期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An rFC based service triggering algorithm for IMS network 被引量:1
1
作者 荀兆勇 Liao Jianxin Zhu Xiaomin 《High Technology Letters》 EI CAS 2009年第2期162-169,共8页
To reduce the potential signaling traffic in IP multimedia subsystem (IMS), the session establishment procedures were investigated. The serving call session eontrol function (S-CSCF) is the major bottleneck in IMS... To reduce the potential signaling traffic in IP multimedia subsystem (IMS), the session establishment procedures were investigated. The serving call session eontrol function (S-CSCF) is the major bottleneck in IMS and the existing 3GPP service triggering algorithm (STA) based on initial filter eriteria (iFC) increases the end-to-end session setup delay remarkably. To reduce the session setup delay and improve the system performanee, a SIP response message based filter criteria (rFC) was proposed. Based on the rFC, a SIP response message based STA (RSTA) was further proposed. The modeling and theoretical analysis of 3GPP STA and RSTA were presented. Simulation results show that, compared with 3GPP STA, the RSTA can avoid the additional signaling traffie load of the S-CSCF and application server (AS) effectively, reduce the session setup delay eonsiderably, increase the throughput of the S-CSCF and improve the quality of service (QoS) of IMS network. 展开更多
关键词 signaling performance (STA) session initiation protocol (SIP) session setup delay filter criteria service triggering algorithm IP multimedia subsystem (IMS)
下载PDF
HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3
2
作者 WANG Jin ZHANG Min +2 位作者 YANG Xiaolong LONG Keping XU Jie 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by ... HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. 展开更多
关键词 IP network DDoS relative entropy cluster algorithm
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部