Sciweavers

6652 search results - page 211 / 1331
» On the effective evaluation of TCP
Sort
View
AINA
2008
IEEE
14 years 3 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 3 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
ICCCN
2008
IEEE
14 years 3 months ago
STRID: Scalable Trigger-Based Route Incidence Diagnosis
—As the Internet steadily increases in importance, it is still based on a quite fragile routing design. From network operators perspective it is therefore crucial to detect end-t...
Feng Wang, Lixin Gao, Oliver Spatscheck, Jia Wang
INFOCOM
2008
IEEE
14 years 3 months ago
Window Flow Control: Macroscopic Properties from Microscopic Factors
—This paper studies window flow control focusing on bridging the gap between microscopic factors such as burstiness in sub-RTT timescales, and observable macroscopic properties ...
Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, ...
ICCCN
2007
IEEE
14 years 3 months ago
Transport Protocols for Remote Programming of Network Robots within the context of Telelaboratories for Education: A Comparative
– Within the context of Tele-Laboratories for Education the use of the Internet as communication media permits any researcher/student to perform remote experiments in a simple an...
Raul Wirz, Raúl Marín, José M...