scispace - formally typeset
Search or ask a question
Journal

Praxis Der Informationsverarbeitung Und Kommunikation 

De Gruyter
About: Praxis Der Informationsverarbeitung Und Kommunikation is an academic journal. The journal publishes majorly in the area(s): The Internet & Wireless sensor network. Over the lifetime, 638 publications have been published receiving 2098 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The original architecture of D-ITG (Distributed Internet Traffic Generator) is described, which allows the traffic generator to achieve high performance and hint at a comparison with other traffic generators.
Abstract: In this paper we present our traffic generation platform, named D-ITG (Distributed Internet Traffic Generator). Its features are first described. We believe that some capabilities are in fact innovative, since no other traffic generator offers them. Then, we describe the original architecture of D-ITG, which allows our traffic generator to achieve high performance. We hint at a comparison with other traffic generators and conclude with the ongoing work to add new features.

154 citations

Journal ArticleDOI
TL;DR: This contribution proposes a novel formulation of a one-class Support Vector Machine (SVM) specially designed for typical IDS data features, to encompass the data with a hypersphere anchored at the center of mass of the data in feature space.
Abstract: Practical application of data mining and machine learning techniques to intrusion detection is often hindered by the difficulty to produce clean data for the training. To address this problem a geometric framework for unsupervised anomaly detection has been recently proposed. In this framework, the data is mapped into a feature space, and anomalies are detected as the entries in sparsely populated regions. In this contribution we propose a novel formulation of a one-class Support Vector Machine (SVM) specially designed for typical IDS data features. The key idea of our ”quarter-sphere” algorithm is to encompass the data with a hypersphere anchored at the center of mass of the data in feature space. The proposed method and its behavior on varying percentages of attacks in the data is evaluated on the KDDCup 1999 dataset.

88 citations

Journal ArticleDOI
TL;DR: This paper gives an introduction to the reliable data transport problem and surveys protocols and approaches for this protocol, often developed for particular applications to reflect the application-specific dependability requirements.
Abstract: Reliable data transport is an important facet of dependability and quality of service in wireless sensor networks This paper gives an introduction to the reliable data transport problem and surveys protocols and approaches for this protocol, often developed for particular applications to reflect the applicationspecific dependability requirements A joint characteristic of many of the discussed protocols is that they combine mechanisms from several layers to achieve their reliability goals while being energy-efficient This very need to be energy-efficient precludes Internet-style approaches to reliability – handle it in the end system – and necessitates in-network solutions

55 citations

Journal ArticleDOI
TL;DR: This paper presents a tool that performs real-time verification of attacks detected by an intrusion detection system and shows that verification can dramatically reduce both false and non-relevant alerts.
Abstract: Intrusion detection systems monitor protected networks and attempt to identify evidence of malicious activity. When an attack is detected, an alert is produced, and, possibly, a countermeasure is executed. A perfect intrusion detection system would be able to identify all the attacks without raising any false alarms. In addition, a countermeasure would be executed only when an attack is actually successful. Unfortunately false alarms are commonplace in intrusion detection systems, and perfectly benign events are interpreted as malicious. In addition, non-relevant alerts are also common. These are alerts associated with attacks that were not successful. Such alerts should be tagged appropriately so that their priority can be lowered. The process of identifying alerts associated with successful attacks is called alert verification. This paper describes the different issues involved in alert verification and presents a tool that performs real-time verification of attacks detected by an intrusion detection system. The experimental evaluation of the tool shows that verification can dramatically reduce both false and non-relevant alerts.

50 citations

Journal ArticleDOI
TL;DR: In this paper, an analysis of the IEEE P802.11p MAC protocol in high load situations is presented, where an emergency vehicle is approaching a traffic jam, and the authors focus on the vehicle at the very end of the traffic jam.
Abstract: Reliability is one of the key requirements for inter-vehicle communication in order to improve safety in road traffic. This paper describes the difficulties of inter-vehicle communication. We focus on an analysis of the state-of-the art MAC protocol draft IEEE P802.11p and its limitations in high load situations. For our analysis we consider a particular safety scenario: An emergency vehicle is approaching a traffic jam. In a simulation experiment, we highlight that severe packet loss can occur. The reliable transmission range can be reduced by up to 90%. The main reason for this degradation is interference caused by transmissions of other vehicles within the traffic jam. In the study, we focus on the vehicle at the very end of the traffic jam. There, we measure the number of packets per second that are successfully received from the emergency vehicle. The key observation is that only a small fraction of the warning lead time remains which will also reduce the time for the driver to react on this information on an approaching emergency vehicle.

47 citations

Network Information
Related Journals (5)
Computer Communications
7.1K papers, 155.9K citations
78% related
Computer Networks
5.9K papers, 261.1K citations
77% related
IEEE Communications Surveys and Tutorials
1.3K papers, 292.9K citations
77% related
Journal of Network and Computer Applications
2.9K papers, 119.9K citations
76% related
IEEE Internet Computing
2.2K papers, 105.6K citations
75% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20171
20161
20159
201431
201330
201240