Sciweavers

64 search results - page 3 / 13
» An Empirical Study of Denial of Service Mitigation Technique...
Sort
View
TWC
2010
12 years 12 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
FC
2008
Springer
81views Cryptology» more  FC 2008»
13 years 7 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
CCR
2004
116views more  CCR 2004»
13 years 5 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan
ISCC
2000
IEEE
131views Communications» more  ISCC 2000»
13 years 9 months ago
An Empirical Study of Today's Internet Traffic for Differentiated Services IP QoS
The IETF is currently focused on Differentiated Services (Diffserv) as the architecture to provide Quality of Service in IP networks (IP-QoS). The Diffserv architecture consists o...
Fulu Li, Nabil Seddigh, Biswajit Nandy, Diego Matu...
NCA
2008
IEEE
13 years 11 months ago
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems
In environments like the Internet, faults follow unusual patterns, dictated by the combination of malicious attacks with accidental faults such as long communication delays caused...
Giuliana Santos Veronese, Miguel Correia, Lau Cheu...