Sciweavers

9316 search results - page 5 / 1864
» Analysis of traceback techniques
Sort
View
BROADNETS
2007
IEEE
14 years 1 months ago
DATALITE: a distributed architecture for traffic analysis via light-weight traffic digest
-- In this paper, we propose DATALITE, a Distributed Architecture for Traffic Analysis via LIghtweight Traffic digEst, which introduces a set of new distributed algorithms and prot...
Wing Cheong Lau, Murali S. Kodialam, T. V. Lakshma...
ISCC
2003
IEEE
14 years 18 days ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
SIGCOMM
2010
ACM
13 years 7 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
PLDI
2005
ACM
14 years 27 days ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
CCS
2004
ACM
14 years 22 days ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...