungtae Kang
2012 2012 IEEE Symposium on Computers and Communications (ISCC)  
We also developed a tool chain to determine the reliability, in terms of the packet-delivery ratio, for various combinations of system parameters.  ...  We propose a wireless system suitable for realtime remote patient monitoring in which the necessary reliability is achieved by an efficient error control in the link layer.  ...  (MIT/BIH arrhythmia database) RS erasure decoding and de-interleaving (3) Residual pattern of ECG packet errors per channel QoS results (reliability and latency) Input Output ECBs  ... 
doi:10.1109/iscc.2012.6249361 dblp:conf/iscc/ParkLK12 fatcat:horzu5qqqnh47osw4lo3drx5uy

A multi-agent monitoring and diagnostic system for TCP/IP-based network and its coordination

Toshiharu Sugawara, Ken-ichiro Murakami, Shigeki Goto
2001 Knowledge-Based Systems  
It captures packets in the promiscuous mode and analyzes their data in real time.  ...  Fortunately, LODES has a monitoring component, NoC, that can count the input/output packets from/to LODES. This self-monitoring can be used to re¯ect its coordination strategy for future diagnosis.  ...  many packets in narrowband lines, such as VPN and leased line and/or side-effect operations, such as setting up monitoring in routers using SNMP).  ... 
doi:10.1016/s0950-7051(01)00150-2 fatcat:ld3cf7vcejgnrguejcbvwvifo4

A machine learning approach to TCP state monitoring from passive measurements

Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Oivind Kure
2018 2018 Wireless Days (WD)  
We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines.  ...  We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines. Acknowledgements.  ...  This means that the information we are using to infer congestion behavior (the packets observed at the passive monitor) is less reliable and introduces more opportunities for prediction algorithms to make  ... 
doi:10.1109/wd.2018.8361713 dblp:conf/wd/HagosEYK18 fatcat:hmeh7nfa7bbwxnncel5xnyytim

Exploring Scalable, Distributed Real-Time Anomaly Detection for Bridge Health Monitoring [article]

Amirhossein Moallemi, Alessio Burrello, Davide Brunelli, Luca Benini
2022 arXiv   pre-print
Modern real-time Structural Health Monitoring systems can generate a considerable amount of information that must be processed and evaluated for detecting early anomalies and generating prompt warnings  ...  A real-life case study, a highway bridge in Italy, demonstrates that combining near-sensor computation of anomaly detection algorithms, smart pre-processing, and low-power wide-area network protocols (  ...  Effect of input-output dimensions sweep on the performance of the best detector (PCA). Fig. 11 . 11 Fig. 11.  ... 
arXiv:2203.02380v1 fatcat:jeqlduuskrbbfplzwojnvznkhi

Structural Health Monitoring Using Modular Wireless Sensors

Neal A. Tanner, Jeannette R. Wait, Charles R. Farrar, Hoon Sohn
2003 Journal of Intelligent Materials Systems and Structures  
First, a statistical process control algorithm was used to monitor the correlation of vibration data from two accelerometers mounted across a joint.  ...  For each joint, data were processed locally on a microprocessor integrated with the wireless module, and the diagnosis result was remotely transmitted to the base monitoring station.  ...  Then, these limits are used to continuously monitor variation of the process.  ... 
doi:10.1177/1045389x03014001005 fatcat:mio75b7pcbdjvn2ikfskxc7wom

An IoT Architecture for Continuous Livestock Monitoring Using LoRa LPWAN

Lorenzo Germani, Vanni Mecarelli, Giuseppe Baruffa, Luca Rugini, Fabrizio Frescura
2019 Electronics  
The devised system has been implemented using off-the-shelf hardware, and its performance has also been estimated with the help of a C++ event-based simulator.  ...  This paper reports the design, implementation, and performance of an IoT hardware and software architecture conceived for the continuous monitoring of livestock located in barns and during grazing.  ...  Pignani for providing some of the hardware used in the simulation and testing. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics8121435 fatcat:o5a6rcpagfhghniu52hoayr4i4

Hierarchical Aggregation and Intelligent Monitoring and Control in Fault-Tolerant Wireless Sensor Networks

Prasanna Sridhar, Asad M. Madni, Mo Jamshidi
2007 IEEE Systems Journal  
The fuzzy rule base consists of fuzzy rules (IF antecedent THEN consequent) that are devised by an expert knowledge base or through system input-output learning.  ...  Moreover, a robust diagnostics and decision making process should aid in monitoring and control of critical parameters to efficiently manage the operational behavior of a deployed sensor network.  ...  } /*********************************************************************** ***** * Process packets recived from UART ************************************************************************ *** if (!  ... 
doi:10.1109/jsyst.2007.900244 fatcat:p6equjkid5achpuuyfnzlxmqtu

Hierarchical Aggregation and Intelligent Monitoring and Control in Fault-Tolerant Wireless Sensor Networks

Prasanna Sridhar, Asad M. Madni, Mo Jamshidi
2007 IEEE Systems Journal  
The fuzzy rule base consists of fuzzy rules (IF antecedent THEN consequent) that are devised by an expert knowledge base or through system input-output learning.  ...  Moreover, a robust diagnostics and decision making process should aid in monitoring and control of critical parameters to efficiently manage the operational behavior of a deployed sensor network.  ...  } /*********************************************************************** ***** * Process packets recived from UART ************************************************************************ *** if (!  ... 
doi:10.1109/11196.2007.900244 fatcat:jf46l7zxs5duxie4wu7pfmohgm

A practical mimicry attack against powerful system-call monitors

Chetan Parampalli, R. Sekar, Rob Johnson
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques.  ...  In this paper, we describe an alternative approach for building mimicry attacks using only skills and technologies that hackers possess today, making this attack a more immediate and realistic threat.  ...  This eliminates the need for the monitor to predict the application's behavior as a function of its inputs/outputs, thereby making it more practical.  ... 
doi:10.1145/1368310.1368334 dblp:conf/ccs/ParampalliSJ08 fatcat:rudzphma3nfktiq326chgkuu3m
« Previous Showing results 1 — 15 out of 2,167 results