Sciweavers

12 search results - page 2 / 3
» An experimental study of insider attacks for OSPF routing pr...
Sort
View
CCR
2005
89views more  CCR 2005»
13 years 4 months ago
Achieving sub-second IGP convergence in large IP networks
We describe and analyse in details the various factors that influence the convergence time of intradomain link state routing protocols. This convergence time reflects the time req...
Pierre François, Clarence Filsfils, John Ev...
WS
2004
ACM
13 years 10 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
MOBIHOC
2005
ACM
14 years 4 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
IMC
2007
ACM
13 years 6 months ago
On the impact of route monitor selection
Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering realtime BGP updates from different networks. Many stud...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
ACSAC
2004
IEEE
13 years 8 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu