Learn More
Risk management Incident response Security evaluation a b s t r a c t Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate(More)
  • Liwen He
  • 2006
Router in Internet can easily propagate spoofed, malicious routing messages that can disrupt the network service. This is more of a flaw in the trust model, and not in the protocol itself. This paper presents a novel dynamic distributed trusted model for routing infrastructure, which is applied to establish trusted routing path to safeguard routing(More)
Applications on network need not only enough quality of service (QoS) but also enough quality of security service (QoSS) because the security is essential for most of applications on network. The purpose of QoSS is to organize various security services together to achieve enough security for applications. As security requirements vary dramatically for(More)
This paper presents a novel idea for building a pure MPLS network from the initial stage (bootstrapping) without using any native IP packets to transfer control traffic. Therefore the MPLS network is a purely layer 2.5 label switched network based on layer 2 switching functionality without layer 3 IP routing. As far as we know, there is no previous work(More)
—In 3G mobile communication system, mobile broadband data services create great opportunities on revenue growth for network carriers. In the mean time, the dramatically increased subscribers make the access and core network more and more overloaded everyday. Unfortunately, majority of wireless bandwidth is consumed by non revenue driven application traffic(More)
This paper presents a new dynamic virtual private network (VPN) architecture based on a new coordinating component called the dynamic VPN manager (DVM). The DVM manages available network resources and allocates these resources to the users' applications. To achieve this a resource scheduling algorithm is designed to assign the network resources in the(More)