Sciweavers

382 search results - page 55 / 77
» Tracing Network Attacks to Their Sources
Sort
View
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 1 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
SUTC
2006
IEEE
14 years 1 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 1 months ago
Disruption-Tolerant Routing with Scoped Propagation of Control Information
— We consider the problem of routing messages through a network with episodic connectivity without a priori knowledge of node schedules or locations. We present Steward Assisted ...
Jay Boice, Jose Joaquin Garcia-Luna-Aceves, Katia ...
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 7 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
TON
2002
138views more  TON 2002»
13 years 7 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...