Models and issues in data stream systems
In this overview paper we motivate the need for and research issues arising from a new
model of data processing. In this model, data does not take the form of persistent relations …
model of data processing. In this model, data does not take the form of persistent relations …
New directions in traffic measurement and accounting
C Estan, G Varghese - Proceedings of the 2002 conference on …, 2002 - dl.acm.org
Accurate network traffic measurement is required for accounting, bandwidth provisioning
and detecting DoS attacks. These applications see the traffic as a collection of flows they …
and detecting DoS attacks. These applications see the traffic as a collection of flows they …
[PDF][PDF] Automated Worm Fingerprinting.
Network worms are a clear and growing threat to the security of today's Internet-connected
hosts and networks. The combination of the Internet's unrestricted connectivity and …
hosts and networks. The combination of the Internet's unrestricted connectivity and …
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
C Estan, G Varghese - ACM Transactions on Computer Systems (TOCS), 2003 - dl.acm.org
Accurate network traffic measurement is required for accounting, bandwidth provisioning
and detecting DoS attacks. These applications see the traffic as a collection of flows they …
and detecting DoS attacks. These applications see the traffic as a collection of flows they …
Optimizing OSPF/IS-IS weights in a changing world
A system of techniques is presented for optimizing open shortest path first (OSPF) or
intermediate system-intermediate system (IS-IS) weights for intradomain routing in a …
intermediate system-intermediate system (IS-IS) weights for intradomain routing in a …
Hash-based IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP
packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide …
packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide …
Continuous queries over data streams
In many recent applications, data may take the form of continuous data streams, rather than
finite stored data sets. Several aspects of data management need to be reconsidered in the …
finite stored data sets. Several aspects of data management need to be reconsidered in the …
Frequency estimation of internet packet streams with limited space
We consider a router on the Internet analyzing the statistical properties of a TCP/IP packet
stream. A fundamental difficulty with measuring trafic behavior on the Internet is that there is …
stream. A fundamental difficulty with measuring trafic behavior on the Internet is that there is …
Internet tomography
Today's Internet is a massive, distributed network which continues to explode in size as e-
commerce and related activities grow. The heterogeneous and largely unregulated structure …
commerce and related activities grow. The heterogeneous and largely unregulated structure …
Pi: A path identification mechanism to defend against DDoS attacks
Distributed denial of service (DDoS) attacks continue to plague the Internet. Defense against
these attacks is complicated by spoofed source IP addresses, which make it difficult to …
these attacks is complicated by spoofed source IP addresses, which make it difficult to …