Filters








16,780 Hits in 3.2 sec

Rapid Detection of Constant-Packet-Rate Flows

Kuan-Ta Chen, Jing-Kai Lou
2008 2008 Third International Conference on Availability, Reliability and Security  
In this paper, we propose using a deviation-based classifier to identify VoIP and gaming traffic, given that such real-time interactive services normally send out constant-packet-rate (CPR) traffic with  ...  However, identifying such flows has become a significant administrative burden because many of the applications use proprietary signaling and transport protocols.  ...  of the observed packet rates in one second.  ... 
doi:10.1109/ares.2008.153 dblp:conf/IEEEares/ChenL08 fatcat:2wxv75iv65flvf2f2kdvtv2viy

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

D. Ayyamuthukumar, S. Karthik
2015 Journal of Computer Science  
The approach also adapts quickly to any changes in the rate of flow.  ...  The results observed in simulation shows that the proposed approach detects the onset of the attacks very early and reacts to the threat by rate limiting the malicious flow based on the volume of attack  ...  The corresponding author confirms that all of the other authors have read and approved the manuscript and no ethical issues involved.  ... 
doi:10.3844/jcssp.2015.438.442 fatcat:ngq3ichor5fmzmqxkaz2i24oki

Phase Diagrams of Network Traffic [article]

Reginald D. Smith
2009 arXiv   pre-print
This paper has been withdrawn due to errors in the analysis of data with Carrier Access Rate control and statistical methodologies.  ...  By looking at which regions are congested we can detect network problems or vulnerabilities and even predict if certain policies or actions will cause a rapid onset of congestion.  ...  There is no constant packet rate or an amenable formula which gives us any guidance on how to predict the phase diagram.  ... 
arXiv:0807.4268v2 fatcat:efb6lvux2jbzbasiyp66d5h4yy

Research issues for transport protocols in satellite IP networks

I.F. Akyildiz, G. Morabito, S. Palazzo
2001 IEEE personal communications  
Traditional transport layer flow control schemes proposed for IP networks have low performance when satellite links are involved in the communication.  ...  For each solution the advantages and drawbacks of the existing solutions are pointed out. Both real-time and non-real-time applications are considered.  ...  However, as soon as a data packet loss is detected, the source enters the detected state, halves its data transmission rate, and sends dummy packets.  ... 
doi:10.1109/98.930096 fatcat:yuzkw4hj5jbj7dtrrcu2ykjrbu

TCP Rapid: From theory to practice

Qianwen Yin, Jasleen Kaur, F. Donelson Smith
2017 IEEE INFOCOM 2017 - IEEE Conference on Computer Communications  
Rapid adopts a framework of continuous finescale bandwidth probing and rate adapting.  ...  It requires finely-controlled inter-packet gaps, high-precision timestamping of received packets, and reliance on fine-scale changes in inter-packet gaps.  ...  Because it persistently estimates bandwidth at sub-RTT timescales, RAPID is able to agilely detect the presence of a new flow and adapt its transmission rate to a fairly equal share of the bandwidth.  ... 
doi:10.1109/infocom.2017.8057179 dblp:conf/infocom/YinKS17 fatcat:u32jaqugsvafdnjsjyf7a7n7zm

Novel methods of utilizing Jitter for Network Congestion Control

Ivan Klimek, Marek Čajkovský, František Jakab
2013 Acta Informatica Pragensia  
Instead of perpetual conflict as in TCP, a proof-of-concept first-ever protocol enabling inter-flow communication without infrastructure support thru a side channel constructed on generic FIFO queue behaviour  ...  This enables independent flows passing thru the same bottleneck queue to communicate and achieve fair capacity sharing and a stable equilibrium state in a rapid fashion.  ...  To be able to detect when a stable state was achieved it stops modulating. After a stable amount of packets is received for at least two periods, the rate is adapted to the detected rate.  ... 
doi:10.18267/j.aip.20 fatcat:sx2sudt7kvd6vfdkuzbqnsjmeq

Self-generated Self-similar Traffic [article]

P. Haga, P. Pollner, G. Simon, I. Csabai, G. Vattay
2004 arXiv   pre-print
into the background traffic and produce high effective loss rate causing a long range dependent TCP flow, however, the dropped packet ratio is low.  ...  Self-similarity in the network traffic has been studied from several aspects: both at the user side and at the network side there are many sources of the long range dependence.  ...  V. thanks the support of the Hungarian Science Fund OTKA T037903 and T 032437. P. P. thanks the support of the Hungarian Science Fund OTKA D37788, T34832, T42981.  ... 
arXiv:physics/0402078v1 fatcat:bmz6nulpovfbvgobqdvwaay3ji

Host-to-Host Congestion Control for TCP

Alexander Afanasyev, Neil Tilley, Peter Reiher, Leonard Kleinrock
2010 IEEE Communications Surveys and Tutorials  
There have been enhancements allowing senders to detect fast packet losses and route changes.  ...  Other techniques have the ability to estimate the loss rate, the bottleneck buffer size, and level of congestion.  ...  APPENDIX See Figure 57 for an evolutionary graph of variants of TCP congestion control.  ... 
doi:10.1109/surv.2010.042710.00114 fatcat:lsjimrk43vai5pgmwqvsjarowe

