Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/82049
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | - |
dc.creator | Xue, L | en_US |
dc.creator | Liu, Z | en_US |
dc.creator | Zou, XHou, J | en_US |
dc.creator | Luo, X | en_US |
dc.creator | Chan, EWW | en_US |
dc.creator | Tu, P | en_US |
dc.creator | Shao, Y | en_US |
dc.date.accessioned | 2020-05-05T05:58:27Z | - |
dc.date.available | 2020-05-05T05:58:27Z | - |
dc.identifier.uri | http://hdl.handle.net/10397/82049 | - |
dc.language.iso | en | en_US |
dc.rights | Assignee: The Hong Kong Polytechnic University | en_US |
dc.rights | Assignee: Tencent Technology (Shenzhen) Company Limited | en_US |
dc.title | Network attack detection method | en_US |
dc.type | Patent | en_US |
dc.description.otherinformation | US9876807; US9876807 B2; US9876807B2; US9,876,807; US9,876,807 B2; 9876807; Appl. No. 14/688,554 | en_US |
dcterms.abstract | It is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric. | - |
dcterms.bibliographicCitation | US Patent 9,876,807 B2. Washington, DC: US Patent and Trademark Office, 2018. | en_US |
dcterms.issued | 2018-01-23 | - |
dc.description.country | US | - |
dc.description.validate | 202006 bcrc | - |
dc.description.oa | Version of Record | en_US |
Appears in Collections: | Patent |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
us9876807b2.pdf | 1.66 MB | Adobe PDF | View/Open |
Page views
54
Last Week
0
0
Last month
Citations as of Sep 22, 2024
Downloads
52
Citations as of Sep 22, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.