Network worms are malicious self-replicating applications that propagate in a network by infecting node after node. They can cause significant damage by reducing the system performance or totaly disabling nodes, which results into considerable degradation of the qual- ity of service (QoS) that the users experience. The Cognitive Packet Net- work (CPN) is an adaptive routing protocol that attempts to address the QoS requirements of the network’s users by routing their traffic accord- ing to them. Although it is generally very resilient to network changes, it may suffer worse performance during a worm attack. Here we evaluate its performance in such crises and compare it with the Open Shortest Path First (OSPF) routing protocol, the...
Self-monitoring allows a network to observe its own behavior via probing and measurement mechanisms....
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications t...
Denial of service attacks, viruses and worms are com- mon tools for malicious adversarial behaviour ...
Reliable networks that provide good service quality are expected to become more crucial in every asp...
The need for network stability and reliability has led to the growth of autonomic networks that can ...
Route selection in Cognitive Packet Networks (CPN) occurs continuously for active flows and is driv...
We present experimental results on an autonomic network test-bed, the cognitive packet network (CPN)...
Denial of service attacks, viruses and worms are com-mon tools for malicious adversarial behaviour i...
This paper discusses a novel packet computer network architecture, a Cognitive Packet Network (CPN)...
nternet technology advances have benefited society and increased our productivity, but have also mad...
We discuss a packet network architecture called a cognitive packet network (CPN), in which intellige...
As the size of the Internet grows by orders of magnitude both in terms of users, number of IP addres...
We discuss a packet network architecture called a cognitive packet network (CPN), in which intellige...
As the size of the Internet grows by orders of magnitude both in terms of users, number of IP addres...
Self-monitoring allows a network to observe its own behavior via probing and measurement mechanisms....
Self-monitoring allows a network to observe its own behavior via probing and measurement mechanisms....
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications t...
Denial of service attacks, viruses and worms are com- mon tools for malicious adversarial behaviour ...
Reliable networks that provide good service quality are expected to become more crucial in every asp...
The need for network stability and reliability has led to the growth of autonomic networks that can ...
Route selection in Cognitive Packet Networks (CPN) occurs continuously for active flows and is driv...
We present experimental results on an autonomic network test-bed, the cognitive packet network (CPN)...
Denial of service attacks, viruses and worms are com-mon tools for malicious adversarial behaviour i...
This paper discusses a novel packet computer network architecture, a Cognitive Packet Network (CPN)...
nternet technology advances have benefited society and increased our productivity, but have also mad...
We discuss a packet network architecture called a cognitive packet network (CPN), in which intellige...
As the size of the Internet grows by orders of magnitude both in terms of users, number of IP addres...
We discuss a packet network architecture called a cognitive packet network (CPN), in which intellige...
As the size of the Internet grows by orders of magnitude both in terms of users, number of IP addres...
Self-monitoring allows a network to observe its own behavior via probing and measurement mechanisms....
Self-monitoring allows a network to observe its own behavior via probing and measurement mechanisms....
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications t...
Denial of service attacks, viruses and worms are com- mon tools for malicious adversarial behaviour ...