Dynamic buffer management scheme based on rate estimation in packet-switched networks

Jeong-woo Cho, Dong-ho Cho
2002 Computer Networks  
The proposed scheme consists of a virtual threshold function, an accurate and stable per-flow rate estimation, and a per-flow exponential drop probability.  ...  While traffic volume of real-time applications is rapidly increasing, current routers do not guarantee minimum QoS values of fairness and they drop packets in random fashion.  ...  The per-flow rate estimation was accurate in view of estimating the per-flow current share, and noisy and rapid fluctuations were filtered.  ... 
doi:10.1016/s1389-1286(02)00247-5 fatcat:ojwixuvbhbejjlupiffjhtuaee

Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks

Shafiullah Khan, Kok-Keong Loo
2009 Network Security  
This kind of integration: large-scale coverage, decentralised and multi-hop architecture, multi-radios, multi-channel assignments, ad hoc connectivity support the maximum freedom of users to join or leave  ...  As a result broadband resources are exposed to various kinds of security attacks, particularly DoS attacks.  ...  Let f e be the set of such flows in the flow-table and Pr(i) be the probability of choosing flow i with rapid increase, and n i be the intensity of flow i.  ... 
doi:10.1016/s1353-4858(09)70053-4 fatcat:qhn6uxsc4bemdly6hrik55suxq

Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection

A. Kumar, J. Xu
2006 Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications  
This way our scheme is able to significantly increase the packet sampling rate of the small and medium flows at slight expense of the large flows, resulting in much more accurate estimations of various  ...  of the flows. £ ¥ § © packet), for ease of implementation.  ...  Then reducing the packet sampling rates of the top 1% flows by 12.5% will save us enough sampling resource to increase the sampling rate of the rest of the flows by 100%.  ... 
doi:10.1109/infocom.2006.326 dblp:conf/infocom/KumarX06 fatcat:6dz6syn5rzdbzioqdvyf5zjnp4

Parametric Methods for Anomaly Detection in Aggregate Traffic

Gautam Thatte, Urbashi Mitra, John Heidemann
2011 IEEE/ACM Transactions on Networking  
Third, the proposed algorithm achieves rapid detection of real denial-of-service attacks as determined by the replay of previously captured network traces.  ...  Additionally, it uses both traffic-rate and packet-size statistics, yielding a bivariate model that eliminates most false positives.  ...  Incorporating the packet-rate and packet-size features enables us to detect anomalies in encrypted traffic and avoid state-intensive flow tracking, since our method does not use flow-separated traffic;  ... 
doi:10.1109/tnet.2010.2070845 fatcat:mjfxm7q6gfdzrhhdxjbf47pwze

The rate of oxygen uptake by human red blood cells

J T Coin, J S Olson
1979 Journal of Biological Chemistry  
The rate of oxygen uptake by human erythrocytes is roughly 40 times slower (t 1/2 congruent to 80 ms at 0.125 mM O2, 25 degrees C) than the corresponding rate of oxygen combination with free hemoglobin  ...  This scheme can account quantitatively both for the dependence of the apparent rate of uptake on O2 concentration and for the shape of the observed time courses.  ...  K. (1969) In 1927, Hartridge and Roughton (1) measured the rate of O2 uptake by sheep erythrocytes in a rapid mixing, continuous flow apparatus.  ... 
pmid:762123 fatcat:quxz33sjkfd7tbswz446in5vnu

Detecting VoIP Traffic Based on Human Conversation Patterns [chapter]

Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei
2008 Lecture Notes in Computer Science  
Our scheme is particularly useful for two reasons: 1) flow detection relies on human conversations rather than packet timing; thus, it is resistant to network variability; and 2) detection is based on  ...  a short sequence of voice activities rather than the whole packet stream.  ...  VoIP Unidirectionality Independence High interactivity Bulk transfer Large packet CPR-like † † constant packet rate Table 3 . 3 The features used in the naive Bayesian classifier Features  ... 
doi:10.1007/978-3-540-89054-6_14 fatcat:3osq3kpiu5eibfzqe6oxhhcuty

Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

Gowdham Chinnaraju, S. Nithyanandam
2022 Computer systems science and engineering  
Instead of blocking the entire host, the presented approach specifically eliminates the malicious nodes. Further, in case of no malicious traffic detection, the host gets unblocked.  ...  In current study, the researchers simulated the model under MATLAB environment and the outcomes showed an enhanced performance and increased utilization of Central Processing Unit (CPU) and packet delivery  ...  Flow rate is computed as an aggregate of random numbers on timeout value. Here, the duration of blocking flow rate is evaluated by aggregating the squares of threat values in flow duration.  ... 
doi:10.32604/csse.2022.020993 fatcat:l2z64plh2vdqlj2yqkwjg2olei
« Previous Showing results 1 — 15 out of 16,780 results