Sciweavers

1278 search results - page 75 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment
We have built a router testbed that is connected to the Deter/Emist experimental infrastructure. Our goal is to create a semi-realistic testbed to conduct BGP experiments, measure...
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon...
148
Voted
SECON
2010
IEEE
15 years 2 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 10 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
ESORICS
2009
Springer
16 years 4 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
INFOCOM
2006
IEEE
15 years 10 months ago
Eclipse Attacks on Overlay Networks: Threats and Defenses
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
Atul Singh, Tsuen-Wan Ngan, Peter Druschel, Dan S....