Seminar on Internet Technologies (Winter 2015/2016): Difference between revisions

no edit summary
No edit summary
No edit summary
Line 98: Line 98:
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks?
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| TBA
| [http://www.sflow.org/packetSamplingBasics/][http://www.cse.unr.edu/~mgunes/papers/JNCA13.pdf][http://cs.uccs.edu/~jkalita/papers/2014/HoqueNetworkAttacksJCNA2014.pdf]
|-
|-
| ''' Game theory based solutions in Computer Network Security - A Survey (Assigned to Awad Mukbil)'''   
| ''' Game theory based solutions in Computer Network Security - A Survey (Assigned to Awad Mukbil)'''   
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.
Game theory is the mathematical study of conflict and co-operation between rational agents. Game theory is widely used in the computer network security to detect and mitigate attacks. The aim of work is to perform survey on the recent advances in the field.
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad]
| [https://en.wikipedia.org/wiki/Game_theory][http://dl.acm.org/citation.cfm?id=2480742][http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6238282][http://people.cis.ksu.edu/~sroy/hicss43.pdf]
| [https://en.wikipedia.org/wiki/Game_theory][http://dl.acm.org/citation.cfm?id=2480742][http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6238282][http://people.cis.ksu.edu/~sroy/hicss43.pdf][http://cs.uccs.edu/~jkalita/papers/2014/HoqueNetworkAttacksJCNA2014.pdf]
|
|


32

edits