Sciweavers

69 search results - page 2 / 14
» Pollution attacks and defenses for Internet caching systems
Sort
View
JSAC
2006
137views more  JSAC 2006»
13 years 7 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
DISCEX
2003
IEEE
14 years 22 days ago
DynaBone: Dynamic Defense Using Multi-layer Internet Overlays
1 Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target fo...
Joseph D. Touch, Gregory G. Finn, Yu-Shun Wang, La...
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
14 years 20 days ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
WSE
2006
IEEE
14 years 1 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
DSN
2011
IEEE
12 years 7 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...