Learn More
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network(More)
This paper analyzes the mobile data traffic traces of a CDMA network and presents its unique characteristics compared to the wired Internet traffic. The data set was passively collected from the backbone of a commercial mobile service provider. Our study shows the highly uneven up/downlink traffic utilization nature in mobile data networks along with small(More)
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacking can occurs, which is caused by wrong routing information. This results in a serious security threat in the Internet routing system. In this paper, we present an effective and(More)
— IP prefix hijacking is a well-known security threat that corrupts Internet routing tables and has some common characteristics such as MOAS conflicts and invalid routes in BGP messages. We propose a simple but effective IP prefix hijacking detection method which is based on reachability monitoring. Network reachability means a characteristic that a packet(More)
– The increasing popularity of P2P and multimedia applications around the world has resulted in significant global increases in network traffic. This paper investigates the traffic changes in our enterprise network by analyzing the day-long traffic traces from 2007 to 2009. We observe that there has been a substantial increase in traffic in the past few(More)
One recent trend in network security attacks is increase in indirect attack on systems. Instead of directly entering the system, an attacker interferes with the proper working of the network or system. In future, damage from this type of attack is expected to become more serious. In addition, the bandwidth usage of those attacks influences the entire(More)
Intrusion Detection System (IDS) are said to be more effective when it has both high intrusion detection (true positive) rate and low false alarm (false positive). But current IDS when implemented using data mining approach like clustering, classification alone are unable to give 100 % detection rate hence lack effectiveness. In order to overcome these(More)
This paper presents a facile and efficient way to prepare carbon nanofibers ornamented with Au nanoparticles (Au/CNFs). Gold nanoparticles were first deposited in the channels of an anodized aluminum oxide (AAO) membrane by thermal decomposition of HAuCl4and then carbon nanofibers were produced in the same channels loaded with the Au nanoparticles by(More)