Sciweavers

382 search results - page 33 / 77
» Tracing Network Attacks to Their Sources
Sort
View
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
14 years 19 days ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
GLOBECOM
2008
IEEE
14 years 3 months ago
TTL Based Packet Marking for IP Traceback
— Distributed Denial of Service Attacks continue to pose major threats to the Internet. In order to traceback attack sources (i.e., IP addresses), a well studied approach is Prob...
Vamsi Paruchuri, Arjan Durresi, Sriram Chellappan
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
14 years 2 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
WDAG
2007
Springer
73views Algorithms» more  WDAG 2007»
14 years 2 months ago
On Self-stabilizing Synchronous Actions Despite Byzantine Attacks
Consider a distributed network of n nodes that is connected to a global source of “beats”. All nodes receive the “beats” simultaneously, and operate in lock-step. A scheme ...
Danny Dolev, Ezra N. Hoch
NETWORK
2008
151views more  NETWORK 2008»
13 years 8 months ago
Minimizing information leakage in the DNS
The Domain Name System (DNS) is the global lookup service for network resources. To protect DNS information, the DNS Security Extensions (DNSSEC) have been developed and deployed ...
Scott Rose, Anastase Nakassis