Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2023
Density-aware replica server placement for utilisation enhancement
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 25, Issue 3-4Pages 219–233https://doi.org/10.1504/ijaip.2023.132382The most challenging issue in content delivery networks (CDN) is to place the surrogate servers. K-means clustering can be chosen as a very simple and effective approach for placing the surrogates over the network. But the main concern of this approach is ...
- research-articleJanuary 2020
A multi-filter feature selection in detecting distributed denial-of-service attack
ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication EngineeringPages 57–62https://doi.org/10.1145/3369555.3369572Distributed Denial of Services (DDoS) has become the most intrusive security threat on the Internet. Flash crowd attack is the most challenging problem among the attacks which targeting the web server during the Flash Events (FEs). It mimics the ...
- articleJuly 2016
Access control mechanism using flexible multi-layer structure for mesh-based P2P live streaming systems
International Journal of Communication Systems (IJOCS), Volume 29, Issue 11Pages 1740–1760https://doi.org/10.1002/dac.3139When thousands of new peers seek to join the peer-to-peer P2P system within a very short time i.e., the so-called flash crowd event, most of the peers suffer a long startup delay as a result of peer over-competition. Accordingly, recent studies have ...
- demonstrationSeptember 2015
NetInf Live Video Streaming for Events with Large Crowds
ACM-ICN '15: Proceedings of the 2nd ACM Conference on Information-Centric NetworkingPages 209–210https://doi.org/10.1145/2810156.2812611Information Centric Networking (ICN) aims to evolve the Internet from a host-centric to a data-centric paradigm. In particular, it improves performance and resource efficiency in events with large crowds where many users in a local area want to generate ...
- research-articleApril 2015
Handling flash-crowd events to improve the performance of web applications
SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied ComputingPages 769–774https://doi.org/10.1145/2695664.2695839Cloud computing can offer a set of computing resources according to users' demand. It is suitable to be used to handle flash-crowd events in Web applications due to its elasticity and on-demand characteristics. Thus, when Web applications need more ...
- articleAugust 2014
Performance modeling and evaluation of peer-to-peer live streaming systems under flash crowds
IEEE/ACM Transactions on Networking (TON), Volume 22, Issue 4Pages 1106–1120https://doi.org/10.1109/TNET.2013.2272056A peer-to-peer (P2P) live streaming system faces a big challenge under flash crowds. When a flash crowd occurs, the sudden arrival of numerous peers may starve the upload capacity of the system, hurt its quality of service, and even cause system ...
- ArticleJuly 2013
Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network
COMPSAC '13: Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications ConferencePages 220–225https://doi.org/10.1109/COMPSAC.2013.37The flash crowd is a network phenomenon where a network or host suddenly receives a lot of traffic. It is a serious problem for web servers because it causes the websites temporarily unavailable. However, conventional load distribution methods could not ...
- articleSeptember 2012
Distributed denial-of-service attack detection scheme-based joint-entropy
Security and Communication Networks (SACN), Volume 5, Issue 9Pages 1049–1061https://doi.org/10.1002/sec.392Distributed denial-of-service (DDoS) attacks present an increasing threat to the global inter-networking infrastructure. While entropy schemes are highly robust to diverse network conditions, they remain vulnerable to distribute attacks that are similar ...
- research-articleDecember 2011
Great east Japan earthquake viewed from a URL shortener
SWID '11: Proceedings of the Special Workshop on Internet and DisastersArticle No.: 8, Pages 1–8https://doi.org/10.1145/2079360.2079368On March 11th 2011, a great earthquake and tsunami hit eastern Japan. After that, several web sites, especially those providing helpful disaster-related information, were overloaded due to flash crowds caused by Twitter users. In order to mitigate the ...
- ArticleMarch 2011
A Load Reduction System to Mitigate Flash Crowds on Web Server
ISADS '11: Proceedings of the 2011 Tenth International Symposium on Autonomous Decentralized SystemsPages 503–508https://doi.org/10.1109/ISADS.2011.73In recent years there is a rapid increase of traffic to a given web server within a short time as the number of Internet users increases, and such a phenomenon is called a flash crowd. Once flash crowds occur in the web server, a response rate decreases ...
- research-articleFebruary 2011
Detection of HTTP flooding attacks in multiple scenarios
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecurityPages 517–522https://doi.org/10.1145/1947940.1948047HTTP GET flooding attack is considered to be one of the most successful attacks of Application Layer Denial of Service (App-DoS). Detection of such attack is difficult due to its non-intrusive nature. This paper presents an effective method for ...
- ArticleOctober 2009
Audit Trail Analysis for Traffic Intensive Web Application
ICEBE '09: Proceedings of the 2009 IEEE International Conference on e-Business EngineeringPages 577–582https://doi.org/10.1109/ICEBE.2009.91Web-enabled business processes designed for travel industry and government agencies are considered as traffic intensive applications since number of users can fluctuate dramatically within a short time. Applications under this category are likely to ...
- research-articleJanuary 2007
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 4, Issue 1Pages 56–70https://doi.org/10.1109/TDSC.2007.12The goals of the present contribution are twofold. First, we propose the use of a non-Gaussian long-range dependent process to model Internet traffic aggregated time series. We give the definitions and intuition behind the use of this model. We detail ...
- ArticleMay 2002
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
WWW '02: Proceedings of the 11th international conference on World Wide WebPages 293–304https://doi.org/10.1145/511446.511485The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service attacks (DoS). The former are created by legitimate requests and the latter ...