Sciweavers

5 search results - page 1 / 1
» Application-based TCP hijacking
Sort
View
EUROSEC
2009
ACM
13 years 11 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
INFOCOM
1996
IEEE
13 years 9 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
COMSWARE
2008
IEEE
13 years 11 months ago
On TCP-aware uplink scheduling in IEEE 802.16 networks
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
Hemant Kumar Rath, Abhay Karandikar
SIGCOMM
2006
ACM
13 years 10 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
ACSAC
2004
IEEE
13 years 8 months ago
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security
Many network security problems can be solved in a centralized TCP (CTCP) architecture, in which an organization's edge router transparently proxies every TCP connection betwe...
Fu-Hau Hsu, Tzi-cker Chiueh