Now showing items 21-35 of 35

    • Simulating Internet Worms 

      Riley, George F.; Sharif, Monirul I.; Lee, Wenke (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2004-10)
      The accurate and efficient modeling of Internet worms is a particularly challenging task for network simulation tools. The atypical and aggressive behavior of these worms can easily consume excessive resources, both ...
    • Bluetooth Simulations for Wireless Sensor Networks Using GTNetS 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2004-10)
      We introduce a simulation environment for wireless sensor networks using the Bluetooth wireless protocol in our Georgia Tech Network Simulator (GTNetS). Our goal is to explore the applicability of the Bluetooth protocol ...
    • A BGP Attack Against Traffic Engineering 

      Kim, Jintae; Ko, Steven Y.; Nicol, David M.; Dimitropoulos, Christos Xenofontas A.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2004-12)
      As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configurations of the border gateway protocol (BGP). ...
    • Towards a Topology Generator Modeling AS Relationships 

      Dimitropoulos, Christos Xenofontas A.; Riley, George F.; Krioukov, Dmitri; Sundaram, Ravi (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, 2005)
    • A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks 

      Lee, Young J.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-03)
      A novel load-balancing technique for ad hoc on-demand routing protocols is presented. Currently, ad hoc routing protocols lack load-balancing capabilities, and thus, they often fail to provide good performance especially ...
    • Dynamic NIx-Vector Routing for Mobile Ad Hoc Networks 

      Lee, Young J.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-03)
      We present a new protocol for multi–hop routing in mobile ad hoc networks called Dynamic NIx–Vector Routing (DNVR). Our scheme is based on the NIx–Vector concept for efficient routing originally designed for wired ...
    • Evaluation of Worm Containment Algorithms and their Effect on Legitimate Traffic 

      Abdelhafez, Mohamed; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-03)
      Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several counter–measures have been ...
    • An On-Demand Bluetooth Scatternet Formation and Routing Protocol for Wireless Sensor Networks 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-05)
      Bluetooth is a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency which are required by wireless sensor networks. As an enhanced sensor node ...
    • Flow Based Observations from NETI@home and Honeynet Data 

      Grizzard, Julian B.; Simpson, Charles Robert, Jr.; Krasser, Sven; Owen, Henry L., III; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-06)
      We conduct a flow based comparison of honeynet traffic, representing malicious traffic, and NETI@home traffic, representing typical end user traffic. We present a cumulative distribution function of the number of packets ...
    • Efficient Simulation of Wireless Networks using Lazy MAC State Update 

      Lee, Young J.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-06)
      Scalable and efficient network simulation methods are the method of choice for evaluating and verifying wireless network protocols on a moderate to large scale. This need becomes obvious when simulating very large-scale ...
    • Energy-Aware On-Demand Scatternet Formation and Routing for Bluetooth-Based Wireless Sensor Networks 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-07)
      Bluetooth is a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency, both desirable for wireless sensor networks. The new Intel Mote sensor ...
    • Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2005-09)
      As wireless devices become more and more popular, ad hoc networks grow in the number of nodes as well as the complexity of communication among the large number of nodes. However, due to the limitation of simulation ...
    • Evaluation and Accelerating Bluetooth Device Discovery 

      Zhang, Xin; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2006-01)
      As a promising short-range wireless communication technology with the characteristics of interference resilience and power efficiency, Bluetooth is a ubiquitous candidate for wireless sensor network. The device discovery ...
    • Modeling Autonomous–System Relationships 

      Dimitropoulos, Christos Xenofontas A.; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2006-05)
      The development of realistic topology generators that produce faithful replicas of Internet topologies is critical for conducting realistic simulation studies of Internet protocols. Despite the volume of research in ...
    • Empirical Models of TCP and UDP End–User Network Traffic from NETI@home Data Analysis 

      Simpson, Charles Robert, Jr.; Reddy, Dheeraj; Riley, George F. (Georgia Institute of TechnologyInstitute of Electrical and Electronics Engineers, Inc., New York, 2006-05)
      The simulation of computer networks requires accurate models of user behavior. To this end, we present empirical models of end–user network traffic derived from the analysis of NETI@home data. There are two forms of ...