Now showing items 1-18 of 18

    • Cache Placement Methods Based on Client Demand Clustering 

      Barford, Paul; Cai, Jin-Yi; Gast, Jim (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • Characteristics of Network Delays in Wide Area File Transfers 

      Barford, Paul; Donoho, David; Flesia, Ana; Yegneswaran, Vinod (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • Characterizing Malcode Evolution 

      Gupta, Archit; Kuppili, Pavan; Akella, Aditya; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2007)
      The diversity, sophistication and availability of malicious software (malcode) pose enormous challenges for securing networks and end hosts from attacks. In this paper, we analyze a large corpus of malcode meta data ...
    • A Comparison of Active and Passive Methods for Measuring Packet Loss 

      Barford, Paul; Sommers, Joel (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • A Dictionary Architecture for Optimized Intra-Domain Routing 

      Barford, Paul; Chabarek, Joseph (2013-03-18)
      The unpredictability of outages and traffic dynamics require network engineers to keep careful watch on their infrastructures.When significant changes are identified, engineers often tweak link weights (i.e., traffic ...
    • A Framework for Malicious Workload Generation 

      Sommers, Joel; Yegneswaran, Vinod; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2004)
      Malicious traffic from self-propagating worms and denial-of-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats demands appropriate tools to conduct ...
    • Global Intrusion Detection in the DOMINO Overlay System 

      Yegneswaran, Vinod; Barford, Paul; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2003)
      Sharing data between widely distributed intrusion detection systems offers the possibility of significant improvements in speed and accuracy over systems operating in isolation. In this paper, we describe and evaluate ...
    • Honeygames: A Game Theoretic Approach to Defending Network Monitors 

      Cai, Jin-Yi; Yegneswaran, Vinod; Alfeld, Chris; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2006)
      A honeynet is a portion of routed but otherwise unused address space that is instrumented for network traffic monitoring. Over the past several years, honeynets have proven to be an invaluable tool for understanding the ...
    • Internet Intrusions: Global Characteristics and Prevalence 

      Yegneswaran, Vinod; Barford, Paul; Ullrich, Johannes (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • Internet Multi-Resolution Analysis: A Vision and Framework in Support of Representing, Analyzing and Visualizing Internet Measurements 

      Barford, Paul; Partridge, Craig; Williinger, Walter (University of Wisconsin-Madison Department of Computer Sciences, 2008)
      Empirical analysis has been the foundation for a great deal of network research and has resulted in significant improvements to Internet systems, protocols and practices. Recent progress applying a constantly expanding set ...
    • Internet Sieve: An Architecture for Generating Resilient Signatures 

      Yegneswaran, Vinod; Giffin, Jonathon; Barford, Paul; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2004)
      We present iSieve, a modular architecture for identifying intrusion profiles in packet trace data and automatically constructing resilient signatures for the profiles. The first component of the architecture organizes and ...
    • Modeling Congestion in Backbone Routers 

      Gast, Jim; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • NSF Workshop on Emerging Research Opportunities at the Intersection of Statistics and Internet Measurement Final Report 

      Barford, Paul; Ng, Tony (2023-11-30)
      The Workshop on Emerging Research Opportunities at the Intersection of Statistics and Internet Measurement was held in January 2023 at Boston University. The goal of the workshop was to bring together Internet measurement ...
    • On the Design and Use of Internet Sinks for Network Abuse Monitoring 

      Yegneswaran, Vinod; Barford, Paul; Plonka, Dave (University of Wisconsin-Madison Department of Computer Sciences, 2004)
      Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on ...
    • On the Precision of Active Probes for Packet Loss 

      Barford, Paul; Sommers, Joel (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • A Proposed Framework for Calibration of Available Bandwidth Estimation Tools 

      Sommers, Joel; Barford, Paul; Willinger, Walter (University of Wisconsin-Madison Department of Computer Sciences, 2005)
      Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool using a combination of simple ns-type ...
    • A SLA Perspective on the Router Buffer Sizing Problem 

      Sommers, Joel; Barford, Paul; Greenberg, Albert; Willinger, Walter (University of Wisconsin-Madison Department of Computer Sciences, 2006)
      In this paper, we discuss recent work on buffer sizing in the larger context of an ISP's need to offer and guarantee competitive Service Level Agreements (SLAs) to its customers. Since SLAs specify the performance that ...
    • Toward Comprehensive Traffic Generation for Online IDS Evaluation 

      Sommers, Joel; Yegneswaran, Vinod; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2005)
      We describe a traffic generation framework for conducting online evaluations of network intrusion detection systems over a wide range of realistic conditions. The framework integrates both benign and malicious traffic, ...