Sciweavers

29 search results - page 4 / 6
» An IP Traceback Technique against Denial-of-Service Attacks
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
On the (in)Effectiveness of Probabilistic Marking for IP Traceback Under DDoS Attacks
—Distributed denial-of-service attacks (DDoS) pose an immense threat to the Internet. The most studied solution is to let routers probabilistically mark packets with partial path...
Vamsi Paruchuri, Arjan Durresi, Raj Jain
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy
ISPA
2004
Springer
14 years 1 months ago
A Novel Technique for Detecting DDoS Attacks at Its Early Stage
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the i...
Bin Xiao, Wei Chen, Yanxiang He
GLOBECOM
2010
IEEE
13 years 5 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright
INFOCOM
2012
IEEE
11 years 10 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...