Sciweavers

282 search results - page 45 / 57
» Monitoring Network Traffic to Detect Stepping-Stone Intrusio...
Sort
View
SASN
2006
ACM
14 years 2 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 3 months ago
DYSWIS: An architecture for automated diagnosis of networks
As the complexity of networked systems increases, we need mechanisms to automatically detect failures in the network and diagnose the cause of such failures. To realize true self-...
Vishal Kumar Singh, Henning Schulzrinne, Kai Miao
ACSAC
2002
IEEE
14 years 1 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
CONEXT
2010
ACM
13 years 6 months ago
MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult due to the lack of ground truth. The goal of the present article is to assist rese...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
DISCEX
2003
IEEE
14 years 2 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt