DDoS Attacks Detection using Machine Learning

MY Sabir - 2023 - dspace.library.uvic.ca
The advancement in information technology has created a new era named as Internet of
Things (IoT). This new technology has allowed things to be connected to the Internet, for …

Modeling of the convergence time of an IP-based network with different traffic loads

I Nedyalkov, A Stefanov… - IEEE EUROCON 2019 …, 2019 - ieeexplore.ieee.org
In the present work a modeling of an IP-based corporate network with different traffic loads-
Internet browsing, video conferencing, working with databases and VoIP calls has been …

Packet reordering correction for low-latency network applications

T Beneš, S Ubik, J Halák - 2022 11th Mediterranean …, 2022 - ieeexplore.ieee.org
Packet reordering is common in the current Internet. We discuss options for correction of
packet reordering on the receiver side of RTP audiovisual streams transmitted on top of the …

Appropriate buffer sizes for Internet nodal devices: A networks' topologies–based solution

MO Eyinagho, SO Falaki - International Journal of …, 2020 - Wiley Online Library
Switched networks'(including the Internet) nodal devices require buffers to hold packets
during periods of congestion and when traffic streams on more than one input port need to …

Network based Learning Platform Application Model for Enhancement of Realtime Working Systems

RS Priya, S Shanmugavadivel… - … and Smart Energy …, 2023 - ieeexplore.ieee.org
Learning platforms have become an integral part of the education system these days.
Especially after the COVID era, education has become more allied with self-paced and …

Definition and Visualization of Protocols in Computer Networks

F Škrabák, J Dubec, P Čičák - 2024 International Conference …, 2024 - ieeexplore.ieee.org
This paper addresses the issue of network protocol design, definition, and visualization. A
novel design tool for visualizing network protocols is introduced. Its implementation is …

UDP State Manipulation: Description of a Packet Filtering Vulnerability in Stateful Firewalls

W Koribeche, D Espes, C Morin - … on Foundations and Practice of Security, 2023 - Springer
Firewalls are essential components for security enforcement in a network, as they are the
first layer of protection from unwanted traffic and cyber-attacks. While the requirements for …

[PDF][PDF] NS2–Based Experimental Analysis of Throughput for TCP and UDP Traffic During Link Failure of The Network

A Gupta, K Mamgain, M Singh, A Chhabra - Iraqi Journal of Science, 2024 - iasj.net
Link failure refers to the failure between two connections/nodes in a perfectly working
simulation scenario at a particular instance. Transport layer routing protocols form an …

Identifying Packet Loss and Reordering Packets in Keyed UDP Transmissions

FM Gil, NM Garcia, B Matos, N Pombo… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
The User Datagram Protocol (UDP) and other similar protocols send application data from
the source to the destination machine inside segments, without foreseeing for any type of …

Assessment of the Performance of a Special User Datagram Protocol: Identifying Packet Loss and Reordering Packets in Keyed UDP Transmissions

FG Machado - 2022 - search.proquest.com
Abstract O User Datagram Protocol (UDP) e outros protocolos semelhantes enviam dados
de aplicativos da máquina de origem para a máquina de destino dentro de datagramas ou …