The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel method to detect anomalies in network traffic, based on a nonrestricted α-stable first-order model and statistical hypothesis testing. To this end, we give statistical evidence that the marginal distribution of real traffic is adequately modeled with α-stable functions and classify traffic patterns by means of a Generalized Likelihood Ratio Test (GLRT). The method automatically...
Researching on use of new real-time connection-oriented services like streaming technologies and mission-critical transaction-oriented services and more reliable network become inevitable trends presently. MPLS is a next generation backbone architecture, it can speed up packet forwarding to destination by label switching. However, if there exists no backup LSP when the primary LSP fails, MPLS frames...
Conventional risk assessments in Ad-Hoc Networks always require sample satisfy specific distribution with large quantity and establish models through subjective judgment, these methods lack general applicability, objectivity and credibility. Moreover, some models only focus on single time point evaluation and failed to thoroughly reveal dynamic behavioral character. To solve these problems and make...
As the more complex of the transport network's architecture, and the bigger of its scale, the analysis and management of the network fault is becoming more and more difficult. We need to do kinds of experiments to confirm various network breakdown phenomena in different networks and the influence which it brings to the service. But doing the experiments in real networks would bring some security risks,...
This paper describes an attempt to identify the relationships between the using of a mobile device and an online shopper's trust in use of electronic payment systems in order to see how the adoption of a mobile device can contributes positively to increase shoppers' trust in their used of electronic payment systems. Therefore, this trust will increase shopper's intention to purchase online. It also...
Military force structures are becoming increasingly complex and net-centric as new technologies are developed and deployed. As such, there is an ever increasing need to provide system-of-systems (SoS) analysis tools to assist in evaluating a military combat team's survivability, lethality, sustainment and logistics. Evaluation of networked communications as part of this analysis is often overlooked...
Through the definition of intelligent models of network defense, which is composed by neural networks structure model of network defense, immunity parameters of network defense and antibody pruning defense tactic, immunity-based neural networks model of network defense is modeled and analyzed. The antibody pruning defense tactic is pointed out that the network element, whose antibody concentration...
Distributed detection mechanism of DDoS (distributed denial of service) attack is often achieved by the corporation between many detection nodes, its final detection result largely depends on the judgements of local nodes. While DDoS attack flows are distributed enough in many links, itpsilas hard to derive exact judgement for every node only by the information collecting from local, consequently...
This paper considers the problem of the dynamic risk assessment for the network based on the threat stream analysis. We analyze the general approach to do the network dynamic risk assessment. A stream based cube model is built to analyze the characteristics of the threat stream. Then combining with the research about the description and analysis of the threat effect, we propose the architecture of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.