Results 1 - 10
of
289
On the Classification of Abnormal Internet Routing Events
"... Abnormal events—such as security attacks, power outages, or router misconfigurations—can seriously impact the routing infrastructure of the Internet. In order to take proper actions against abnormal events, it is critical to detect them, and further, to be able to distinguish them. In this paper, we ..."
Abstract
- Add to MetaCart
Abnormal events—such as security attacks, power outages, or router misconfigurations—can seriously impact the routing infrastructure of the Internet. In order to take proper actions against abnormal events, it is critical to detect them, and further, to be able to distinguish them. In this paper
London, UK Reviewed by:
, 2014
"... doi: 10.3389/fnhum.2014.00622 Recognition memory in developmental prosopagnosia: electrophysiological evidence for abnormal routes to face recognition ..."
Abstract
- Add to MetaCart
doi: 10.3389/fnhum.2014.00622 Recognition memory in developmental prosopagnosia: electrophysiological evidence for abnormal routes to face recognition
Analysis of Roundabout Intersections on Routes of Abnormal Loads
"... Abstract:- This paper deals with problems of passage of abnormal loads on Czech and Slovak roundabout intersections frequently present at routes of such transports. The key routes used for transport of such loads do not meet the parameters necessary for their passage. Neither the Czech nor the Slova ..."
Abstract
- Add to MetaCart
Abstract:- This paper deals with problems of passage of abnormal loads on Czech and Slovak roundabout intersections frequently present at routes of such transports. The key routes used for transport of such loads do not meet the parameters necessary for their passage. Neither the Czech nor
Observation and Analysis of BGP Behavior Under Stress
- in Proceedings of the ACM SIGCOMM Internet Measurement Workshop 2002
, 2002
"... Despite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior during one stressful period, the ..."
Abstract
-
Cited by 103 (27 self)
- Add to MetaCart
Despite BGP's critical importance as the de-facto Internet inter-domain routing protocol, there is little understanding of how BGP actually performs under stressful conditions when dependable routing is most needed. In this paper, we examine BGP's behavior during one stressful period
Detection Of Routing Misbehaviour in MANET
"... Abstract — Ad hoc on demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it has a latest route with minimum hop count to d ..."
Abstract
- Add to MetaCart
Abstract — Ad hoc on demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (route reply) that it has a latest route with minimum hop count
Improving the Security and Robustness of Internet Routing: What Can We Do Today?
"... Abstract — Attacks at the control and routing plane may be the next generation of threats for the Internet. Manipulation of the routing layer could originate from profiteering, malice, or simply human error. The community has recognized this danger and several promising approaches have been proposed ..."
Abstract
- Add to MetaCart
% of the networks, their policy is fresh and can be used to check their routing for abnormal routing behavior. I.
Detecting Large Route Leaks
"... Prefix hijacking, in which an unauthorized network announces IP prefixes of other networks, is a major threat to the Internet routing security. Existing detection systems either generate many false positives, requiring frequent human intervention, or are designed to protect a small number of specifi ..."
Abstract
- Add to MetaCart
information. In a large route leak, an unauthorized network hijacks prefixes owned by multiple different networks. By correlating suspicious routing announcements along the time dimension and comparing with a network’s past behavior, we are able to identify a network’s abnormal behavior of offending multiple
Transmission and Other Routes of Transmission
"... We report a case of dengue fever in a Boston-area health care worker with no recent history of travel but with mu-cocutaneous exposure to infected blood from a febrile trav-eler who had recently returned from Peru. Serologic tests confirmed acute dengue virus infection in both the traveler and the h ..."
Abstract
- Add to MetaCart
and the health care worker. We believe that this is the first documented case of dengue virus transmission via the mu-cocutaneous route. We present case reports and review other ways that dengue virus has been transmitted without a mos-quito vector. Dengue fever, a mosquito-borne viral infection caused by 4
Abnormal Node Detection in Wireless Sensor Network by Pair Based Approach using IDS Secure Routing Methodology
, 2008
"... Mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection methodology to identify abnormal node or malicious attackers. The proposed idea in this paper is to develop a new approach of abnormal node detection in wireless sensor network using IDS secu ..."
Abstract
- Add to MetaCart
security routing methodology by dividing the network into number of pairs. Every node of each pair is responsible to identify abnormality of other node in that particular pair considering different attributes of nodes. The abnormal node detection algorithm uses both signatures and knowledge based routing
On Knowledge-Based Classification of Abnormal BGP Events
"... One key factor that ensures smooth data delivery over the Internet and keeps the Internet healthy is the well-being of the Internet’s inter-domain routing. In ..."
Abstract
- Add to MetaCart
One key factor that ensures smooth data delivery over the Internet and keeps the Internet healthy is the well-being of the Internet’s inter-domain routing. In
Results 1 - 10
of
289