Sciweavers

34 search results - page 5 / 7
» Deployable Overlay Network for Defense against Distributed S...
Sort
View
USS
2008
13 years 10 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
AIMS
2009
Springer
14 years 9 days ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
25
Voted
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 2 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
WSC
2004
13 years 9 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
TON
2008
75views more  TON 2008»
13 years 7 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson