Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new environment. It follows that researchers need to produce traffic backgrounds for laboratory testing that accurately reflect the characteristics of organizations of interest. Because self-similarity is a common feature in today\u27s network traffic, simulations which can produce the same degree of self-similarity as the original traffic are desired. The authors discovered that modeling some important protocol characteristics has required the use of hybrid modeling and heavy-tailed distributions. These include protocols like HTTP that account for a large percentage of tra...
Modeling Internet traffic data with the inherent condition of concurrent arrival of packets requires...
This paper presents a background traffic model, (M;P;S), designed for use in wide-area packet-switch...
In order to closely simulate the real network scenario thereby verify the effectiveness of protocol ...
Internet background traffic modeling and simulation is the main challenge when constructing a test e...
Techniques for detecting previously unseen network intrusion attempts often depend on finding anomal...
Many researchers have discussed the effects of heavy-tailedness in network traffic patterns and show...
Many researchers have discussed the effects of heavy-tailedness in network traffic patterns and show...
The self-similarity properties of the considered traffic were checked on different time scales obtai...
The self-similarity properties of the considered traffic were checked on different time scales obtai...
International audienceAfter the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed...
This dissertation addresses Internet background traffic generation and network intrusion detection. ...
The use of synthetic self-similar traffic in computer networks simulation is of vital importance for...
Abstract- Last scientific publication shows that real network traffic is self-similar and its proper...
High-resolution traffic measurements from modern communications networks provide unique opportunitie...
Modeling Internet traffic data with the inherent condition of concurrent arrival of packets requires...
Modeling Internet traffic data with the inherent condition of concurrent arrival of packets requires...
This paper presents a background traffic model, (M;P;S), designed for use in wide-area packet-switch...
In order to closely simulate the real network scenario thereby verify the effectiveness of protocol ...
Internet background traffic modeling and simulation is the main challenge when constructing a test e...
Techniques for detecting previously unseen network intrusion attempts often depend on finding anomal...
Many researchers have discussed the effects of heavy-tailedness in network traffic patterns and show...
Many researchers have discussed the effects of heavy-tailedness in network traffic patterns and show...
The self-similarity properties of the considered traffic were checked on different time scales obtai...
The self-similarity properties of the considered traffic were checked on different time scales obtai...
International audienceAfter the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed...
This dissertation addresses Internet background traffic generation and network intrusion detection. ...
The use of synthetic self-similar traffic in computer networks simulation is of vital importance for...
Abstract- Last scientific publication shows that real network traffic is self-similar and its proper...
High-resolution traffic measurements from modern communications networks provide unique opportunitie...
Modeling Internet traffic data with the inherent condition of concurrent arrival of packets requires...
Modeling Internet traffic data with the inherent condition of concurrent arrival of packets requires...
This paper presents a background traffic model, (M;P;S), designed for use in wide-area packet-switch...
In order to closely simulate the real network scenario thereby verify the effectiveness of protocol ...