نتایج جستجو برای: traffic detection

تعداد نتایج: 656237  

Journal: :CoRR 2015
Jieshi Chen Benjamin Carrión Schäfer Ivan Wang Hei Ho

With the growing demand of real-time traffic monitoring nowadays, software-based image processing can hardly meet the real-time data processing requirement due to the serial data processing nature. In this paper, the implementation of a hardware-based feature detection and networking system prototype for real-time traffic monitoring as well as data transmission is presented. The hardware archit...

2007
Cynthia McLain Ahren Studer Richard Lippmann

Network-based intrusion detection systems (NIDSs) are one component of a comprehensive network security solution. The use of IPsec, which encrypts network traffic, renders network intrusion detection virtually useless unless traffic is decrypted at network gateways. One alternative to NIDSs, host-based intrusion detection systems (HIDSs), provide some of the functionality of NIDSs but with limi...

2015
Yiliang Zeng Jinhui Lan Bin Ran Jing Gao Jinlin Zou

A new idea of an abandoned object detection system for road traffic surveillance systems based on three-dimensional image information is proposed in this paper to prevent traffic accidents. A novel Binocular Information Reconstruction and Recognition (BIRR) algorithm is presented to implement the new idea. As initial detection, suspected abandoned objects are detected by the proposed static for...

2011
M. Thangavel P. Thangaraj

Problem statement: Wireless LAN IEEE 802.11 protocols are growing rapidly and security has always been a concern with the security of wired network. Wireless networks encountered threats from unauthorized access to network resources, installation of access points and illegal sniffing (refer as classical intrusion threats). In its current hybrid wired and wireless network attacks on the generall...

2009
Kazumasa Matsuda Hidehisa Nakayama Nei Kato

Since the video streaming technology has become widespread, the security of video contents has gained more importance. Our research group previously envisioned a video leakage detection method for streaming contents that makes use of traffic patterns extracted from only traffic volume information obtained from routers. However, as the background traffic increases, packet delay and jitter increa...

2005
Kyle Bruce Wheeler

by Kyle Bruce Wheeler Network intrusion detection systems (NIDS) are deployed near network gateways to analyze all traffic entering or leaving the network. The traffic at such locations is frequently transmitted in such volumes and speeds that a commodity computer quickly becomes overwhelmed. NIDS must be able to handle all of the traffic available. The SPANIDS platform addresses this problem w...

2006
Tomas Singliar Milos Hauskrecht

Automated traffic monitoring and traffic incident detection is becoming a reality thanks to expanding networks of traffic sensors placed on US highways. However, the current state-of-the-art incident detection systems employ algorithms that require significant manual tuning. In this work, we study machine learning traffic detection solutions that are intended to reduce the need for the time con...

Journal: :Computer Networks 2010
Pedro Casas Sandrine Vaton Lionel Fillatre Igor V. Nikiforov

Recent studies from major network technology vendors forecast the advent of the Exabyte era, a massive increase in network traffic driven by high-definition video and high-speed access technology penetration. One of the most formidable difficulties that this forthcoming scenario poses for the Internet is congestion problems due to traffic volume anomalies at the core network. In the light of th...

Journal: :I. J. Network Security 2015
Muhammad Mahmoud Manjinder Nir Ashraf Matrawy

Botnets are known to be one of the most serious Internet security threats. In this survey, we review botnet architectures and their controlling mechanisms. Botnet infection behavior is explained. Then, known botnet models are outlined to study botnet design. Furthermore, Fast-Flux Service Networks (FFSN) are discussed in great details as they play an important role in facilitating botnet traffi...

2009
Zbynek Michlovský Shaoning Pang Nikola K. Kasabov Tao Ban Youki Kadobayashi

For network intrusion and virus detection, ordinary methods detect malicious network traffic and viruses by examining packets, flow logs or content of memory for any signatures of the attack. This implies that if no signature is known/created in advance, attack detection will be problematical. Addressing unknown attacks detection, we develop in this paper a network traffic and spam analyzer usi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید