Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/82049
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorXue, Len_US
dc.creatorLiu, Zen_US
dc.creatorZou, XHou, Jen_US
dc.creatorLuo, Xen_US
dc.creatorChan, EWWen_US
dc.creatorTu, Pen_US
dc.creatorShao, Yen_US
dc.date.accessioned2020-05-05T05:58:27Z-
dc.date.available2020-05-05T05:58:27Z-
dc.identifier.urihttp://hdl.handle.net/10397/82049-
dc.language.isoenen_US
dc.rightsAssignee: The Hong Kong Polytechnic Universityen_US
dc.rightsAssignee: Tencent Technology (Shenzhen) Company Limiteden_US
dc.titleNetwork attack detection methoden_US
dc.typePatenten_US
dc.description.otherinformationUS9876807; US9876807 B2; US9876807B2; US9,876,807; US9,876,807 B2; 9876807; Appl. No. 14/688,554en_US
dcterms.abstractIt is described a network attack detection method. A topology analysis on network is conducted to obtain a probing path set containing at least one probing path. A first probing path contained in the probing path set is probed by using a probing pattern to obtain a performance metric of the first probing path. It is determined whether the first probing path is subjected to network attack according to the performance metric and a control performance metric.-
dcterms.bibliographicCitationUS Patent 9,876,807 B2. Washington, DC: US Patent and Trademark Office, 2018.en_US
dcterms.issued2018-01-23-
dc.description.countryUS-
dc.description.validate202006 bcrc-
dc.description.oaVersion of Recorden_US
Appears in Collections:Patent
Files in This Item:
File Description SizeFormat 
us9876807b2.pdf1.66 MBAdobe PDFView/Open
Show simple item record

Page views

17
Citations as of Jun 26, 2022

Downloads

7
Citations as of Jun 26, 2022

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.