Sciweavers

143 search results - page 7 / 29
» Defending against eclipse attacks on overlay networks
Sort
View
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 3 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 3 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 3 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien