Treatment-Based Traffic Signatures
نویسندگان
چکیده
As depicted in Figure 1, today’s wireless local area networks (WLANs) concurrently support a plethora of user applications with diverse connectivity and Quality of Service (QoS) requirements. Wireless traffic flows contending for resources can degrade performance for one or more of the wireless applications. Delay sensitive applications may face high latency in the presence of competing wireless traffic that saturates the WLAN. Streaming applications that need an available bandwidth estimate to select the best encoded media for good performance face challenges doing bandwidth estimation over wireless networks. Requiring smooth data delivery, VoIP suffers from delay jitter during WLAN congestion.
منابع مشابه
Parametrization of Pedestrian Injuries and its Utilisation in Proving Traffic Accidents Course Using Injury Signatures and Contact Signatures
Background: The paper points out the present limited possibility of using the verbal description of injuries for the needs of experts from the field of road transportation as relevant criminalistics traces, as well as the options of the FORTIS system that creates a new area for a deeper interdisciplinary approach in the field of expert evidence. Further a description of how to create injury si...
متن کاملتولید خودکار الگوهای نفوذ جدید با استفاده از طبقهبندهای تک کلاسی و روشهای یادگیری استقرایی
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
متن کامل(WHASG) Automatic SNORT Signatures Generation by using Honeypot
An Intrusion detection system (IDS) is an important network security component that is used to monitor network traffic and detect attack attempts. A signature based intrusion detection system relies on a set of predefined signatures to detect an attack. Due to “zero-day” attacks (i.e. new unknown attacks) conventional IDS will not be able to detect these new attacks until the signatures are upd...
متن کاملReverse Engineering of Network Signatures
Network-based intrusion detection systems analyze network traffic looking for evidence of attacks. The analysis is usually performed using signatures, which are rules that describe what traffic should be considered as malicious. If the signatures are known, it is possible to either craft an attack to avoid detection or to send synthetic traffic that will match the signature to over-stimulate th...
متن کاملTowards self adaptive network traffic classification
A critical aspect of network management from an operator’s perspective is the ability to understand or classify all traffic that traverses the network. The failure of port based traffic classification technique triggered an interest in discovering signatures based on packet content. However, this approach involves manually reverse engineering all the applications/protocols that need to be ident...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007