Sciweavers

224 search results - page 24 / 45
» Composable Tools For Network Discovery and Security Analysis
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
ISPASS
2005
IEEE
14 years 1 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
NDSS
2000
IEEE
13 years 12 months ago
Analysis of a Fair Exchange Protocol
We analyze an optimistic contract signing protocol of Asokan, Shoup, and Waidner as a case study in the applicability of formal methods to verification of fair exchange protocols...
Vitaly Shmatikov, John C. Mitchell
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
IPPS
2008
IEEE
14 years 2 months ago
Modeling and analysis of power in multicore network processors
With the emergence of multicore network processors in support of high-performance computing and networking applications, power consumption has become a problem of increasing signi...
S. Huang, Y. Luo, W. Feng