A taxonomy and survey on green data center networks

K Bilal, SUR Malik, O Khalid, A Hameed… - Future Generation …, 2014 - Elsevier
Data centers are growing exponentially (in number and size) to accommodate the escalating
user and application demands. Likewise, the concerns about the environmental impacts …

Moongen: A scriptable high-speed packet generator

P Emmerich, S Gallenmüller, D Raumer… - Proceedings of the …, 2015 - dl.acm.org
We present MoonGen, a flexible high-speed packet generator. It can saturate 10 GbE links
with minimum-sized packets while using only a single CPU core by running on top of the …

Using gans for sharing networked time series data: Challenges, initial promise, and open questions

Z Lin, A Jain, C Wang, G Fanti, V Sekar - Proceedings of the ACM …, 2020 - dl.acm.org
Limited data access is a longstanding barrier to data-driven research and development in
the networked systems community. In this work, we explore if and how generative …

Flow-based network traffic generation using generative adversarial networks

M Ring, D Schlör, D Landes, A Hotho - Computers & Security, 2019 - Elsevier
Flow-based data sets are necessary for evaluating network-based intrusion detection
systems (NIDS). In this work, we propose a novel methodology for generating realistic flow …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Bridging the gap: A pragmatic approach to generating insider threat data

J Glasser, B Lindauer - 2013 IEEE Security and Privacy …, 2013 - ieeexplore.ieee.org
The threat of malicious insider activity continues to be of paramount concern in both the
public and private sectors. Though there is great interest in advancing the state of the art in …

Sizing router buffers

G Appenzeller, I Keslassy, N McKeown - ACM SIGCOMM Computer …, 2004 - dl.acm.org
All Internet routers contain buffers to hold packets during times of congestion. Today, the
size of the buffers is determined by the dynamics of TCP's congestion control algorithm. In …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Power awareness in network design and routing

J Chabarek, J Sommers, P Barford… - … INFOCOM 2008-The …, 2008 - ieeexplore.ieee.org
Exponential bandwidth scaling has been a fundamental driver of the growth and popularity
of the Internet. However, increases in bandwidth have been accompanied by increases in …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …