Filters








4,164 Hits in 5.2 sec

On localization attacks to Internet Threat Monitors: An information-theoretic framework

Wei, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao
2008 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)  
Based on the information-theoretic model, we generalize all existing attacks as "temporal attacks", derive closed formulae of their performance, and propose an effective detection approach.  ...  In this paper, we address localization attacks against ITM systems in which an attacker impairs the effectiveness of ITM systems by identifying the locations of ITM monitors.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1109/dsn.2008.4630104 dblp:conf/dsn/YuZFBZ08 fatcat:rsdtfdq4kfcvncjcew7kwhssuy

A cross-correlation-based method for spatial–temporal traffic analysis

Jian Yuan, Kevin Mills
2005 Performance evaluation (Print)  
Of particular interest would be techniques that reduce the amount of data needed, while simultaneously retaining the ability to monitor spatial-temporal behavior network-wide.  ...  Analyzing spatial-temporal characteristics of traffic in large-scale networks requires both a suitable analysis method and a means to reduce the amount of data that must be collected.  ...  In this paper, we investigated spatial-temporal traffic analysis using a cross-correlation method, based on the eigenvector of the largest eigenvalue.  ... 
doi:10.1016/j.peva.2004.11.003 fatcat:7cp2fexcczdgjpkwphuxhq5gou

Monitoring the Macroscopic Effect of DDoS Flooding Attacks

Jian Yuan, K. Mills
2005 IEEE Transactions on Dependable and Secure Computing  
Using only a few observation points, our proposed method can monitor the macroscopic effect of DDoS flooding attacks.  ...  Creating defenses against flooding-based, distributed denial-of-service (DDoS) attacks requires real-time monitoring of network-wide traffic to obtain timely and significant information.  ...  The Renater study uses random matrix theory (RMT) to analyze cross-correlations among network flows.  ... 
doi:10.1109/tdsc.2005.50 fatcat:57qwdazlgfd5vcwvzfydcyhlwu

An Effective Method of Monitoring the Large-Scale Traffic Pattern Based on RMT and PCA

Jia Liu, Peng Gao, Jian Yuan, Xuetao Du
2010 Journal of Probability and Statistics  
In this paper, a method based on Random Matrix Theory (RMT) and Principal Components Analysis (PCA) is proposed for monitoring and analyzing large-scale traffic patterns in the Internet.  ...  And then an appropriate approach is put forward to select some observation points on the base of the eigen analysis.  ...  Acknowledgments The authors would like to thank anonymous reviewers for their helpful comments.  ... 
doi:10.1155/2010/375942 fatcat:hjr4s3unjrh2rjnwzhhs2d4onm

Missing Internet Traffic Reconstruction using Compressive Sampling

Indrarini Dyah Irawati, Andriyan Bayu Suksmono, Ian Yosef Matheus Edward
2017 International Journal of Communication Networks and Information Security  
In this paper, we proposed missing internet traffic reconstruction based on compressive sampling.  ...  The main contributions of this study are as follows: (i) explore the influence of the six missing patterns on the performance of the traffic matrix reconstruction algorithm; (ii) trace the link sensitivity  ...  This paper showed low effective rank in measurements using temporal matrix traffic.  ... 
dblp:journals/ijcnis/IrawatiSE17 fatcat:6xlzhytwwfgbvpqvgcivy2hfye

Dynamic Network Cartography: Advances in Network Health Monitoring

G. Mateos, K. Rajawat
2013 IEEE Signal Processing Magazine  
The present paper aims at delineating the analytical background and the relevance of SP tools to dynamic network monitoring, introducing the SP readership to the concept of dynamic network cartography  ...  Propelled by emergent social networking services and high-definition streaming platforms, network traffic has grown explosively thanks to the advances in processing speed and storage capacity of state-of-the-art  ...  of the bCd solver. ] link-traffic cartography of Internet-2 data [1].  ... 
doi:10.1109/msp.2012.2232355 fatcat:4kwumjec4jbwnifo7jkugtvhzy

On the scalability of uncoordinated multiple access for the Internet of Things

Giovanni Chisci, Hesham ElSawy, Andrea Conti, Mohamed-Slim Alouini, Moe Z. Win
2017 2017 International Symposium on Wireless Communication Systems (ISWCS)  
In particular, the developed mathematical model relies on stochastic geometry and queueing theory to account for spatial and temporal attributes of the IoT.  ...  The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns.  ...  INTRODUCTION The Internet of things (IoT) bridges our physical world to the Internet, leading to a new era of connectivity, networking, monitoring, surveillance, automation, and control.  ... 
doi:10.1109/iswcs.2017.8108148 dblp:conf/iswcs/ChisciECAW17 fatcat:66trnj4m2jb4foafgh6mu7c3zu

Analysis of Inter-Domain Traffic Correlations: Random Matrix Theory Approach [article]

Viktoria Rojkova, Mehmed Kantardzic
2007 arXiv   pre-print
The traffic behavior of University of Louisville network with the interconnected backbone routers and the number of Virtual Local Area Network (VLAN) subnets is investigated using the Random Matrix Theory  ...  The cross-correlation matrix C of the traffic rate changes between different traffic time series is calculated and tested against null-hypothesis of random interactions.  ...  The authors thank Igor Rozhkov for consulting on the RMT methodology.  ... 
arXiv:0706.2520v1 fatcat:2umabjwkcbgs5iar4l2wlpby7i

