Sciweavers

382 search results - page 10 / 77
» Tracing Network Attacks to Their Sources
Sort
View
NSDI
2010
13 years 9 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...
ICIP
2006
IEEE
14 years 9 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
FAABS
2004
Springer
14 years 26 days ago
Agent-Based Chemical Plume Tracing Using Fluid Dynamics
Abstract. This paper presents a rigorous evaluation of a novel, distributed chemical plume tracing algorithm. The algorithm is a combination of the best aspects of the two most pop...
Dimitri Zarzhitsky, Diana F. Spears, David R. Thay...
IJSN
2006
65views more  IJSN 2006»
13 years 7 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
IC
2003
13 years 8 months ago
Denying Denial-of-Service Attacks: A Router Based Solution
Distributed Denial-of-Service (DDoS) attacks prevent users from accessing services on the target network by flooding the target network with a large volume of traffic. In this pap...
Zhang Shu, Partha Dasgupta