Sciweavers

GLOBECOM
2006
IEEE
14 years 5 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
GLOBECOM
2006
IEEE
14 years 5 months ago
Efficient transmission of MP3 streams over VPNs
— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
Shashank Khanvilkar, Ashfaq A. Khokhar
GLOBECOM
2006
IEEE
14 years 5 months ago
Effectiveness of Rate Control in Slowing Down Worm Epidemics
— Rate control is an automated defense to slow down a worm outbreak to buy time for conventional defenses to take effect. In this study, we apply the community of households mode...
Nasir Jamil, Thomas M. Chen
GLOBECOM
2006
IEEE
14 years 5 months ago
Secure Aggregation in Large Scale Overlay Networks
Overlay networks have been very useful in solving large scale data dissemination problems. In this paper, we consider the case of data gathering which is the inverse of disseminat...
Waseem Ahmad, Ashfaq A. Khokhar
GLOBECOM
2006
IEEE
14 years 5 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
GLOBECOM
2006
IEEE
14 years 5 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
GLOBECOM
2006
IEEE
14 years 5 months ago
RIM: Router Interface Marking for IP Traceback
—Distributed Denial-of-Service (DDoS) attacks have become a major threat to the Internet. As a countermeasure against DDoS attacks, IP traceback schemes identify the network path...
Ruiliang Chen, Jung Min Park, Randolph Marchany
GLOBECOM
2006
IEEE
14 years 5 months ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
GLOBECOM
2006
IEEE
14 years 5 months ago
A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups
Abstract— In this paper, we propose a non-commutative keyexchange scheme which generalizes the classical ElGamal Cipher to polycyclic groups. We will explore other classes of gro...
Delaram Kahrobaei, Bilal Khan