Sciweavers

13 search results - page 2 / 3
» Demonstrating cognitive packet network resilience to worm at...
Sort
View
IMC
2004
ACM
14 years 3 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
DSN
2007
IEEE
14 years 1 months ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...
INFOCOM
2007
IEEE
14 years 4 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan
ICNP
2007
IEEE
14 years 4 months ago
Routing amid Colluding Attackers
Abstract— We propose the first practical solution to the longstanding problem of secure wireless routing in the presence of colluding attackers. Our secure routing protocol, Spr...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala