A flow cache is a fundamental building block for flow-based traffic processing. Its efficiency is critical for the overall performance of a number of networked devices and systems. However, if not properly managed, the flow cache can be easily filled up and rendered ineffective by traffic patterns such as flooding attacks and scanning activities which, unfortunately, commonly occur in the Internet. In this paper, we show that popular cache replacement policies such as LRU cause the flow caches to evict the so called heavy- hitter flows during flooding attacks. To address this shortcoming, we build upon our recent work (1) and construct a replacement policy that is more resilient to floods and yet performs similarly to other policies under c...
This paper discusses the problem about cache replacement strategy on the proxy where the remote stre...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
The recent evolution of the Internet towards ``Information-centric'' transfer modes has renewed the ...
Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficie...
Several important network applications cannot easily scale to higher data rates without requiring fo...
Abstract—Malware-contaminated hosts organized as a “bot network ” can target and flood network links...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
Abstract. Several important network applications cannot easily scale to higher data rates without re...
M.S. University of Hawaii at Manoa 2011.Includes bibliographical references.In this thesis, we focus...
Malware-contaminated hosts organized as a "bot network" can target and flood network links (e.g., ro...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Computers were not built with security in mind. As such, security has and still often takes a back s...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
This paper proposes a new method and algorithm to efficiently protect web servers against SYN-floodi...
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of ...
This paper discusses the problem about cache replacement strategy on the proxy where the remote stre...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
The recent evolution of the Internet towards ``Information-centric'' transfer modes has renewed the ...
Abstract—A flow cache is a fundamental building block for flow-based traffic processing. Its efficie...
Several important network applications cannot easily scale to higher data rates without requiring fo...
Abstract—Malware-contaminated hosts organized as a “bot network ” can target and flood network links...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
Abstract. Several important network applications cannot easily scale to higher data rates without re...
M.S. University of Hawaii at Manoa 2011.Includes bibliographical references.In this thesis, we focus...
Malware-contaminated hosts organized as a "bot network" can target and flood network links (e.g., ro...
The thesis deals with optimization of network flow monitoring. Flow-based network traffic processing...
Computers were not built with security in mind. As such, security has and still often takes a back s...
Abstract—Cache replacement policies are developed to help insure optimal use of limited resources. V...
This paper proposes a new method and algorithm to efficiently protect web servers against SYN-floodi...
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of ...
This paper discusses the problem about cache replacement strategy on the proxy where the remote stre...
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start e...
The recent evolution of the Internet towards ``Information-centric'' transfer modes has renewed the ...