scispace - formally typeset
Search or ask a question

Showing papers in "Computer Networks in 1999"


Journal ArticleDOI
TL;DR: An overview of the Bro system's design, which emphasizes high-speed (FDDI-rate) monitoring, real-time notification, clear separation between mechanism and policy, and extensibility, is given.

2,236 citations


Journal ArticleDOI
Hervé Debar1, Marc Dacier1, Andreas Wespi1
TL;DR: A taxonomy of intrusion-detection systems is introduced that highlights the various aspects of this area and is illustrated by numerous examples from past and current projects.

882 citations


Journal ArticleDOI
TL;DR: Some of issues the authors faced when attempting to build a high-performance secure coprocessor that balances security with easy third-party programmability are discussed.

412 citations


Journal Article
TL;DR: In this article, the basic mechanisms used in packet networks to support Quality-of-Service QoS guarantees are reviewed, and a discussion on the use of such mechanisms to provide specific end-to-end performance guarantees.

234 citations


Journal ArticleDOI
Roch Guerin1, V. Peris1
TL;DR: The paper starts by introducing the different scheduling and buffer management mechanisms that can be used to provide service differentiation in packet networks, and discusses the need for adapting mechanisms to the different environments where they are to be deployed.

218 citations


Journal ArticleDOI
TL;DR: The Telecommunication Sector of the International Telecommunication Union ITU-T has developed a series of recommendations together comprising the H.323 system that provides for multimedia communications in packet-based .inter networks that has been accepted as being the standard for IP telephony.

186 citations


Journal ArticleDOI
TL;DR: The upper-layer protocol components that are specific to Internet telephony services: the Real-Time Transport Protocol (RTP) to carry voice and video data, and the Session Initiation Protocol (SIP) for signaling are described.

157 citations


Journal ArticleDOI
TL;DR: This approach specifically focuses on cooperative IDS agents working together by analyzing the intruder's attack strategy and separating local event processing from global analysis, which provides a theme that will help distributed IDS to work together.

132 citations


Journal ArticleDOI
TL;DR: An Application Level Active Network system that provides the benefits of proposed Active Networks, including rapid and transparent deployment of new network services, but is also relatively free of the problems of router-level Active Network deployment.

102 citations


Journal ArticleDOI
TL;DR: Criteria for the evaluation of IDSs as sources of legal evidence are proposed, including preservation of evidence, continuity of evidence and transparency of forensic method, and it is suggested that the key to successful prosecution of complex intrusions is the finding of multiple independent streams of evidence which corroborate one another.

96 citations


Journal ArticleDOI
Refik Molva1
TL;DR: The IPsec architecture including security protocols in the Internet Layer and the related key management proposals are introduced, and the transport layer security protocol and security issues in the network control and management are presented.

Journal ArticleDOI
TL;DR: The architecture, control protocols, and coordination mechanisms used in today's multimedia conferencing standards for ISDN and IP networks are discussed and compared with respect to their architecture and position in the market.

Journal ArticleDOI
TL;DR: An introduction to methods and tools for testing communication protocols and distributed systems and the problem of testing based on models, in the form of finite state machines, extended FSMs, timed FSMs and communicating FSMs is presented.

Journal ArticleDOI
TL;DR: The basic approach is to find ways for a user to authenticate a public terminal before using it to process sensitive information, and to propose appropriate solutions to this problem.

Journal ArticleDOI
Carl M. Ellison1
TL;DR: This paper questions the underlying assumptions of PKI, suggests workable alternative assumptions and presents elements of a public key certification structure appropriate to the new assumptions.

Journal ArticleDOI
TL;DR: This paper examines the current status of standardization efforts concerning mobile agent technology and presents five Java-based mobile agent platforms and concludes with some general remarks on the future of this technology.

Journal ArticleDOI
TL;DR: This paper discusses a number of issues related to anonymity and location privacy in mobile networks, reviews current state-of-the-art approaches, identifies their exposures of anonymity and proposes several low-cost solutions which vary in complexity, degree of protection and assumptions about the underlying environment.

Journal ArticleDOI
TL;DR: It is shown that obtaining additional information about servers and paths in the Internet before choosing a server improves response time significantly and that DSS confers system-wide benefits from the network standpoint, as compared to static server selection.

Journal ArticleDOI
TL;DR: This paper examines the cost of security in link state routing and develops techniques for efficient and secure processing of link state updates and applications to mobile ad hoc networks are considered.

Journal ArticleDOI
TL;DR: The AXD 301 incorporates duplicate hardware and software modularity, which enables individual modules to be upgraded without disturbing traffic, and supports every service category defined for ATM, as well as integrated support for IPand voice.

Journal ArticleDOI
TL;DR: The Message Sequence Chart (MSC) as discussed by the authors has been extended with constructs for more complete and structured specifications, and the new version of the language is called MSC'96. In this paper, we give formal definitions of parts of the specification language, but most features are explained by informal examples and drawings.

Journal ArticleDOI
TL;DR: The paper addresses issues related to the performance of systems specified with SDL and MSC and describes how performance aspects can be integrated with the SDL/MSC method.

Journal ArticleDOI
TL;DR: The focus in this paper is on the architecture and the agent environment design that allows terminal mobility as well as user mobility through an agent based middleware which serves as a basis for user mobility.

Journal ArticleDOI
TL;DR: A network model that allows processing of QoS information about media flows to enable applications to make adaptation decisions and produces reports about the compatibility between the flow-states and the network QoS, indicating which flow-state the network can currently support.

Journal ArticleDOI
TL;DR: This paper examines the impact of the Internet on the main telecommunication architectures, namely the IN, the TMN and TINA, and elaborate on possible ways of salvaging the best parts of the work achieved by the TINA-Consortium in the Internet context.

Journal ArticleDOI
TL;DR: This document attempts to provide the reader with an overview of how the components fit together and of some of the assumptions made, as well as some statement of direction for those components still in a nascent stage.

Journal ArticleDOI
TL;DR: This paper presents the design, implementation and evaluation of mobiware, a middleware technology that enables the introduction of new services in mobile networks and provides a toolkit that service providers can utilize to build services that can dynamically exploit the intrinsic scalable properties of mobile multimedia applications in response to time-varying mobile network conditions.

Journal ArticleDOI
TL;DR: Loop topology, transmission impairments, and transmission techniques are reviewed for the most popular DSLs, as are the basic connections necessary for a complete ADSL service through a service-provider's network.

Journal ArticleDOI
TL;DR: The results of a measurement campaign on calls directed to Internet Service Providers are used to analyze models for their arrival process and for their holding time, selecting the hyperexponential model for the probability density function of the call holding times.

Journal ArticleDOI
TL;DR: The protocol stack for an ATM air interface that is able to efficiently support all ATM service categories is described and a strategy for transmission of acknowledgments of an automatic repeat request (ARQ) protocol and on a collision resolution algorithm for Transmission of capacity requests over the uplink are focused on.