A major challenge for intrusion prevention system (IPS) sensors in today’s Internet is the amount of traffic these devices have to inspect. Hence this paper presents a linear program (LP) for traffic scheduling in multi-sensor environments that alleviates inspection loads at IPS sensors. The model discriminates traffic flows so that the amount of inspected suspicious traffic is maximized. While the LP is not constrained to integral solutions, traffic belonging to a flow is mostly scheduled for inspection to a single sensor, which facilitates the collection of state information. An analysis of how the Simplex algorithm solves the model and numerical results demonstrate that state information can be preserved without imposing integral constra...
We consider a large-scale cyber network with N components (e.g., paths, servers, subnets). ...
Abstract-In this paper, we address issues related to preventing traffic analysis in computer network...
Abstract—In a scenario where network bandwidth and traffic are continuously growing, network applian...
Network intrusion detection systems provide proactive defense against security threats by detecting ...
We consider the problem of quickest detection of an intrusion using a sensor network, keeping only a...
Abstract—Wireless sensor networks consist of a large number of sensors and have been broadly used fo...
The possibility of smoothing aggregated traffic from sensors with varying reporting periods and fram...
Abstract—We consider the problem of quickest detection of an intrusion using a sensor network, keepi...
We consider the problem of quickest detection of an\ud intrusion using a sensor network, keeping onl...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of n...
In an always connected world, cyber-attacks and computer security breaches can produce significant f...
In our modern society the reliance on fast and reliable delivery of large amounts of data is steadil...
As networks become faster there is an emerging need for security analysis techniques that can keep u...
Abstract—In cyber-physical systems such as in-vehicle wireless sensor networks, a large number of se...
We consider a large-scale cyber network with N components (e.g., paths, servers, subnets). ...
Abstract-In this paper, we address issues related to preventing traffic analysis in computer network...
Abstract—In a scenario where network bandwidth and traffic are continuously growing, network applian...
Network intrusion detection systems provide proactive defense against security threats by detecting ...
We consider the problem of quickest detection of an intrusion using a sensor network, keeping only a...
Abstract—Wireless sensor networks consist of a large number of sensors and have been broadly used fo...
The possibility of smoothing aggregated traffic from sensors with varying reporting periods and fram...
Abstract—We consider the problem of quickest detection of an intrusion using a sensor network, keepi...
We consider the problem of quickest detection of an\ud intrusion using a sensor network, keeping onl...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
The spread of 1-10 Gbps technology has in recent years paved the way to a flourishing landscape of n...
In an always connected world, cyber-attacks and computer security breaches can produce significant f...
In our modern society the reliance on fast and reliable delivery of large amounts of data is steadil...
As networks become faster there is an emerging need for security analysis techniques that can keep u...
Abstract—In cyber-physical systems such as in-vehicle wireless sensor networks, a large number of se...
We consider a large-scale cyber network with N components (e.g., paths, servers, subnets). ...
Abstract-In this paper, we address issues related to preventing traffic analysis in computer network...
Abstract—In a scenario where network bandwidth and traffic are continuously growing, network applian...