Sciweavers

382 search results - page 37 / 77
» Tracing Network Attacks to Their Sources
Sort
View
SIGGRAPH
1999
ACM
14 years 1 months ago
Real-Time Acoustic Modeling for Distributed Virtual Environments
Realistic acoustic modeling is essential for spatializing sound in distributed virtual environments where multiple networked users move around and interact visually and aurally in...
Thomas A. Funkhouser, Patrick Min, Ingrid Carlbom
NDSS
2009
IEEE
14 years 3 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
MASCOTS
2000
13 years 10 months ago
A Performance Comparison of Monofractal and Multifractal Traffic Streams
This paper focuses on the differences between monofractal and multifractal network traffic, both in terms of modeling approaches, and in terms of practical impacts on network perf...
Ram Balakrishnan, Carey L. Williamson
TON
2008
106views more  TON 2008»
13 years 8 months ago
Statistical techniques for detecting traffic anomalies through packet header data
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastr...
Seong Soo Kim, A. L. Narasimha Reddy
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 3 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...