Learn More
We describe a method for monitoring Voice over IP (VoIP) applications based upon a reduction of the ITU-T's E-Model to transport level, measurable quantities. In the process, 1) we identify the relevant transport level quantities, 2) we discuss the tradeoffs between placing the monitors within the VoIP gateways versus placement of the monitors within the(More)
—Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely " un-managed " network deployments, capable of accommodating highly dynamic network topologies. Yet, while the network infrastructure may be " un-managed " , monitoring the network performance and setting configuration parameters once deployed, remains important in(More)
A new approach for detecting security attacks on software systems by monitoring the software system performance signatures is introduced. We present a proposed architecture for security intrusion detection using off-the-shelf security monitoring tools and performance signatures. Our approach relies on the assumption that the performance signature of the(More)
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS [4], "One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and saturate MANETbased networks on the order of(More)
In this paper, we propose a new approach for mitigation of worm propagation through tactical Mobile Ad-Hoc Networks (MANETs) which is based upon performance signatures and software rejuvenation. Three application performance signature and software rejuvenation algorithms are proposed and analyzed. These algorithms monitor critical applications'(More)
—Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructure-less and largely " un-managed ". Yet, while the network may be un-managed, monitoring performance and setting configuration parameters post-deployment, remains important in order to ensure proper " tuning " and maintenance of a MANET. While SNMP is sometimes considered too " heavy "(More)
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design parameter is the depth of the de-jitter buffer since it influences two important parameters controlling voice quality, namely voice-path delay and packet loss probability. In this(More)
Mobile Ad-hoc Networks (MANETs) are used for emergency situations like disaster-relief, military applications, and emergency medical situations. These applications make MANETs attractive targets for cyber- attacks and make the development of counter-measures paramount. The study of worm behavior is critical to the design of effective counter measures in(More)