Association for Competitive Technology

Displaying 1-8 of 8 results

  • White Papers // Jan 2012

    Resource-Aware Multi-Target Tracking in Distributed Sensor Networks

    The ability to track targets is essential in many applications. Well-established military applications include missile defense and battle field situational awareness. Civilian applications are ever-growing, ranging from traditional applications such as air traffic control and building surveillance to emerging applications like supply chain management and wildlife tracking. In all of...

    Provided By Association for Competitive Technology

  • White Papers // May 2011

    Automatically Complementing Protocol Specifications From Network Traces

    Network servers can be tested for correctness by resorting to a specification of the implemented protocol. However, producing a protocol specification can be a time-consuming task. In addition, protocols are constantly evolving with new functionality and message formats that render the previously defined specifications incomplete or deprecated. This paper presents...

    Provided By Association for Competitive Technology

  • White Papers // Sep 2010

    ASTUTE: Detecting a Different Class of Traffic Anomalies

    When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to zero. This equilibrium property holds if the flows are nearly independent, and it is violated by traffic changes caused by several,...

    Provided By Association for Competitive Technology

  • White Papers // Jun 2010

    Detecting Traffic Anomalies Using an Equilibrium Property

    When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to zero. This equilibrium property holds if the flows are nearly independent, and it is violated by traffic changes caused by several...

    Provided By Association for Competitive Technology

  • White Papers // Dec 2009

    Macroscope: End-Point Approach to Networked Application Dependency Discovery

    Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to manage and diagnose. In this paper, the authors propose Macroscope, a new approach to extracting the dependencies of networked applications automatically by...

    Provided By Association for Competitive Technology

  • White Papers // Nov 2009

    ANTIDOTE: Understanding and Defending Against Poisoning of Anomaly Detectors

    Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build a model for normal behavior from training data and detect attacks as deviations from that model. This process invites adversaries to manipulate the training data so...

    Provided By Association for Competitive Technology

  • White Papers // Sep 2009

    MONTE: An Implementation of an MPLS Online Traffic Engineering Tool

    Multiservice networks require careful mapping of traffic in order to provide quality of service. Applying offline Traffic Engineering techniques leads to a better usage of resources and allows to assure some degree of quality of service. Even with those techniques applied, as network and traffic conditions change dynamically, the initial...

    Provided By Association for Competitive Technology

  • White Papers // Oct 2008

    How Healthy Are Today's Enterprise Networks?

    In this paper, the authors take a look at the health of a typical enterprise network via a new metric based on the fraction of useful flows generated by end-hosts. Flows considered non-useful are those that explicitly fail or else do not elicit a response from the intended destination. Examining...

    Provided By Association for Competitive Technology

  • White Papers // May 2011

    Automatically Complementing Protocol Specifications From Network Traces

    Network servers can be tested for correctness by resorting to a specification of the implemented protocol. However, producing a protocol specification can be a time-consuming task. In addition, protocols are constantly evolving with new functionality and message formats that render the previously defined specifications incomplete or deprecated. This paper presents...

    Provided By Association for Competitive Technology

  • White Papers // Sep 2010

    ASTUTE: Detecting a Different Class of Traffic Anomalies

    When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to zero. This equilibrium property holds if the flows are nearly independent, and it is violated by traffic changes caused by several,...

    Provided By Association for Competitive Technology

  • White Papers // Jun 2010

    Detecting Traffic Anomalies Using an Equilibrium Property

    When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to zero. This equilibrium property holds if the flows are nearly independent, and it is violated by traffic changes caused by several...

    Provided By Association for Competitive Technology

  • White Papers // Dec 2009

    Macroscope: End-Point Approach to Networked Application Dependency Discovery

    Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to manage and diagnose. In this paper, the authors propose Macroscope, a new approach to extracting the dependencies of networked applications automatically by...

    Provided By Association for Competitive Technology

  • White Papers // Nov 2009

    ANTIDOTE: Understanding and Defending Against Poisoning of Anomaly Detectors

    Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build a model for normal behavior from training data and detect attacks as deviations from that model. This process invites adversaries to manipulate the training data so...

    Provided By Association for Competitive Technology

  • White Papers // Oct 2008

    How Healthy Are Today's Enterprise Networks?

    In this paper, the authors take a look at the health of a typical enterprise network via a new metric based on the fraction of useful flows generated by end-hosts. Flows considered non-useful are those that explicitly fail or else do not elicit a response from the intended destination. Examining...

    Provided By Association for Competitive Technology

  • White Papers // Sep 2009

    MONTE: An Implementation of an MPLS Online Traffic Engineering Tool

    Multiservice networks require careful mapping of traffic in order to provide quality of service. Applying offline Traffic Engineering techniques leads to a better usage of resources and allows to assure some degree of quality of service. Even with those techniques applied, as network and traffic conditions change dynamically, the initial...

    Provided By Association for Competitive Technology

  • White Papers // Jan 2012

    Resource-Aware Multi-Target Tracking in Distributed Sensor Networks

    The ability to track targets is essential in many applications. Well-established military applications include missile defense and battle field situational awareness. Civilian applications are ever-growing, ranging from traditional applications such as air traffic control and building surveillance to emerging applications like supply chain management and wildlife tracking. In all of...

    Provided By Association for Competitive Technology