Proceedings of the 1st ACM Workshop on Wireless Security 2002
DOI: 10.1145/570681.570689
|View full text |Cite
|
Sign up to set email alerts
|

Using signal processing to analyze wireless data traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
0

Year Published

2002
2002
2018
2018

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(34 citation statements)
references
References 17 publications
1
33
0
Order By: Relevance
“…Spectral techniques have been employed to identify bottleneck links [7], [8] and routing information [15] as well as a range of network anomalies [1], [12]. Magnaghi et al detect anomalies within TCP flows using a wavelet-based approach to identify network misconfigurations [12].…”
Section: Related Workmentioning
confidence: 99%
“…Spectral techniques have been employed to identify bottleneck links [7], [8] and routing information [15] as well as a range of network anomalies [1], [12]. Magnaghi et al detect anomalies within TCP flows using a wavelet-based approach to identify network misconfigurations [12].…”
Section: Related Workmentioning
confidence: 99%
“…It utilizes the TCP retransmission timeout events during the opening phase of the TCP connection (Magnaghi et al, 2004). Partridge et al apply Lomb periodograms to retrieve periodicities in wireless communication, including CBR traffic and FTP traffic (Partridge et al, 2002). Kim et al apply wavelet denoising to improve the accuracy of detecting congestion among different flows (Kim et al, 2004).…”
Section: Related Workmentioning
confidence: 99%
“…Thus, we can detect the presence of bottleneck links by detecting the existence of bottleneck traffic in the aggregate traffic in the spectral domain. Our approach builds on top of prior work of spectral analysis of network traffic (Barford et al, 2002;Partridge et al, 2002;Cheng et al, 2002;Hussain et al, 2003).…”
Section: Introductionmentioning
confidence: 99%
“…For example, if there is an underlying low-rate periodic stream in a trace, this will lead to energy appearing at the corresponding frequency in the transform domain. Examples of successful transform-domain techniques include use of the power spectral density [5], wavelets [8], and Lomb periodograms [9]. In each case, a standard analysis tool was used, with the hope that events to be detected would happen to produce a signature in the chosen representation domain.…”
Section: Feature Extraction For Maltraffic Detectionmentioning
confidence: 99%