Showing 1 - 10 of 19 results for the Publish Year - 2006 , Type - White Paper
In this paper, the authors present a new approach for summarization and analysis of flow records.
In this paper, the authors describe a network flow analyzer capable of attribution and aggregation of different flows to identify suspicious behaviors.
In this paper, Ron McLeod describes a network traffic capture and analysis used to investigate network performance issues of a small private network.
In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.
In this paper, the authors show how IPFIX and PSAMP can be used to support network security.
In this paper, the authors empirically evaluate the impact of sampling on anomaly detection.
In this paper, Raj Srinivasan proposes an architecture that meets security requirements and is flexible enough to support future application needs.
In this paper, the authors propose a set of tests for identifying masqueraded peer-to-peer file-sharing based on traffic summaries (flows).
This paper discusses FX technology.
In this paper, the authors present RAVE as an analysis service provider.