Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > Network Operations (C.2.3) > Network Monitoring (C.2.3...)  
 
Options:
 
  1-10 of 28 Reviews about "Network Monitoring (C.2.3...)": Date Reviewed
  Practical packet analysis: using Wireshark to solve real-world network problems (3rd ed.)
Sanders C., No Starch Press, San Francisco, CA, 2017. 368 pp.  Type: Book (978-1-593278-02-1)

The study of the operation of network protocols, as well as the improvement of a network’s functionality and security, are the main aspects that network packet analysis considers. Known as both a software protocol analysis an...

Dec 5 2017
  Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties
Sultana N., Kohlweiss M., Moore A.  HotMiddlebox 2016 (Proceedings of the 2016 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, Florianopolis, Brazil, Aug 22-26, 2016) 1-6, 2016.  Type: Proceedings

Sultana et al. tackle the problem of remotely making measurements on a network over which the party conducting the reconnaissance has no control. Such scenarios are prevalent in cloud computing, where the subscriber to a cloud service ...

Mar 30 2017
  The practice of network security monitoring: understanding incident detection and response
Bejtlich R., No Starch Press, San Francisco, CA, 2013. 376 pp.  Type: Book (978-1-593275-09-9)

I reached for this book because I am one of those readers who needs what it offers. That is, I wanted to learn about network monitoring to improve its security. As the author advises on several occasions, the book is aimed at those pro...

Feb 10 2014
  Nagios: building enterprise-grade monitoring infrastructures for systems and networks (2nd ed.)
Josephsen D., Prentice Hall Press, Upper Saddle River, NJ, 2013. 304 pp.  Type: Book (978-0-133135-73-2)

We are all aware of the importance of computers in our lives, and the problems that can ensue when they fail. Computer monitoring systems do just as their name suggests: they monitor computers and networks for problems, and notify admi...

Dec 27 2013
  Characterizing per-application network traffic using entropy
Petkov V., Rajagopal R., Obraczka K. ACM Transactions on Modeling and Computer Simulation 23(2): 1-25, 2013.  Type: Article

Several emerging algorithms for data mining, modeling, and simulation offer support for the visualization of business data and information. Business applications with intensive computational needs require the efficient use of bandwidth...

Jul 22 2013
  Network traffic from Anarchy Online: analysis, statistics and applications: a server-side traffic trace
Petlund A., Halvorsen P., Hansen P., Lindgren T., Casais R., Griwodz C.  MMSys 2012 (Proceedings of the 3rd Multimedia Systems Conference, Chapel Hill, NC, Feb 22-24, 2012) 95-100, 2012.  Type: Proceedings

In this paper, Petlund et al. describe a publicly available tcpdump trace from a live production massive multiplayer online game (MMOG) called Anarchy Online. MMOG traffic differs from the more common streaming traffic of websit...

Mar 28 2013
  Traffic measurement on the Internet
Li T., Chen S., Springer Publishing Company, Incorporated, New York, NY, 2012. 91 pp.  Type: Book (978-1-461448-50-1)

Network traffic measurement supports fundamental network management tasks like “capacity planning, accounting and billing, anomaly detection, and service provision.” This book presents several online measurement met...

Jan 30 2013
  Detection accuracy of network anomalies using sampled flow statistics
Kawahara R., Ishibashi K., Mori T., Kamiyama N., Harada S., Hasegawa H., Asano S. International Journal of Network Management 21(6): 513-535, 2011.  Type: Article

The identification of anomalies in network traffic is still a challenging task. The authors investigate this issue by measuring traffic at the flow level and collecting flow statistics through packet sampling. They use an analytical mo...

Jul 23 2012
  Delay optimal event detection on ad hoc wireless sensor networks
Karumbu P., Prasanthi V., Kumar A. ACM Transactions on Sensor Networks 8(2): 1-35, 2012.  Type: Article

This paper considers data fusion in ad hoc wireless sensor networks with event detection. Nodes periodically take samples and report their measurements to the fusion center by contention. Two procedures are investigated: network oblivi...

Jun 21 2012
  Parametric methods for anomaly detection in aggregate traffic
Thatte G., Mitra U., Heidemann J. IEEE/ACM Transactions on Networking 19(2): 512-525, 2011.  Type: Article

The effective and efficient detection of network anomalies is still a challenging task. The authors’ proposed “bivariate parametric detection mechanism (bPDM) uses a sequential probability ratio test [SPRT], allowin...

Feb 10 2012
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy