• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 289
Next 10 →

On the Classification of Abnormal Internet Routing Events

by Jun Li, Dejing Dou, Shiwoong Kim, Han Qin
"... Abnormal events—such as security attacks, power outages, or router misconfigurations—can seriously impact the routing infrastructure of the Internet. In order to take proper actions against abnormal events, it is critical to detect them, and further, to be able to distinguish them. In this paper, we ..."
Abstract - Add to MetaCart
Abnormal events—such as security attacks, power outages, or router misconfigurations—can seriously impact the routing infrastructure of the Internet. In order to take proper actions against abnormal events, it is critical to detect them, and further, to be able to distinguish them. In this paper

London, UK Reviewed by:

by Human Neuroscience, Edwin J. Burns, Jeremy J. Tree, Christoph T. Weidemann, Brad Duchaine, Dartmouth College, Ciara Mary Greene, Edwin J. Burns, Christoph T , 2014
"... doi: 10.3389/fnhum.2014.00622 Recognition memory in developmental prosopagnosia: electrophysiological evidence for abnormal routes to face recognition ..."
Abstract - Add to MetaCart
doi: 10.3389/fnhum.2014.00622 Recognition memory in developmental prosopagnosia: electrophysiological evidence for abnormal routes to face recognition

Analysis of Roundabout Intersections on Routes of Abnormal Loads

by Jan Petrů, Karel Zeman
"... Abstract:- This paper deals with problems of passage of abnormal loads on Czech and Slovak roundabout intersections frequently present at routes of such transports. The key routes used for transport of such loads do not meet the parameters necessary for their passage. Neither the Czech nor the Slova ..."
Abstract - Add to MetaCart
Abstract:- This paper deals with problems of passage of abnormal loads on Czech and Slovak roundabout intersections frequently present at routes of such transports. The key routes used for transport of such loads do not meet the parameters necessary for their passage. Neither the Czech nor

Observation and Analysis of BGP Behavior Under Stress

by Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, S. Felix Wu, Lixia Zhang - in Proceedings of the ACM SIGCOMM Internet Measurement Workshop 2002 , 2002
"... Despite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior during one stressful period, the ..."
Abstract - Cited by 103 (27 self) - Add to MetaCart
Despite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior during one stressful period

Detection Of Routing Misbehaviour in MANET

by Dr. R. Madhanmohan
"... Abstract — Ad hoc on demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it has a latest route with minimum hop count to d ..."
Abstract - Add to MetaCart
Abstract — Ad hoc on demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it has a latest route with minimum hop count

Improving the Security and Robustness of Internet Routing: What Can We Do Today?

by unknown authors
"... Abstract — Attacks at the control and routing plane may be the next generation of threats for the Internet. Manipulation of the routing layer could originate from profiteering, malice, or simply human error. The community has recognized this danger and several promising approaches have been proposed ..."
Abstract - Add to MetaCart
% of the networks, their policy is fresh and can be used to check their routing for abnormal routing behavior. I.

Detecting Large Route Leaks

by Qing Ju, Varun Khare, Beichuan Zhang
"... Prefix hijacking, in which an unauthorized network announces IP prefixes of other networks, is a major threat to the Internet routing security. Existing detection systems either generate many false positives, requiring frequent human intervention, or are designed to protect a small number of specifi ..."
Abstract - Add to MetaCart
information. In a large route leak, an unauthorized network hijacks prefixes owned by multiple different networks. By correlating suspicious routing announcements along the time dimension and comparing with a network’s past behavior, we are able to identify a network’s abnormal behavior of offending multiple

Transmission and Other Routes of Transmission

by Nosocomial Mucocutaneous, Lin H. Chen, Mary E. Wilson
"... We report a case of dengue fever in a Boston-area health care worker with no recent history of travel but with mu-cocutaneous exposure to infected blood from a febrile trav-eler who had recently returned from Peru. Serologic tests confirmed acute dengue virus infection in both the traveler and the h ..."
Abstract - Add to MetaCart
and the health care worker. We believe that this is the first documented case of dengue virus transmission via the mu-cocutaneous route. We present case reports and review other ways that dengue virus has been transmitted without a mos-quito vector. Dengue fever, a mosquito-borne viral infection caused by 4

Abnormal Node Detection in Wireless Sensor Network by Pair Based Approach using IDS Secure Routing Methodology

by Akar Rashed Ahmed, A. S. M Shihavuddin, Kabir Ahmed, Md. Shirajum Munir, Md Anwar Asad , 2008
"... Mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection methodology to identify abnormal node or malicious attackers. The proposed idea in this paper is to develop a new approach of abnormal node detection in wireless sensor network using IDS secu ..."
Abstract - Add to MetaCart
security routing methodology by dividing the network into number of pairs. Every node of each pair is responsible to identify abnormality of other node in that particular pair considering different attributes of nodes. The abnormal node detection algorithm uses both signatures and knowledge based routing

On Knowledge-Based Classification of Abnormal BGP Events

by Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang
"... One key factor that ensures smooth data delivery over the Internet and keeps the Internet healthy is the well-being of the Internet’s inter-domain routing. In ..."
Abstract - Add to MetaCart
One key factor that ensures smooth data delivery over the Internet and keeps the Internet healthy is the well-being of the Internet’s inter-domain routing. In
Next 10 →
Results 1 - 10 of 289
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University