32
edits
No edit summary |
No edit summary |
||
Line 95: | Line 95: | ||
| [http://named-data.net/wp-content/uploads/2014/08/ndn-tr-4-scaling-ndn-routing.pdf][http://www.ee.ucl.ac.uk/~uceeips/hashroute-icn13.pdf] | | [http://named-data.net/wp-content/uploads/2014/08/ndn-tr-4-scaling-ndn-routing.pdf][http://www.ee.ucl.ac.uk/~uceeips/hashroute-icn13.pdf] | ||
|- | |- | ||
| ''' Application of Packet Sampling in Computer Security - A Survey | | ''' Application of Packet Sampling in Computer Security - A Survey (Assigned to Suhair Ahmed)''' | ||
Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks? | Today we have lot of reactive solutions for detecting security attacks. Packet sampling is one of the way to monitor real time network traffic. The aim of this work is to find whether packet sampling techniques like sflow, netflow are matured enough to detect security attacks? | ||
| [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad] | | [http://www.net.informatik.uni-goettingen.de/people/abhinandan_s_prasad Abhinandan S Prasad] |
edits