Sciweavers

6689 search results - page 86 / 1338
» A Network Security Monitor
Sort
View
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
14 years 2 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
CONEXT
2008
ACM
13 years 10 months ago
CoreLab: an emerging network testbed employing hosted virtual machine monitor
Network testbeds for developing, deploying, and experimenting with new network services have evolved as recent rapid progress in virtualization technology. This paper proposes a n...
Akihiro Nakao, Ryota Ozaki, Yuji Nishida
GLOBECOM
2006
IEEE
14 years 2 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
NDSS
2006
IEEE
14 years 2 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....