Sciweavers

551 search results - page 59 / 111
» Probing TCP Implementations
Sort
View
NCM
2010
13 years 8 months ago
Blink: Large-scale P2P network monitoring and visualization system using VM introspection
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network is now ser...
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda
ISNN
2005
Springer
14 years 3 months ago
Impacts of Internet Stock News on Stock Markets Based on Neural Networks
The research of impacts between the Internet stock news (ISN) and the stock price movements emerges with the era of the popular usage of the Internet. In this paper, first, the ISN...
Xun Liang
CORR
2008
Springer
135views Education» more  CORR 2008»
13 years 10 months ago
A DCCP Congestion Control Mechanism for Wired- cum-Wireless Environments
Existing transport protocols, be it TCP, SCTP or DCCP, do not provide an efficient congestion control mechanism for heterogeneous wired-cum-wireless networks. Solutions involving i...
Ijaz Haider Naqvi, Tanguy Pérennou
SIGCOMM
2006
ACM
14 years 3 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
ACSAC
2004
IEEE
14 years 1 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh