Models and issues in data stream systems

B Babcock, S Babu, M Datar, R Motwani… - Proceedings of the twenty …, 2002 - dl.acm.org
In this overview paper we motivate the need for and research issues arising from a new
model of data processing. In this model, data does not take the form of persistent relations …

New directions in traffic measurement and accounting

C Estan, G Varghese - Proceedings of the 2002 conference on …, 2002 - dl.acm.org
Accurate network traffic measurement is required for accounting, bandwidth provisioning
and detecting DoS attacks. These applications see the traffic as a collection of flows they …

[PDF][PDF] Automated Worm Fingerprinting.

S Singh, C Estan, G Varghese, S Savage - OSDI, 2004 - usenix.org
Network worms are a clear and growing threat to the security of today's Internet-connected
hosts and networks. The combination of the Internet's unrestricted connectivity and …

New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice

C Estan, G Varghese - ACM Transactions on Computer Systems (TOCS), 2003 - dl.acm.org
Accurate network traffic measurement is required for accounting, bandwidth provisioning
and detecting DoS attacks. These applications see the traffic as a collection of flows they …

Optimizing OSPF/IS-IS weights in a changing world

B Fortz, M Thorup - IEEE journal on selected areas in …, 2002 - ieeexplore.ieee.org
A system of techniques is presented for optimizing open shortest path first (OSPF) or
intermediate system-intermediate system (IS-IS) weights for intradomain routing in a …

Hash-based IP traceback

AC Snoeren, C Partridge, LA Sanchez… - ACM SIGCOMM …, 2001 - dl.acm.org
The design of the IP protocol makes it difficult to reliably identify the originator of an IP
packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide …

Continuous queries over data streams

S Babu, J Widom - ACM Sigmod Record, 2001 - dl.acm.org
In many recent applications, data may take the form of continuous data streams, rather than
finite stored data sets. Several aspects of data management need to be reconsidered in the …

Frequency estimation of internet packet streams with limited space

ED Demaine, A López-Ortiz, JI Munro - European Symposium on …, 2002 - Springer
We consider a router on the Internet analyzing the statistical properties of a TCP/IP packet
stream. A fundamental difficulty with measuring trafic behavior on the Internet is that there is …

Internet tomography

A Coates, AO Hero III, R Nowak… - IEEE Signal processing …, 2002 - ieeexplore.ieee.org
Today's Internet is a massive, distributed network which continues to explode in size as e-
commerce and related activities grow. The heterogeneous and largely unregulated structure …

Pi: A path identification mechanism to defend against DDoS attacks

A Yaar, A Perrig, D Song - 2003 Symposium on Security and …, 2003 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks continue to plague the Internet. Defense against
these attacks is complicated by spoofed source IP addresses, which make it difficult to …