Spatio-temporal compressive sensing and internet traffic matrices

Yin Zhang, Matthew Roughan, Walter Willinger, Lili Qiu
2009 Computer communication review  
., traffic engineering, capacity planning, anomaly detection) rely heavily on the availability and accuracy of traffic matrices.  ...  Several effective heuristics have been proposed to exploit the sparse or low-rank nature of  ...  Acknowledgments We thank Patrick Thiran and the anonymous reviewers for their valuable feedback.  ... 
doi:10.1145/1594977.1592600 fatcat:2shnwwwcqrhe7lkw3g4jkkx4wq

Spatio-temporal compressive sensing and internet traffic matrices

Yin Zhang, Matthew Roughan, Walter Willinger, Lili Qiu
2009 Proceedings of the ACM SIGCOMM 2009 conference on Data communication - SIGCOMM '09  
., traffic engineering, capacity planning, anomaly detection) rely heavily on the availability and accuracy of traffic matrices.  ...  Several effective heuristics have been proposed to exploit the sparse or low-rank nature of  ...  Acknowledgments We thank Patrick Thiran and the anonymous reviewers for their valuable feedback.  ... 
doi:10.1145/1592568.1592600 dblp:conf/sigcomm/ZhangRWQ09 fatcat:xkok3swdbnar3gidq63e4x4hoi

Dual-Level Compressed Aggregation: Recovering Fields of Physical Quantities from Incomplete Sensory Data [article]

Liu Xiang, Jun Luo, Chenwei Deng, Athanasios V. Vasilakos, Weisi Lin
2011 arXiv   pre-print
Performance evaluation based on both synthetic and real data sets confirms the recovery fidelity and energy efficiency of our DECA framework.  ...  Specifically, DECA allows a high fidelity recovery of a widespread event, under the situations that the WSN only sparsely covers the event area and that an in-network data aggregation is applied for traffic  ...  However, the design of diffusion operators are totally different due to distinct correlation structures in data. Leveraging on the low rank feature of the Internet traffic matrices (TMs), Zhang et al.  ... 
arXiv:1107.4873v3 fatcat:ko5rts3b55dundssmtc4npsf3u

Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution

Xiaoxiao Yu, Wenzhu Zhang, Lin Zhang, Victor O.K. Li, Jian Yuan, Ilsun You
2013 Mathematical and computer modelling  
Then, we propose a Spatial-Temporal-Entangled Analysis (STEA) algorithm based on semi-supervised manifold learning and the regularized optimization to extract semantic information from incomplete sensing  ...  Specifically, the proposed prototype is used to collect traffic and air pollution data in Beijing, and such real-world datasets are used to evaluate the effectiveness of STEA.  ...  A preliminary version of this paper was presented at The Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2012) [26] .  ... 
doi:10.1016/j.mcm.2013.01.002 fatcat:f7qwjk6guzhxffjs42o2gm34yy

Exploring Urban Dynamics Based on Pervasive Sensing: Correlation Analysis of Traffic Density and Air Quality

Wenzhu Zhang, Bing Zhu, Lin Zhang, Jian Yuan, Ilsun You
2012 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing  
Based on noisy and partially labelled dataset that are collected by pervasive urban sensor networks, we evaluate STML's performance by analysing correlation between the traffic density and the air quality  ...  Second, we design a Spatial-Temporal Manifold Learning (STML) algorithm to analyse the correlation between physical processes.  ...  ACKNOWLEDGMENT This work is partially funded by the Robert Bosch Stiftung Urban Sensing of City Dynamics and Energy Use in the Beijing Metropolitan Area.  ... 
doi:10.1109/imis.2012.137 dblp:conf/imis/ZhangZZYY12 fatcat:4zhpcshrtndqdnd6laj3x4337a

Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection

Yang Liu, Linfeng Zhang, Yong Guan
2010 2010 IEEE 30th International Conference on Distributed Computing Systems  
Spatial analysis methods have been proved to be effective in detecting network-wide traffic anomalies that are not detectable at a single monitor.  ...  Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday.  ...  ACKNOWLEDGMENT This project has benefited from the use of measurement data collected on the Internet2 network as part of the Internet2 Observatory Project.  ... 
doi:10.1109/icdcs.2010.45 dblp:conf/icdcs/LiuZG10 fatcat:22mp52wzyrdpxhzkbmok3qdmyy

Chaotic Features for Traffic Video Classification

2014 KSII Transactions on Internet and Information Systems  
Finally, the earth mover's distance (EMD) is employed to obtain a distance matrix by comparing the similarity based on the segmentation results.  ...  This paper proposes a novel framework for traffic video classification based on chaotic features. First, each pixel intensity series in the video is modeled as a time series.  ...  This work was partly supported by the National Natural Science Foundation of China "61374161"and "61074106".  ... 
doi:10.3837/tiis.2014.08.015 fatcat:o6td2ts7gfbbpo4tf7nwd3nkx4
« Previous Showing results 1 — 15 out of 4,164 results