Sciweavers

2028 search results - page 3 / 406
» Highly Predictive Blacklisting
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
SIGMETRICS
2006
ACM
14 years 1 months ago
Fluid modeling of pollution proliferation in P2P networks
P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...
ECML
2005
Springer
14 years 1 months ago
Thwarting the Nigritude Ultramarine: Learning to Identify Link Spam
The page rank of a commercial web site has an enormous economic impact because it directly influences the number of potential customers that find the site as a highly ranked sear...
Isabel Drost, Tobias Scheffer
CONEXT
2007
ACM
13 years 11 months ago
Identifying dynamic IP address blocks serendipitously through background scanning traffic
Today's Internet contains a large portion of "dynamic" IP addresses, which are assigned to clients upon request. A significant amount of malicious activities have b...
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
INFOCOM
2010
IEEE
13 years 5 months ago
Tracking Long Duration Flows in Network Traffic
We propose the tracking of long duration flows as a new network measurement primitive. Long-duration flows are characterized by their long lived nature in time, and may not have hi...
Aiyou Chen, Yu Jin, Jin Cao