Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficiency is critical for the overall performance of a number of networked devices and systems. However, if not properly managed, the flow cache can be easily filled up and rendered ineffective by traffic patterns such as flooding attacks and scanning activities which, unfortunately, commonly occur in the Internet. In this paper, we show that popular cache replacement policies such as LRU cause the flow caches to evict the so called heavy-hitter flows during flooding attacks. To address this shortcoming, we build upon our recent work [1] and construct a replacement policy that is more resilient to floods and yet performs similarly to other policies...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
This paper discusses the problem about cache replacement strategy on the proxy where the remote stre...
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of ...
A flow cache is a fundamental building block for flow-based traffic processing. Its efficiency is cr...
Several important network applications cannot easily scale to higher data rates without requiring fo...
Abstract. Several important network applications cannot easily scale to higher data rates without re...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
Abstract—Malware-contaminated hosts organized as a “bot network ” can target and flood network links...
The most common and generally best performing replacement algorithm in modern caches is LRU. Despite...
M.S. University of Hawaii at Manoa 2011.Includes bibliographical references.In this thesis, we focus...
Computers were not built with security in mind. As such, security has and still often takes a back s...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
Malware-contaminated hosts organized as a "bot network" can target and flood network links (e.g., ro...
This paper proposes a new method and algorithm to efficiently protect web servers against SYN-floodi...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
This paper discusses the problem about cache replacement strategy on the proxy where the remote stre...
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of ...
A flow cache is a fundamental building block for flow-based traffic processing. Its efficiency is cr...
Several important network applications cannot easily scale to higher data rates without requiring fo...
Abstract. Several important network applications cannot easily scale to higher data rates without re...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
Abstract—Malware-contaminated hosts organized as a “bot network ” can target and flood network links...
The most common and generally best performing replacement algorithm in modern caches is LRU. Despite...
M.S. University of Hawaii at Manoa 2011.Includes bibliographical references.In this thesis, we focus...
Computers were not built with security in mind. As such, security has and still often takes a back s...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
Malware-contaminated hosts organized as a "bot network" can target and flood network links (e.g., ro...
This paper proposes a new method and algorithm to efficiently protect web servers against SYN-floodi...
This paper proposes a novel methodology for cache replacement policy based on techniques of genetic ...
This paper discusses the problem about cache replacement strategy on the proxy where the remote stre...
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of ...