Sciweavers

72 search results - page 10 / 15
» Teaching Network Security With IP Darkspace Data
Sort
View
234
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 9 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
159
Voted
SIGCOMM
2012
ACM
13 years 6 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...
120
Voted
MSS
2003
IEEE
97views Hardware» more  MSS 2003»
15 years 9 months ago
Design of the iSCSI Protocol
The iSCSI protocol enables accessing SCSI I/O devices over an IP network. TCP is used as a transport for SCSI I/O commands. We describe the design considerations and decisions in ...
Kalman Z. Meth, Julian Satran
140
Voted
IMC
2010
ACM
15 years 1 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
158
Voted
TON
2012
13 years 6 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta