Sciweavers

165 search results - page 27 / 33
» Network Border Patrol
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
ACSAC
2007
IEEE
14 years 2 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
ICOIN
2007
Springer
14 years 1 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
BROADNETS
2006
IEEE
14 years 1 months ago
A Statistical Approach to Anomaly Detection in Interdomain Routing
Abstract— A number of events such as hurricanes, earthquakes, power outages can cause large-scale failures in the Internet. These in turn cause anomalies in the interdomain routi...
Shivani Deshpande, Marina Thottan, Tin Kam Ho, Bip...
IPCCC
2006
IEEE
14 years 1 months ago
BGP with an adaptive minimal route advertisement interval
The duration of the Minimal Route Advertisement Interval (MRAI) and the implementation of MRAI timers have a significant influence on the convergence time of the Border Gateway Pr...
Nenad Laskovic, Ljiljana Trajkovic